Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Approximate algorithms for K-anonymity
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
"I know what you did last summer": query logs and user privacy
Proceedings of the sixteenth ACM conference on Conference on information and knowledge management
Noise Injection for Search Privacy Protection
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
How unique is your web browser?
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
On the effectiveness of anonymizing networks for web search privacy
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Hummingbird: Privacy at the Time of Twitter
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
On the Feasibility of Internet-Scale Author Identification
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
Third-Party Web Tracking: Policy and Technology
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
Detecting Hoaxes, Frauds, and Deception in Writing Style Online
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
OB-PWS: Obfuscation-Based Private Web Search
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
Hi-index | 0.00 |
Over the past few years, microblogging social networking services have become a popular means for information sharing and communication. Besides sharing information among friends, such services are currently being used by artists, politicians, news channels, and information providers to easily communicate with their constituency. Even though following specific channels on a microblogging service enables users to receive interesting information in a timely manner, it may raise significant privacy concerns as well. For example, the microblogging service is able to observe all the channels that a particular user follows. This way, it can infer all the subjects a user might be interested in and generate a detailed profile of this user. This knowledge can be used for a variety of purposes that are usually beyond the control of the users. To address these privacy concerns, we propose k-subscription: an obfuscation-based approach that enables users to follow privacy-sensitive channels, while, at the same time, making it difficult for the microblogging service to find out their actual interests. Our method relies on obfuscation: in addition to each privacy-sensitive channel, users are encouraged to randomly follow k -- 1 other channels they are not interested in. In this way (i) their actual interests are hidden in random selections, and (ii) each user contributes in hiding the real interests of other users. Our analysis indicates that k-subscription makes it difficult for attackers to pinpoint a user's interests with significant confidence. We show that this confidence can be made predictably small by slightly adjusting k while adding a reasonably low overhead on the user's system.