Enhancing customer privacy while searching for products and services on the world wide web

Purpose – To propose a model of a privacy‐enhanced catalogue search system (PECSS) in an attempt to address privacy threats to consumers, who search for products and services on the world wide web.Design/methodology/approach – The model extends an agent‐based architecture for electronic catalogue mediation by supplementing it with a privacy enhancement mechanism. This mechanism introduces fake queries into the original stream of user queries, in an attempt to reduce the similarity between the actual interests of users (“internal user profile”) and the interests as observed by potential eavesdroppers on the web (“external user profile”). A prototype was constructed to demonstrate the feasibility and effectiveness of the model.Findings – The evaluation of the model indicates that, by generating five fake queries per each original user query, the user's profile is hidden most effectively from any potential eavesdropper. Future research is needed to identify the optimal glossary of fake queries for various cl...

[1]  Yuval Elovici,et al.  A new privacy model for hiding group interests while accessing the Web , 2002, WPES '02.

[2]  Beat Schmid,et al.  Architecture and Business Potential of Mediating Electronic Product Catalogs , 1997 .

[3]  Anthony D. Miyazaki,et al.  Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .

[4]  Paul Syverson,et al.  Onion Routing for Anonymous and Private Internet Connections , 1999 .

[5]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[6]  George R. Milne Privacy and Ethical Issues in Database/Interactive Marketing and Public Policy: A Research Framework and Overview of the Special Issue , 2000 .

[7]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[8]  Allen Newell,et al.  The Knowledge Level , 1989, Artif. Intell..

[9]  Peretz Shoval,et al.  An architecture of an intelligent system for routing user requests in a network of heterogeneous databases , 1994, Journal of Intelligent Information Systems.

[10]  Tsvi Kuflik,et al.  Privacy Preservation Improvement by Learning Optimal Profile Generation Rate , 2003, User Modeling.

[11]  Chanan Glezer,et al.  A Conceptual Model of an Intelligent Catalog Search System , 2001, J. Organ. Comput. Electron. Commer..

[12]  C. Goodwin Privacy: Recognition of a Consumer Right , 1991 .

[13]  Bradley N. Miller,et al.  GroupLens: applying collaborative filtering to Usenet news , 1997, CACM.

[14]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[15]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[16]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[17]  Peretz Shoval,et al.  Information Filtering: A New Two-Phase Model Using Stereotypic User Profiling , 2004, Journal of Intelligent Information Systems.

[18]  L. Jean Camp Web Security and Privacy: An American Perspective , 1999, Inf. Soc..

[19]  Peretz Shoval,et al.  Experimentation with an information filtering system that combines cognitive and sociological filtering integrated with user stereotypes , 1999, Decis. Support Syst..

[20]  Tomaz Klobucar,et al.  Privacy-Enhancing Technologies - approaches and development , 2003, Comput. Stand. Interfaces.

[21]  Paul F. Syverson,et al.  Hiding Routing Information , 1996, Information Hiding.

[22]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[23]  Peretz Shoval,et al.  Principles, procedures and rules in an expert system for information retrieval , 1985, Inf. Process. Manag..

[24]  Oliver Berthold,et al.  Dummy Traffic against Long Term Intersection Attacks , 2002, Privacy Enhancing Technologies.

[25]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[26]  Surya B. Yadav,et al.  The process of research investigations in artificial intelligence-a unified view , 1995, IEEE Trans. Syst. Man Cybern..

[27]  Stephen Fox,et al.  Heterogeneous distributed database systems for production use , 1990, ACM Comput. Surv..

[28]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[29]  Donna L. Hoffman,et al.  Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web , 1999, Inf. Soc..

[30]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[31]  Pattie Maes,et al.  Agents that buy and sell , 1999, CACM.

[32]  Bernhard Plattner,et al.  Towards Pseudonymous e-Commerce , 2004, Electron. Commer. Res..

[33]  Yossi Matias,et al.  On secure and pseudonymous client-relationships with multiple servers , 1998, TSEC.

[34]  Michael R. Genesereth,et al.  Software agents , 1994, CACM.

[35]  Ricardo Baeza-Yates,et al.  Information Retrieval: Data Structures and Algorithms , 1992 .

[36]  Andrew S. Patrick,et al.  From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions , 2003, Privacy Enhancing Technologies.

[37]  Yoichi Shinoda,et al.  Information filtering based on user behavior analysis and best match text retrieval , 1994, SIGIR '94.

[38]  Alfred Kobsa,et al.  Impacts of User Privacy Preferences on Personalized Systems , 2004, Designing Personalized User Experiences in eCommerce.

[39]  Joos Vandewalle,et al.  Revocable anonymous access to the Internet? , 2003, Internet Res..

[40]  Peretz Shoval,et al.  Information Filtering: Overview of Issues, Research and Systems , 2001, User Modeling and User-Adapted Interaction.

[41]  Paola Benassi,et al.  TRUSTe: an online privacy seal program , 1999, CACM.

[42]  George R. Milne,et al.  Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .

[43]  Douglas W. Oard,et al.  The State of the Art in Text Filtering , 1997, User Modeling and User-Adapted Interaction.

[44]  Joos Vandewalle,et al.  Solutions for anonymous communication on the Internet , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[45]  L. Camp,et al.  Privacy-Enhancing Technologies for Internet Commerce , 2002 .

[46]  Simone Fischer-Hübner Privacy and security at risk in the global information society , 1998 .

[47]  Chanan Glezer,et al.  A Conceptual Model of an Intelligent Catalogue Search System (ICSS) , 1999 .