Poshida, a protocol for private information retrieval

Web Search Engines are the easy source to get data from Internet. WSE retrieve the information from the ocean of data according to the user generated queries. In return the WSE records the queries to build the user profile and retrieves the personalize search results. WSE sells the query log to marketing companies to generate revenue. This poses a threat to user privacy. In 2006 AOL released query log for research purpose but those logs were not properly anonymized, lead to the discovery of users. Performing private web search and achieving privacy is the active area of research. Many technique has been proposed to hide the identity of users from the WSE, However state of the art scheme is yet to device to privately retrieve information from WSE. This paper proposes a new protocol to obfuscate the user profile which is maintained by WSE. Profile Exposure level is used to measure the level of privacy a user achieve from WSE. Results show the protocol hides 50 percent of user profile at first degree 70% at second, 77% at third and more than 85% at fourth degree.

[1]  Alexandre Viejo,et al.  Using social networks to distort users' profiles generated by web search engines , 2010, Comput. Networks.

[2]  Douglas R. Stinson,et al.  Extended combinatorial constructions for peer-to-peer user-private information retrieval , 2012, Adv. Math. Commun..

[3]  Avi Arampatzis,et al.  Versatile Query Scrambling for Private Web Search , 2015, Information Retrieval Journal.

[4]  Lihua Liu,et al.  An Improved Lindell-Waisbard Private Web Search Scheme , 2016, Int. J. Netw. Secur..

[5]  Josep Domingo-Ferrer,et al.  User-private information retrieval based on a peer-to-peer community , 2009, Data Knowl. Eng..

[6]  Alissa Cooper,et al.  A survey of query log privacy-enhancing techniques from a policy perspective , 2008, TWEB.

[7]  Josep Maria Mateo-Sanz,et al.  Exploiting social networks to provide privacy in personalized web search , 2011, J. Syst. Softw..

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  Maria Bras-Amorós,et al.  Optimal configurations for peer-to-peer user-private information retrieval , 2010, Comput. Math. Appl..

[10]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[11]  Susan T. Dumais,et al.  Designing Human-Readable User Profiles for Search Evaluation , 2013, ECIR.

[12]  Micah Adler,et al.  The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.

[13]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[14]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[15]  Joan Feigenbaum,et al.  Private web search , 2007, WPES '07.

[16]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[17]  Yehuda Lindell,et al.  Private Web Search with Malicious Adversaries , 2010, Privacy Enhancing Technologies.

[18]  Balachander Krishnamurthy,et al.  Measuring personalization of web search , 2013, WWW.

[19]  Jordi Castellà-Roca,et al.  Distributed system for private web search with untrusted partners , 2014, Comput. Networks.

[20]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[21]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[22]  Massimo Barbaro,et al.  A Face Is Exposed for AOL Searcher No , 2006 .

[23]  Darko Kirovski,et al.  Towards improving the online shopping experience: A client-based platform for post-processing Web search results , 2012, Web Intell. Agent Syst..

[24]  Srdjan Capkun,et al.  Quantifying Web-Search Privacy , 2014, CCS.

[25]  Jordi Herrera-Joancomartí,et al.  Preserving user's privacy in web search engines , 2009, Comput. Commun..