Poshida II, a Multi Group Distributed Peer to Peer Protocol for Private Web Search

Web Search Engines allow the user to retrieve data from the Internet using search query. WSEs maintain search query log to improve the result quality by retrieving personalized search result. WSE are known to sell query log related data to the marketing organizations for boosting revenues, which poses a threat to user privacy. Private web search is a concept in which the user gets data from the Internet through WSE while masking his identity. This work proposes Poshida II, a multi group distributed peer to peer protocol that preserves users privacy. The protocol is simulated using the AOL query log. The experiments are performed while varying number of users in multiple groups. The results are evaluated by measuring profile exposure level. Results show that Poshida II manage to hide user profile by 35% at first degree, 70% at second degree, 83% at third degree and 85% at fourth degree from WSE.

[1]  Josep Maria Mateo-Sanz,et al.  Exploiting social networks to provide privacy in personalized web search , 2011, J. Syst. Softw..

[2]  Josep Domingo-Ferrer,et al.  User-private information retrieval based on a peer-to-peer community , 2009, Data Knowl. Eng..

[3]  Philippe A. Palanque,et al.  Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 2014, International Conference on Human Factors in Computing Systems.

[4]  Alexandre Viejo,et al.  Using social networks to distort users' profiles generated by web search engines , 2010, Comput. Networks.

[5]  Muhammad Arshad Islam,et al.  Revealing PIR protocols protected users , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).

[6]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[7]  Even Flood,et al.  ODP, Open Directory Project , 2005 .

[8]  Josep Maria Mateo-Sanz,et al.  Design of a P2P network that protects users' privacy in front of Web Search Engines , 2015, Comput. Commun..

[9]  Muhammad Arshad Islam,et al.  Poshida, a protocol for private information retrieval , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).

[10]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[11]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[12]  Yehuda Lindell,et al.  Private Web Search with Malicious Adversaries , 2010, Privacy Enhancing Technologies.

[13]  Shumeet Baluja,et al.  A large scale study of wireless search behavior: Google mobile search , 2006, CHI.

[14]  Susan T. Dumais,et al.  Designing Human-Readable User Profiles for Search Evaluation , 2013, ECIR.

[15]  Nitesh Saxena,et al.  On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot , 2010, Privacy Enhancing Technologies.

[16]  Jordi Castellà-Roca,et al.  Distributed system for private web search with untrusted partners , 2014, Comput. Networks.

[17]  Massimo Barbaro,et al.  A Face Is Exposed for AOL Searcher No , 2006 .

[18]  Douglas R. Stinson,et al.  Extended combinatorial constructions for peer-to-peer user-private information retrieval , 2012, Adv. Math. Commun..

[19]  Avi Arampatzis,et al.  Versatile Query Scrambling for Private Web Search , 2015, Information Retrieval Journal.

[20]  Jordi Herrera-Joancomartí,et al.  Preserving user's privacy in web search engines , 2009, Comput. Commun..