A New Privacy Model for Web Surfing

Privacy is becoming a serious challenge in computerized environments, especially the Web where many companies constantly attempt to violate the privacy of users. When a user requests a service on the Internet, an eavesdropper can reveal his identity, the WEB site he accesses (end server), the link between them, and infer private information about the user. The computer security community has concentrated on improving user privacy by hiding his identifiable tracks on the WEB, thus assuring his anonymity while surfing. However, users may want or need to identify themselves over the net but still retain their information needs and profile in private. The privacy model suggested in this paper is aimed at preserving users' privacy while allowing them to identify themselves to various services, and prevents eavesdroppers from using identifiable users' tracks to construct a user profile. The model is based on the generation of faked transactions in various fields of interest in order to prevent the eavesdropper from accurate derivation of the user profile. The basic idea underlying the model is to confuse the eavesdropper's automated programs with wrong data. A privacy measure is defined that reflects the degree of confusion a system can cause to the eavesdropper. A prototype system was developed to check the feasibility of the model and to conduct experiments to examine its effectiveness.

[1]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[2]  Douglas W. Oard,et al.  The State of the Art in Text Filtering , 1997, User Modeling and User-Adapted Interaction.

[3]  Joos Vandewalle,et al.  Solutions for anonymous communication on the Internet , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[4]  Peretz Shoval,et al.  Information Filtering: Overview of Issues, Research and Systems , 2001, User Modeling and User-Adapted Interaction.

[5]  Paola Benassi,et al.  TRUSTe: an online privacy seal program , 1999, CACM.

[6]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[7]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[8]  Paul Syverson,et al.  Onion Routing for Anonymous and Private Internet Connections , 1999 .

[9]  Michael McGill,et al.  Introduction to Modern Information Retrieval , 1983 .

[10]  Yoichi Shinoda,et al.  Information filtering based on user behavior analysis and best match text retrieval , 1994, SIGIR '94.

[11]  Peretz Shoval,et al.  Experimentation with an information filtering system that combines cognitive and sociological filtering integrated with user stereotypes , 1999, Decis. Support Syst..

[12]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[13]  Ricardo Baeza-Yates,et al.  Information Retrieval: Data Structures and Algorithms , 1992 .

[14]  Peretz Shoval,et al.  Information Filtering: A New Two-Phase Model Using Stereotypic User Profiling , 2004, Journal of Intelligent Information Systems.

[15]  Paul F. Syverson,et al.  Hiding Routing Information , 1996, Information Hiding.

[16]  Yossi Matias,et al.  How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.

[17]  Bradley N. Miller,et al.  GroupLens: applying collaborative filtering to Usenet news , 1997, CACM.

[18]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.