Abstract
Personalised social search is a promising avenue to increase the relevance of search engine results by making use of recommendations made by friends in a social network. More generally a whole class of systems take user preferences, aggregate and process them, before providing a view of the result to others in a social network. Yet, those systems present privacy risks, and could be used by spammers to propagate their malicious preferences. We present a general framework to preserve privacy while maximizing the benefit of sharing information in a social network, as well as a concrete proposal making use of cohesive social group concepts from social network analysis. We show that privacy can be guaranteed in a k-anonymity manner, and disruption through spam is kept to a minimum in a real world social network.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Acquisti, A., Gross, R.: Imagined communities: Awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36–58. Springer, Heidelberg (2006)
Byun, J.-W., Kamra, A., Bertino, E., Li, N.: Efficient k-anonymization using clustering techniques. In: Kotagiri, R., Radha Krishna, P., Mohania, M. K., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 188–200. Springer, Heidelberg (2007)
Castro, M., Druschel, P., Ganesh, A.J., Rowstron, A.I.T., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: OSDI (2002)
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: -Anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Advances in Information Security, vol. 33, pp. 323–353. Springer, Heidelberg (2007)
Danezis, G.: Inferring privacy policies for social networking services. In: Balfanz, D., Staddon, J. (eds.) AISec, pp. 5–10. ACM, New York (2009)
Danezis, G., Lesniewski-Laas, C., Frans Kaashoek, M., Anderson, R.J.: Sybil-resistant dht routing. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 305–318. Springer, Heidelberg (2005)
Danezis, G., Mittal, P.: Sybilinfer: Detecting sybil nodes using social networks. In: NDSS. The Internet Society (2009)
Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Fridrich, J. J. (ed.) IH 2004. LNCS, vol. 3200, pp. 293–308. Springer, Heidelberg (2004)
Danezis, G., Troncoso, C.: Vida: How to use bayesian inference to de-anonymize persistent communications. In: Goldberg, I., Atallah, M.J. (eds.) Privacy Enhancing Technologies. LNCS, vol. 5672, pp. 56–72. Springer, Heidelberg (2009)
Davis, W.: Facebook hit with privacy complaint. The Online Media Post, June 2 (2008)
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, Syverson (eds.) [12], pp. 54–68
Dingledine, R., Syverson, P.F. (eds.): PET 2002. LNCS, vol. 2482. Springer, Heidelberg (2003)
Douceur, J.R.: The sybil attack. In: Druschel, P., Frans Kaashoek, M., Rowstron, A.I.T. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)
Evans, B.M., Chi, E.H.: Towards a model of understanding social search. In: CSCW 2008: Proceedings of the 2008 ACM conference on Computer supported cooperative work, pp. 485–494. ACM, New York (2008)
Horling, B., Kulick, M.: Personalized search for everyone. The Official Google Blog, December 4 (2009)
Kesdogan, D., Agrawal, D., Pham, D.V., Rautenbach, D.: Fundamental limits on the anonymity provided by the mix technique. In: IEEE Symposium on Security and Privacy, pp. 86–99. IEEE Computer Society, Los Alamitos (2006)
Kiciman, E., Wang, C.-K., Chen, S., Mertsalov, K.: U rank (2008) Project web-page, http://research.microsoft.com/en-us/projects/urank/
Levien, R.: Attack resistant trust metrics (2003) Draft Available at, http://www.levien.com/thesis/compact.pdf
Mislove, A., Gummadi, K.P., Druschel, P.: Exploiting social networks for internet search. In: Proceedings of the 5th ACM Workshop on Hot Topics in Networks (HotNets), Irvine, CA, November 2006, ACM, New York (2006)
Olson, J.S., Grudin, J., Horvitz, E.: A study of preferences for sharing and privacy. In: van der Veer, G.C., Gale, C. (eds.) CHI Extended Abstracts, pp. 1985–1988. ACM, New York (2005)
Pacioli, L.: Summa de arithmetica, geometrica, proportioni et proportionalita. Manuscript circulated in Venice (1494)
Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: PODS, p. 188. ACM Press, New York (1998)
Scott, J.: Social network analysis. Sociology 22(1), 109 (1988)
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, Syverson (eds.) [12], pp. 41–53
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Sherman, C.: Yahoo bolsters personal search. Search Engine Watch Blog, April 26 (2005)
Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen ciphertext attack. J. Cryptology 15(2), 75–96 (2002)
Sullivan, D.: Eurekster launches personalized social search. Search Engine Watch Blog, January 21 (2004)
Sullivan, D.: Google relaunches personal search - this time, it really is personal. Search Engine Watch Blog, June 28 (2005)
Wasserman, S., Faust, K.: Social network analysis: Methods and applications. Cambridge Univ. Pr., Cambridge (1994)
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: IEEE Symposium on Security and Privacy, pp. 3–17. IEEE Computer Society, Los Alamitos (2008)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Rizzo, L., Anderson, T.E., McKeown, N. (eds.) SIGCOMM, pp. 267–278. ACM, New York (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Danezis, G., Aura, T., Chen, S., Kıcıman, E. (2010). How to Share Your Favourite Search Results while Preserving Privacy and Quality. In: Atallah, M.J., Hopper, N.J. (eds) Privacy Enhancing Technologies. PETS 2010. Lecture Notes in Computer Science, vol 6205. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14527-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-14527-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14526-1
Online ISBN: 978-3-642-14527-8
eBook Packages: Computer ScienceComputer Science (R0)