Skip to main content

An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval

  • Conference paper
Security Technology (SecTech 2011)

Abstract

In previous work, we presented a novel information-theoretic privacy criterion for query forgery in the domain of information retrieval. Our criterion measured privacy risk as a divergence between the user’s and the population’s query distribution, and contemplated the entropy of the user’s distribution as a particular case. In this work, we make a twofold contribution. First, we thoroughly interpret and justify the privacy metric proposed in our previous work, elaborating on the intimate connection between the celebrated method of entropy maximization and the use of entropies and divergences as measures of privacy. Secondly, we attempt to bridge the gap between the privacy and the information-theoretic communities by substantially adapting some technicalities of our original work to reach a wider audience, not intimately familiar with information theory and the method of types.

This work was partly supported by the Spanish Government through projects Consolider Ingenio 2010 CSD2007-00004 “ARES”, TEC2010-20572-C02-02 “Consequence” and by the Government of Catalonia under grant 2009 SGR 1362. D. Rebollo-Monedero is the recipient of a Juan de la Cierva postdoctoral fellowship, JCI-2009-05259, from the Spanish Ministry of Science and Innovation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fallows, D.: Search engine users, Pew Internet and Amer. Life Project, Res. Rep. (January 2005)

    Google Scholar 

  2. Rebollo-Monedero, D., Forné, J.: Optimal query forgery for private information retrieval. IEEE Trans. Inform. Theory 56(9), 4631–4642 (2010)

    Article  MathSciNet  Google Scholar 

  3. Mokbel, M.F., Chow, C., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: Proc. Int. Conf. Very Large Databases, Seoul, Korea, pp. 763–774 (2006)

    Google Scholar 

  4. Duckham, M., Mason, K., Stell, J., Worboys, M.: A formal approach to imperfection in geographic information. Elsevier Comput., Environ., Urban Syst. 25(1), 89–103 (2001)

    Article  Google Scholar 

  5. Rebollo-Monedero, D., Forné, J., Subirats, L., Solanas, A., Martínez-Ballesté, A.: A collaborative protocol for private retrieval of location-based information. In: Proc. IADIS Int. Conf. e-Society, Barcelona, Spain (February 2009)

    Google Scholar 

  6. Rebollo-Monedero, D., Forné, J., Solanas, A., Martínez-Ballesté, T.: Private location-based information retrieval through user collaboration. Elsevier Comput. Commun. 33(6), 762–774 (2010), http://dx.doi.org/10.1016/j.comcom.2009.11.024

    Article  Google Scholar 

  7. Elovici, Y., Shapira, B., Maschiach, A.: A new privacy model for hiding group interests while accessing the web. In: Proc. ACM Workshop on Privacy in the Electron. Society, pp. 63–70. ACM, Washington, DC (2002)

    Chapter  Google Scholar 

  8. Shapira, B., Elovici, Y., Meshiach, A., Kuflik, T.: PRAW – The model for PRivAte Web. J. Amer. Soc. Inform. Sci., Technol. 56(2), 159–172 (2005)

    Article  Google Scholar 

  9. Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-Anonymity and its enforcement through generalization and suppression. SRI Int., Tech. Rep (1998)

    Google Scholar 

  10. Sun, X., Wang, H., Li, J., Truta, T.M.: Enhanced p-sensitive k-anonymity models for privacy preserving data publishing. Trans. Data Privacy 1(2), 53–66 (2008)

    MathSciNet  Google Scholar 

  11. Truta, T.M., Vinay, B.: Privacy protection: p-sensitive k-anonymity property. In: Proc. Int. Workshop Privacy Data Manage (PDM), Atlanta, GA, p. 94 (2006)

    Google Scholar 

  12. Machanavajjhala, A., Gehrke, J., Kiefer, D., Venkitasubramanian, M.: l-Diversity: Privacy beyond k-anonymity. In: Proc. IEEE Int. Conf. Data Eng (ICDE), Atlanta, GA, p. 24 (April 2006)

    Google Scholar 

  13. Jian-min, H., Ting-ting, C., Hui-qun, Y.: An improved V-MDAV algorithm for l-diversity. In: Proc. IEEE Int. Symp. Inform. Processing (ISIP), Moscow, Russia, pp. 733–739 (May 2008)

    Google Scholar 

  14. Domingo-Ferrer, J., Torra, V.: A critique of k-anonymity and some of its enhancements. In: Proc. Workshop Privacy, Security, Artif. Intell. (PSAI), Barcelona, Spain, pp. 990–993 (2008)

    Google Scholar 

  15. Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy beyond k-anonymity and l-diversity. In: Proc. IEEE Int. Conf. Data Eng (ICDE), Istanbul, Turkey, pp. 106–115 (April 2007)

    Google Scholar 

  16. Rebollo-Monedero, D., Forné, J., Domingo-Ferrer, J.: From t-Closeness to PRAM and Noise Addition Via Information Theory. In: Domingo-Ferrer, J., Saygın, Y. (eds.) PSD 2008. LNCS, vol. 5262, pp. 100–112. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  17. Rebollo-Monedero, D., Forné, J., Domingo-Ferrer, J.: From t-closeness-like privacy to postrandomization via information theory. IEEE Trans. Knowl. Data Eng. 22(11), 1623–1636 (2010), http://doi.ieeecomputersociety.org/10.1109/TKDE.2009.190

    Article  Google Scholar 

  18. Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards Measuring Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54–68. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  19. Díaz, C.: Anonymity and privacy in electronic services. Ph.D. dissertation, Katholieke Univ. Leuven (December 2005)

    Google Scholar 

  20. Parra-Arnau, J., Rebollo-Monedero, D., Forné, J.: A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression. In: Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. LNCS, vol. 6264, pp. 58–68. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  21. Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley, New York (2006)

    MATH  Google Scholar 

  22. Jaynes, E.T.: On the rationale of maximum-entropy methods. Proc. IEEE 70(9), 939–952 (1982)

    Article  Google Scholar 

  23. Brillouin, L.: Science and Information Theory. Academic-Press, New York (1962)

    MATH  Google Scholar 

  24. Jaynes, E.T.: Papers on Probability, Statistics and Statistical Physics. Reidel, Dordrecht (1982)

    MATH  Google Scholar 

  25. Burg, J.P.: Maximum entropy spectral analysis. Ph.D. dissertation, Stanford Univ. (1975)

    Google Scholar 

  26. Berger, A.L., Della Pietra, J., Della Pietra, A.: A maximum entropy approach to natural language processing. MIT Comput. Ling. 22(1), 39–71 (1996)

    Google Scholar 

  27. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst., Tech. J. (1949)

    Google Scholar 

  28. Wyner, A.: The wiretap channel. Bell Syst., Tech. J. 54 (1975)

    Google Scholar 

  29. Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 24, 339–348 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  30. Jaynes, E.T.: Information theory and statistical mechanics II. Phys. Review Ser. II 108(2), 171–190 (1957)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rebollo-Monedero, D., Parra-Arnau, J., Forné, J. (2011). An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval. In: Kim, Th., Adeli, H., Fang, Wc., Villalba, J.G., Arnett, K.P., Khan, M.K. (eds) Security Technology. SecTech 2011. Communications in Computer and Information Science, vol 259. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27189-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27189-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27188-5

  • Online ISBN: 978-3-642-27189-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics