Abstract
Web search engines are tools employed to find specific information in the Internet. However, they also represent a threat for the privacy of their users. This happens because the web search engines store and analyze the personal information that the users reveal in their queries. In order to avoid this privacy threat, it is necessary to provide mechanisms that protect the users of these tools.
In this paper, we propose a multi-party protocol that protects the privacy of the user not only in front of the web search engine, but also in front of dishonest internal users. Our scheme outperforms similar proposals in terms of computation and communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Google Privacy Center (2011), http://www.google.com/privacy
Conti, G., Sobiesk, E.: An honest man has nothing to fear: user perceptions on web-based information disclosure. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 112–121 (2007)
Barbaro, M., Zeller, T.: A Face is Exposed for AOL Searcher No. 4417749. New York Times (August 2006)
Hafner, K., Richtel, M.: Google Resists U.S. Subpoena of Search Data. New York Times (January 2006)
Ostrovsky, R., Skeith III, W.E.: A Survey of Single-Database Private Information Retrieval: Techniques and Applications. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 393–411. Springer, Heidelberg (2007)
Scroogle (2011), http://scroogle.org
Anonymizer (2011), http://www.anonymizer.com
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, p. 21 (2004)
Saint-Jean, F., Johnson, A., Boneh, D., Feigenbaum, J.: Private Web Search. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society – WPES 2007, pp. 84–90 (2007)
Domingo-Ferrer, J., Solanas, A., Castellà-Roca, J.: h(k)-private information retrieval from privacy-uncooperative queryable databases. Journal of Online Information Review 33(4), 720–744 (2009)
TrackMeNot (2011), http://mrl.nyu.edu/dhowe/trackmenot
Chow, R., Golle, P.: Faking contextual data for fun, profit, and privacy. In: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society – WPES 2009, pp. 105–108 (2009)
Peddinti, S.T., Saxena, N.: On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 19–37. Springer, Heidelberg (2010)
Castellà-Roca, J., Viejo, A., Herrera-Joancomartí, J.: Preserving user’s privacy in web search engines. Computer Communications 32(13-14), 1541–1551 (2009)
Lindell, Y., Waisbard, E.: Private Web Search with Malicious Adversaries. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 220–235. Springer, Heidelberg (2010)
Reiter, M., Rubin, A.: Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)
Viejo, A., Castellà-Roca, J.: Using social networks to distort users’ profiles generated by web search engines. Computer Networks 54(9), 1343–1357 (2010)
Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31, 469–472 (1985)
Chaum, D., Pedersen, T.P.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993)
Abe, M.: Mix-Networks on Permutation Networks. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 258–273. Springer, Heidelberg (1999)
Waksman, A.: A Permutation Network. Journal of the ACM 15(1), 159–163 (1968)
Opferman, D., Tsao-Wu, N.: On A class of Rearrangeable Switching Networks. Bell Systems Technical Journal 50(5), 1579–1618 (1971)
Soo, W.H., Samsudin, A., Goh, A.: Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 446–458. Springer, Heidelberg (2002)
Jakobsson, M., Juels, A.: Millimix: mixing in small batches. DIMACS Technical report 99-33 (1999)
Schnorr, C.P.: Efficient Signature Generation by Smart Cards. Journal of Cryptology 4, 161–174 (1991)
Recommendation for Key Management, Special Publication 800–57 Part 1, NIST (2007)
Kamvar, M., Baluja, S.: A large scale study of wireless search behavior: Google mobile search. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 701–709 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Romero-Tris, C., Castellà-Roca, J., Viejo, A. (2012). Multi-party Private Web Search with Untrusted Partners. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds) Security and Privacy in Communication Networks. SecureComm 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 96. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31909-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-31909-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31908-2
Online ISBN: 978-3-642-31909-9
eBook Packages: Computer ScienceComputer Science (R0)