A Review of Ten Year Research on Query Log Privacy
نویسندگان
چکیده
The research on search log anonymization is ten years old. Over this time, a number of methods to reduce the risks of user identification and disclosure of sensitive information from search log analysis have been proposed. However, the impact of these findings on the behaviour of data owners and publishers has been very limited so far. In this paper, we present a brief overview and a classification of the main approaches in the literature, arguing that there has been a shift towards a more pragmatic balance between the value of the data published and the risk of an adversary breaching the user’s privacy. Then we go on to discuss what are the critical issues that must be tackled before search log anonymization moves out of research laboratories and into operational settings. We also clarify some misconceptions and mistakes in the use of the AOL search query log dataset, which is the main (and virtually only) experimental data source in the field.
منابع مشابه
Analysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)
Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis. Methods: The method of this research is log anal...
متن کاملApplying Epsilon-Differential Private Query Log Releasing Scheme to Document Retrieval
Web search logs are valuable and widely used for improving Information Retrieval (IR) research. However, these query logs contain sensitive data, which makes them difficult to be released directly even for research purposes. More companies can release their query logs if adequate privacy protection can be placed. This workshop paper introduces our research project on this privacy preserving que...
متن کاملDiscovering Popular Clicks\' Pattern of Teen Users for Query Recommendation
Search engines are still the most important gates for information search in internet. In this regard, providing the best response in the shortest time possible to the user's request is still desired. Normally, search engines are designed for adults and few policies have been employed considering teen users. Teen users are more biased in clicking the results list than are adult users. This leads...
متن کاملTowards Privacy-Preserving Query Log Publishing
It’s an open secret that search engines collect detailed query logs, and sometimes release these data to third parties. While making this wealth of information available provides enormous opportunities for information retrieval and web mining research, it also raises serious concerns about the privacy of individuals. We strongly believe that this data should be published to allow researchers to...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016