Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18 2018
DOI: 10.1145/3178876.3186093
|View full text |Cite
|
Sign up to set email alerts
|

Incognito

Abstract: Users leave a trail of their personal data, interests, and intents while suring or sharing information on the Web. Web data could therefore reveal some private/sensitive information about users based on inference analysis. The possible identiication of information corresponding to a single individual by an inference attack holds true even if the user identiiers are encoded or removed in the Web data. Several works have been done on improving privacy of Web data through obfuscation methods [7,12,18,32]. However… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 32 publications
0
11
0
Order By: Relevance
“…However, such settings may be confusing for novice users, leading them to involuntarily expose themselves to privacy risks. Throughout this paper, we consider Privacy Risk as defined by Masood et al [27]. A user's privacy is at risk when his or her Web data is distinguishable from other users, has little or no diversity, or is linkable to an individual with high confidence based on the user's Personal Identifiable Information (PII).…”
Section: Motivation and Threat Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…However, such settings may be confusing for novice users, leading them to involuntarily expose themselves to privacy risks. Throughout this paper, we consider Privacy Risk as defined by Masood et al [27]. A user's privacy is at risk when his or her Web data is distinguishable from other users, has little or no diversity, or is linkable to an individual with high confidence based on the user's Personal Identifiable Information (PII).…”
Section: Motivation and Threat Modelmentioning
confidence: 99%
“…We collect human judgment regarding the sensitivity of 1080 input texts (randomly collected from Reddit and AOL Search Log) using Amazon Mechanical Turk (AMT) 6 . We select input texts belonging to the following topics: politics, religious affairs, legal problems, healthy lifestyle, pets, smoking, and cancer, as per the studies of Biega et al [5] and Masood et al [27]. These texts are between 7 and 35 words long with an average of 16.3 words.…”
Section: Aquilis Accuracymentioning
confidence: 99%
See 2 more Smart Citations
“…With the above in mind, we then proceed to inspect if suspicious or even potentially malicious third-parties are loaded via these long dependency chains (Section 4). We do not limit this to just traditional malware, but also include third-parties that are known to mishandle user data and risk privacy leaks [5,8,16,41,43,52]. Example threats include the re-identification of users in the anonymised AOL search histories, the Netflix training data that was attacked, and the Massachusetts hospital discharge data [16,43,52].…”
Section: Introductionmentioning
confidence: 99%