The World Wide Web Conference 2019
DOI: 10.1145/3308558.3313474
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Crowd-Sourcing of Web Searches with Private Data Donor

Abstract: Search engines play an important role on the Web, helping users find relevant resources and answers to their questions. At the same time, search logs can also be of great utility to researchers. For instance, a number of recent research efforts have relied on them to build prediction and inference models, for applications ranging from economics and marketing to public health surveillance. However, companies rarely release search logs, also due to the related privacy issues that ensue, as they are inherently ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 40 publications
(71 reference statements)
0
2
0
Order By: Relevance
“…There is also a body of work that conducts longitudinal studies on deleted web content and their subsequent information leakage [6,57]. The research in this area focuses on data leakage through social media [73,88], blogging services that publish information [83], or aggregation of web data [66]. Cloak, however, focuses on an inference-as-a-service setup where private queries that potentially contain sensitive information are sent to a web-service to run machine learning inference.…”
Section: Web-application Privacymentioning
confidence: 99%
“…There is also a body of work that conducts longitudinal studies on deleted web content and their subsequent information leakage [6,57]. The research in this area focuses on data leakage through social media [73,88], blogging services that publish information [83], or aggregation of web data [66]. Cloak, however, focuses on an inference-as-a-service setup where private queries that potentially contain sensitive information are sent to a web-service to run machine learning inference.…”
Section: Web-application Privacymentioning
confidence: 99%
“…From the technical view, data can be protected by the following two approaches. On one hand, we can rely on secure multiparty computation (SMC) to jointly compute a public function without mutually revealing private inputs by executing cryptographic protocols [8,43,47]. On the other hand, differential privacy (DP) [1,12,18] can be adopted by adding noises to the data, with the purpose of obfuscating the privacy properties and avoiding the user attributes to be inferred [37,51].…”
Section: Related Workmentioning
confidence: 99%