메뉴 건너뛰기




Volumn 9, Issue 5, 2012, Pages 641-654

Query profile obfuscation by means of optimal query exchange between users

Author keywords

entropy; information theory; privacy via user collaboration; private information retrieval; Profile obfuscation

Indexed keywords

ENTROPY; INFORMATION THEORY; PROBABILITY DISTRIBUTIONS; QUERY PROCESSING;

EID: 84864742451     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.16     Document Type: Article
Times cited : (36)

References (55)
  • 1
    • 75349103395 scopus 로고    scopus 로고
    • Trustable relays for anonymous communication
    • C. Aguilar-Melchor and Y. Deswarte, "Trustable Relays for Anonymous Communication," Trans. Data Privacy, vol. 2, no. 2, pp. 101-130, 2009.
    • (2009) Trans. Data Privacy , vol.2 , Issue.2 , pp. 101-130
    • Aguilar-Melchor, C.1    Deswarte, Y.2
  • 2
    • 84864746630 scopus 로고    scopus 로고
    • AOL Search Data Scandal, Aug.
    • AOL Search Data Scandal, http://en.wikipedia.org/wiki/AOL-search-data- scandal, Aug. 2006.
    • (2006)
  • 3
    • 33644989680 scopus 로고    scopus 로고
    • Specification of a framework for the anonymous use of privileges
    • Aug.
    • V. Benjumea, J. López, and J.M.T. Linero, "Specification of a Framework for the Anonymous Use of Privileges," Telematics and Informatics, vol. 23, no. 3, pp. 179-195, Aug. 2006.
    • (2006) Telematics and Informatics , vol.23 , Issue.3 , pp. 179-195
    • Benjumea, V.1    López, J.2    Linero, J.M.T.3
  • 6
    • 67650617685 scopus 로고    scopus 로고
    • Preserving user's privacy in web search engines
    • J. Castellà-Roca, A. Viejo, and J. Herrera-Joancomartí, "Preserving User's Privacy in Web Search Engines," Computer Comm., vol. 32, nos. 13/14, pp. 1541-1551, 2009.
    • (2009) Computer Comm. , vol.32 , Issue.13-14 , pp. 1541-1551
    • Castellà-Roca, J.1    Viejo, A.2    Herrera-Joancomartí, J.3
  • 8
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • DOI 10.1145/358549.358563
    • D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Comm. ACM, vol. 24, no. 2, pp. 84-88, 1981. (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum David, L.1
  • 9
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • DOI 10.1145/4372.4373
    • D. Chaum, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm. ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985. (Pubitemid 15587967)
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum David1
  • 11
  • 18
    • 80055001448 scopus 로고    scopus 로고
    • Coprivacy: An introduction to the theory and applications of co-operative privacy
    • J. Domingo-Ferrer, "Coprivacy: An Introduction to the Theory and Applications of Co-Operative Privacy," Special Issue: Privacy in Statistical Databases, vol. 35, pp. 25-40, 2011.
    • (2011) Special Issue: Privacy in Statistical Databases , vol.35 , pp. 25-40
    • Domingo-Ferrer, J.1
  • 19
    • 71749095915 scopus 로고    scopus 로고
    • User-private information retrieval based on a peer-to-peer community
    • J. Domingo-Ferrer, M. Bras-Amoró s, Q. Wu, and J. Manjón, "User-Private Information Retrieval Based on a Peer-to-Peer Community," Data Knowledge Eng., vol. 68, no. 11, pp. 1237-1252, 2009.
    • (2009) Data Knowledge Eng. , vol.68 , Issue.11 , pp. 1237-1252
    • Domingo-Ferrer, J.1    Manjón, J.2
  • 20
    • 80755139576 scopus 로고    scopus 로고
    • Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search
    • J. Domingo-Ferrer and U. González-Nicolá s, "Rational Behavior in Peer-to-Peer Profile Obfuscation for Anonymous Keyword Search," Information Science: An Int'l J., vol. 185, no. 1, pp. 191-204, 2012.
    • (2012) Information Science: An Int'l J. , vol.185 , Issue.1 , pp. 191-204
    • Domingo-Ferrer, J.1    González-Nicolás, U.2
  • 21
    • 70249087299 scopus 로고    scopus 로고
    • Hok+-private information retrieval from privacy-uncooperative queryable databases
    • J. Domingo-Ferrer, A. Solanas, and J. Castellà-Roca, "hok+-Private Information Retrieval from Privacy-uncooperative Queryable Databases," Online Information Rev., vol. 33, no. 4, pp. 720-744, 2009.
    • (2009) Online Information Rev. , vol.33 , Issue.4 , pp. 720-744
    • Domingo-Ferrer, J.1    Solanas, A.2    Castellà-Roca, J.3
  • 22
    • 0035060531 scopus 로고    scopus 로고
    • A formal approach to imperfection in geographic information
    • DOI 10.1016/S0198-9715(00)00040-5, PII S0198971500000405, GISRUK 2000
    • M. Duckham, K. Mason, J. Stell, and M. Worboys, "A Formal Approach to Imperfection in Geographic Information," Computers Environment and Urban Systems, vol. 25, no. 1, pp. 89-103, 2001. (Pubitemid 32337731)
    • (2001) Computers, Environment and Urban Systems , vol.25 , Issue.1 , pp. 89-103
    • Duckham, M.1    Mason, K.2    Stell, J.3    Worboys, M.4
  • 23
    • 24944589228 scopus 로고    scopus 로고
    • Enhancing customer privacy while searching for products and services on the world wide web
    • DOI 10.1108/10662240510615164
    • Y. Elovici, C. Glezer, and B. Shapira, "Enhancing Customer Privacy while Searching for Products and Services on the World Wide Web," Internet Research: Electronic Networking Applications and Policy, vol. 15, no. 4, pp. 378-399, 2005. (Pubitemid 41314574)
    • (2005) Internet Research , vol.15 , Issue.4 , pp. 378-399
    • Elovici, Y.1    Glezer, C.2    Shapira, B.3
  • 27
    • 84864745222 scopus 로고    scopus 로고
    • GoogleSharing
    • GoogleSharing, www.googlesharing.net, 2012.
    • (2012)
  • 29
    • 84864745221 scopus 로고    scopus 로고
    • I2P Anonymous Network
    • I2P Anonymous Network,www.i2p2.de, 2012.
    • (2012)
  • 30
    • 11944275853 scopus 로고
    • Information theory and statistical mechanics ii
    • E.T. Jaynes, "Information Theory and Statistical Mechanics II," Physical Rev., vol. 108, no. 2, pp. 171-190, 1957.
    • (1957) Physical Rev. , vol.108 , Issue.2 , pp. 171-190
    • Jaynes, E.T.1
  • 31
    • 0020187981 scopus 로고
    • On the rationale of maximum-entropy methods
    • Sept.
    • E.T. Jaynes, "On the Rationale of Maximum-Entropy Methods," Proc. IEEE, vol. 70, no. 9, pp. 939-952, Sept. 1982.
    • (1982) Proc.IEEE , vol.70 , Issue.9 , pp. 939-952
    • Jaynes, E.T.1
  • 32
    • 33947121654 scopus 로고    scopus 로고
    • Protection of location privacy using dummies for location-based services
    • Oct.
    • H. Kido, Y. Yanagisawa, and T. Satoh, "Protection of Location Privacy Using Dummies for Location-Based Services," Proc. IEEE Int'l Conf. Data Eng. (ICDE), p. 1248, Oct. 2005.
    • (2005) Proc.IEEE Int'l Conf. Data Eng. (ICDE) , pp. 1248
    • Kido, H.1    Yanagisawa, Y.2    Satoh, T.3
  • 33
    • 8344276595 scopus 로고    scopus 로고
    • Privacy preservation improvement by learning optimal profile generation rate
    • T. Kuflik, B. Shapira, Y. Elovici, and A. Maschiach, "Privacy Preservation Improvement by Learning Optimal Profile Generation Rate," Proc. Ninth Int'l Conf. User Modeling (UM '03), pp. 168-177, 2003. (Pubitemid 36768562)
    • (2003) Lecture notes in computer science , Issue.2702 , pp. 168-177
    • Kuflik, T.1    Shapira, B.2    Elovici, Y.3    Maschiach, A.4
  • 34
    • 58449094834 scopus 로고    scopus 로고
    • A review for trust modelling in ad hoc networks
    • M. Mejía, N. Pena, J.L. Munoz, and O. Esparza, "A Review for Trust Modelling in Ad Hoc Networks," Internet Research, vol. 19, no. 1, pp. 88-104, 2009.
    • (2009) Internet Research , vol.19 , Issue.1 , pp. 88-104
    • Mejía, M.1    Pena, N.2    Munoz, J.L.3    Esparza, O.4
  • 37
    • 0001730497 scopus 로고
    • Non-cooperative games
    • J. Nash, "Non-Cooperative Games," Annals Math., vol. 54, pp. 289-295, 1951.
    • (1951) Annals Math. , vol.54 , pp. 289-295
    • Nash, J.1
  • 43
    • 58449085741 scopus 로고    scopus 로고
    • Collaborative attack on internet users anonymity
    • R. Puzis, D. Yagil, Y. Elovici, and D. Braha, "Collaborative Attack on Internet Users Anonymity," Internet Research, vol. 19, no. 1, pp. 60-77, 2009.
    • (2009) Internet Research , vol.19 , Issue.1 , pp. 60-77
    • Puzis, R.1    Yagil, D.2    Elovici, Y.3    Braha, D.4
  • 44
    • 77955802941 scopus 로고    scopus 로고
    • Optimal query forgery for private information retrieval
    • Sept.
    • D. Rebollo-Monedero and J. Forné, "Optimal Query Forgery for Private Information Retrieval," IEEE Trans. Information Theory, vol. 56, no. 9, pp. 4631-4642, Sept. 2010.
    • (2010) IEEE Trans. Information Theory , vol.56 , Issue.9 , pp. 4631-4642
    • Rebollo-Monedero, D.1    Forné, J.2
  • 45
    • 76049114679 scopus 로고    scopus 로고
    • Private location-based information retrieval through user collaboration
    • D. Rebollo-Monedero, J. Forné, A. Solanas, and T. Martínez-Ballesté, "Private Location-Based Information Retrieval through User Collaboration," Computer Comm., vol. 33, no. 6, pp. 762-774, http://dx.doi.org/10.1016/j.comcom.2009.11.024, 2010.
    • (2010) Computer Comm. , vol.33 , Issue.6 , pp. 762-774
    • Rebollo-Monedero, D.1    Forné, J.2    Solanas, A.3    Martínez- Ballesté, T.4
  • 48
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E. Shannon, "Communication Theory of Secrecy Systems," Bell System Technical J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 52
    • 84864745218 scopus 로고    scopus 로고
    • The Tor Project, Tor: Overview
    • The Tor Project, Tor: Overview, http://torproject.org/overview.html.en, 2011
    • (2011)
  • 53
    • 84864757520 scopus 로고    scopus 로고
    • Torbutton 1.2.5
    • Torbutton 1.2.5, https://addons.mozilla.org/ca/firefox/addon/2275, 2010.
    • (2010)
  • 55
    • 77955660918 scopus 로고    scopus 로고
    • Using social networks to distort users' profiles generated by web search engines
    • A. Viejo and J. Castellà-Roca, "Using Social Networks to Distort Users' Profiles Generated by Web Search Engines," Computer Networks, vol. 54, no. 9, pp. 1343-1357, 2010.
    • (2010) Computer Networks , vol.54 , Issue.9 , pp. 1343-1357
    • Viejo, A.1    Castellà-Roca, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.