Skip to main content

A New Privacy Model for Web Surfing

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2382))

Abstract

Privacy is becoming a serious challenge in computerized environments, especially the Web where many companies constantly attempt to violate the privacy of users. When a user requests a service on the Internet, an eavesdropper can reveal his identity, the WEB site he accesses (end server), the link between them, and infer private information about the user. The computer security community has concentrated on improving user privacy by hiding his identifiable tracks on the WEB, thus assuring his anonymity while surfing. However, users may want or need to identify themselves over the net but still retain their information needs and profile in private. The privacy model suggested in this paper is aimed at preserving users’ privacy while allowing them to identify themselves to various services, and prevents eavesdroppers from using identifiable users’ tracks to construct a user profile. The model is based on the generation of faked transactions in various fields of interest in order to prevent the eavesdropper from accurate derivation of the user profile. The basic idea underlying the model is to confuse the eavesdropper’s automated programs with wrong data. A privacy measure is defined that reflects the degree of confusion a system can cause to the eavesdropper. A prototype system was developed to check the feasibility of the model and to conduct experiments to examine its effectiveness.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brier, S.: How to keep your privacy: Battle lines get clearer. The New York Times, January 13, (1997)

    Google Scholar 

  2. Benassi, P.: TRUSTe: An online privacy seal program. Communication of the ACM, 42(2) (1999) 56–59

    Article  Google Scholar 

  3. Claessens, J., Preneel, B., Vandewalle, J.: Solutions for anonymous communication on the Internet. Proceedings of the 1999 IEEE International Carnahan Conference on Security Technology 487 (1999) 298–303

    Google Scholar 

  4. Frakes, W. B., Baeza-Yates, R. (ed.): Information Retrieval, Data Structures and Algorithms, Pentice Hall, NJ, USA (1992)

    Google Scholar 

  5. Goldschlag, D. M., Reed, M. G., Syverson, P. F.: Hiding Routing Information, Information Hiding, R. Anderson (editor), Springer-Verlag LLNCS 1174 (1996) 137–150

    Google Scholar 

  6. Goldschlag, D. M., Reed, M. G., Syverson, P. F.: Onion Routing for Anonymous and Private Internet Connections, Communications of the ACM 42(2) (1999) 39–41

    Article  Google Scholar 

  7. Grabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: How to Make Personalized Web Browsing Simple, Secure, and Anonymous. Proceedings of Financial Cryptography (1997)

    Google Scholar 

  8. Hanani, U., Shapira, B., Shoval, P.: Information Filtering: Overview of Issues, Research and Systems, User Modeling and User-Adapted Interaction 11 (2001) 203–259

    Article  MATH  Google Scholar 

  9. Konstan, A., Bradley, N. M., Malts, D., Herlocker, J. L., Gordon, L. R. and Riedl, J.: GroupLens:., Applying collaborative filtering to usenet news. Communications of the ACM 40(3) (1997) 77–87

    Article  Google Scholar 

  10. Morita, M., Shinoda, Y.: Information filtering based on user behavior analysis and best match retrieval. Proceedings of the 17th Annual Intl. ACM SIGIR Conference on Research and Development (1994) 272–281

    Google Scholar 

  11. Oard, D.: The State of the Art in Text Filtering, User Modeling and User Adapted Interaction, 7(3) (1997) 141–178

    Article  Google Scholar 

  12. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions, ACM Transactions on Information and System Security, 1(1) (1998) 66–92

    Article  Google Scholar 

  13. Reiter, M.K., Rubin, A.D.: Anonymous Web Transactions with Crowds, Communications of the ACM 42(2) (1999) 66–92

    Article  Google Scholar 

  14. Salton, G., Buckley, C.: Term-Weighting Approaches in Automatic Text Retrieval, Information Processing and Management, 24(5) (1998) 513–523

    Article  Google Scholar 

  15. Salton, G., McGill, W.J. (ed.): Introduction to Modern Information Retrieval. McGraw-Hill. New-York (1983)

    MATH  Google Scholar 

  16. Shapira, B, Shoval, P., Hanani, U.: Experimentation with an Information Filtering System that Combines Cognitive and Sociological Filtering Integrated with User Stereotypes, Journal: Decision Support Systems 27 (1999) 5–24

    Article  Google Scholar 

  17. Shapira B., Hanani U., Raveh A., Shoval P.: Information Filtering: A New Two-Phase Model Using Stereotypic User-Profiling. Journal of Intelligent Information Systems 8 (1997) 155–165

    Article  Google Scholar 

  18. Syverson, P. F., Goldschlag, D. M., Reed, M. G.: Anonymous Connections and Onion Routing, Proceedings of the 18th Annual Symposium on Security and Privacy, IEEE CS Press, Oakland, CA, (1997) 44–54

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Elovici, Y., Shapira, B., Maschiach, A. (2002). A New Privacy Model for Web Surfing. In: Halevy, A., Gal, A. (eds) Next Generation Information Technologies and Systems. NGITS 2002. Lecture Notes in Computer Science, vol 2382. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45431-4_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-45431-4_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43819-9

  • Online ISBN: 978-3-540-45431-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics