Abstract

The overturning of the Internet Privacy Rules by the Federal Communications Commissions (FCC) in late March 2017 allows Internet Service Providers (ISPs) to collect, share and sell their customers' Web browsing data without their consent. With third-party trackers embedded on Web pages, this new rule has put user privacy under more risk. The need arises for users on their own to protect their Web browsing history from any potential adversaries. Although some available solutions such as Tor, VPN, and HTTPS can help users conceal their online activities, their use can also significantly hamper personalized online services, i.e., degraded utility. In this paper, we design an effective Web browsing history anonymization scheme, PBooster, aiming to protect users' privacy while retaining the utility of their Web browsing history. The proposed model pollutes users' Web browsing history by automatically inferring how many and what links should be added to the history while addressing the utility-privacy trade-off challenge. We conduct experiments to validate the quality of the manipulated Web browsing history and examine the robustness of the proposed approach for user privacy protection.

Original languageEnglish (US)
Title of host publicationWSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining
PublisherAssociation for Computing Machinery, Inc
Pages213-221
Number of pages9
ISBN (Electronic)9781450359405
DOIs
StatePublished - Jan 30 2019
Event12th ACM International Conference on Web Search and Data Mining, WSDM 2019 - Melbourne, Australia
Duration: Feb 11 2019Feb 15 2019

Publication series

NameWSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining

Conference

Conference12th ACM International Conference on Web Search and Data Mining, WSDM 2019
Country/TerritoryAustralia
CityMelbourne
Period2/11/192/15/19

Keywords

  • Privacy
  • Trade-off
  • Utility
  • Web browsing history anonymization

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Protecting user privacy: An approach for untraceable web browsing history and unambiguous user profiles'. Together they form a unique fingerprint.

Cite this