skip to main content
10.1145/1314333.1314351acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Private web search

Published:29 October 2007Publication History

ABSTRACT

Web search is currently a source of growing concern about personal privacy. It is an essential and central part of most users' activity online and therefore one through which a significant amount of personal information may be revealed.To help users protect their privacy, we have designed and implemented Private WebSearch (PWS), a usable client-side tool that minimizes the information that users reveal to a search engine. Our tool protects users against attacks that involve active components and timing information, to which more general Web-browsing privacy tools (including the combination of FoxTor and Privoxy) are vulnerable. PWS is a Firefox plugin that functions as an HTTP proxy and as a client for the Tor anonymity network. It configures Firefox so that search queries executed from the PWS search box are routed through the HTTP proxy and Tor client, filtering potentially sensitive or identifying components of the request and response.

References

  1. Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith, and Hoeteck Wee. Toward privacy in public databases. In Proceedings of the 2nd Theory of Cryptography Conference, pages 363¿-385, February 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. Private information retrieval. In Proceedings of the 36th IEEE Symposium on Foundations of Computer Science, pages 41¿-50, October 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, August 2004. http://tor.eff.org/tor-design.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Eff. http://www.eff.org/Privacy/AOL/.Google ScholarGoogle Scholar
  5. Alexandre Evfimievski, Johannes Gehrke, and Ramakrishnan Srikant. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the 22nd ACM Symposium on Principles of Database Systems, pages 211-¿222, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Edward Felten and Michael Schneider. Timing attacks on web privacy. In Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 25¿-32, November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Foxtor. http://cups.cs.cmu.edu/foxtor/.Google ScholarGoogle Scholar
  8. William Gasarch. A survey on private information retrieval, 2004.Google ScholarGoogle Scholar
  9. Google. http://www.google.com/.Google ScholarGoogle Scholar
  10. Collin Jackson, Andrew Bortz, Dan Boneh, and John C. Mitchell. Protecting browser state from web privacy attacks. In Proceedings of the 15th International Conference on the World Wide Web, pages 737¿-744, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jap. http://anon.inf.tu-dresden.de/index_en.html.Google ScholarGoogle Scholar
  12. Eyal Kushilevitz and Rafail Ostrovsky. Replication is NOT needed: SINGLE database, computationally-private information retrieval. In Proceedings of the 38th IEEE Symposium on Foundations of Computer Science, pages 364-¿373, October 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In Proceedings of the 22nd IEEE International Conference on Data Engineering, page 24, April 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. p0f. http://lcamtuf.coredump.cx/p0f/README.Google ScholarGoogle Scholar
  15. Privoxy. http://www.privoxy.org.Google ScholarGoogle Scholar
  16. Vibhor Rastogi, Dan Suciu, and Sungho Hong. The boundary between privacy and utility in data anonymization, 2006. http://www.citebase.org/abstract?id=oai:arXiv.org:cs/0612103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4):482¿-494, May 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, Palo Alto, CA, 1998.Google ScholarGoogle Scholar
  19. Simile. http://simile.mit.edu/java-firefox-extension/.Google ScholarGoogle Scholar
  20. Tor. http://tor.eff.org.Google ScholarGoogle Scholar
  21. Torbutton. http://freehaven.net/~squires/torbutton/.Google ScholarGoogle Scholar
  22. Trackmenot. http://mrl.nyu.edu/~dhowe/TrackMeNot/.Google ScholarGoogle Scholar
  23. V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. ACM SIGMOD Record, 3(1):50¿-57, March 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Private web search

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic society
        October 2007
        116 pages
        ISBN:9781595938831
        DOI:10.1145/1314333
        • General Chair:
        • Peng Ning,
        • Program Chair:
        • Ting Yu

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 October 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate106of355submissions,30%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader