Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search

نویسندگان

  • Josep Domingo-Ferrer
  • Úrsula González-Nicolás
چکیده

User profiling in web search has the advantage of enabling personalized web search: the quality of the results offered by the search engine to the user is increased by taking the user’s interests into account when presenting those results. The negative side is that the interests and the query history of users may contain information considered as private; hence, technology should be provided for users to avoid profiling if they wish so. There are several anti-profiling approaches in web search, from basic level countermeasures to private information retrieval and including profile obfuscation. Except private information retrieval (PIR), which hides the retrieved item from the database, the rest of approaches focus on anonymizing the user’s identity and fall into the category of anonymous keyword search (also named sometimes user-private information retrieval). Most current PIR protocols are ill-suited to provide PIR from a search engine or large database, due to their complexity and their assumption that the database actively cooperates in the PIR protocol. Peerto-peer profile obfuscation protocols appear as a competitive option provided that peers are rationally interested in helping each other. We present a game-theoretic analysis of P2P profile obfuscation protocols which shows under which conditions helping each other is in the peers’ rational interest.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search: The multi-hop scenario

Web search engines (WSEs) have become an essential tool for searching the huge amount of information stored in the World Wide Web. WSEs try to build query profiles of their users, in order to increase the accuracy of the results provided to users and also to fine-tune advertising. Profiling the query interests of users clearly encroaches on their privacy. There are several anti-profiling approa...

متن کامل

Herding Behavior in Online Microloan Markets: Evidence from China

Lenders’ herding behavior in the peer-to-peer (P2P) lending platform in China is examined. Based on the data from PPdai.com, the largest online P2P lending market in China, we found that herding behavior is salient in P2P lending market in China, and such herding is associated with higher default rate. Keyword: Rational herding, information cascade, peer-to-peer online lending

متن کامل

An Evaluation and Comparison of Current Peer-to-Peer Full-Text Keyword Search Techniques

Current peer-to-peer (p2p) full-text keyword search techniques fall into the following categories: document-based partitioning, keyword-based partitioning, hybrid indexing, and semantic search. This paper provides a performance evaluation and comparison of these p2p full-text keyword search techniques on a dataset with 3.7 million web pages and 6.8 million search queries. Our evaluation results...

متن کامل

Peer-to-Peer Keyword Search Using Keyword Relationship

Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for Internet-scale information retrieval and search systems because they require neither any centralized directory nor any centralized management of overlay network topology and data placement. However, due to this decentralized architecture, current P2P keyword search systems lack useful global knowledge...

متن کامل

Distributed Suffix Tree for Peer-to-Peer Search

Establishing an appropriate semantic overlay on Peer-to-Peer networks to obtain both semantic ability and scalability is a challenge. Current DHT-based P2P networks are limited in their ability to support semantic search. This paper proposes the DST (Distributed Suffix Tree) overlay as the intermediate layer between the DHT overlay and the semantic overlay. The DST overlay supports search of ke...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Sci.

دوره 185  شماره 

صفحات  -

تاریخ انتشار 2012