On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot

@inproceedings{Peddinti2010OnTP,
  title={On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot},
  author={Sai Teja Peddinti and Nitesh Saxena},
  booktitle={Privacy Enhancing Technologies},
  year={2010}
}
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines – of logging and analyzing users’ queries – raises serious privacy concerns. One viable solution to search privacy is query obfuscation, whereby a client-side software attempts to mask real user queries via injection of certain noisy queries. In contrast to other privacy-preserving search mechanisms, query obfuscation does not require server-side… CONTINUE READING
Highly Cited
This paper has 66 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 42 extracted citations

Revealing PIR protocols protected users

2016 Sixth International Conference on Innovative Computing Technology (INTECH) • 2016
View 8 Excerpts
Highly Influenced

Private web search with constant round efficiency

2015 International Conference on Information Systems Security and Privacy (ICISSP) • 2014
View 2 Excerpts
Highly Influenced

Quantifying Web-Search Privacy

ACM Conference on Computer and Communications Security • 2014
View 4 Excerpts
Highly Influenced

Plausible Deniability in Web Search—From Detection to Assessment

IEEE Transactions on Information Forensics and Security • 2018
View 1 Excerpt

Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks

2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) • 2018
View 1 Excerpt

66 Citations

051015'11'13'15'17'19
Citations per Year
Semantic Scholar estimates that this publication has 66 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 16 references

Data Mining: Practical Machine Learning Tools and Techniques

SIGMOD Record • 1999
View 4 Excerpts
Highly Influenced

Clustering for classification

2011 7th International Conference on Information Technology in Asia • 2011
View 2 Excerpts

Random forest

R. Kirkby
Available at http://weka.sourceforge.net/doc/ weka/classifiers/trees/RandomForest.html, Feb • 2010
View 1 Excerpt

Random tree

E. Frank, R. Kirkby
Available at ttp://weka.sourceforge. net/doc/weka/classifiers/trees/RandomTree.html, Feb • 2010
View 1 Excerpt

ZeroR

E. Frank
Available at http://weka.sourceforge.net/doc/weka/ classifiers/rules/ZeroR.html, Feb • 2010
View 1 Excerpt

Noise Injection for Search Privacy Protection

2009 International Conference on Computational Science and Engineering • 2009
View 1 Excerpt

Click: What millions of people are doing online and why it matters

B. Trancer
Hyperion, • 2008
View 1 Excerpt

Marketers Trace Paths Users Leave on Internet TrackMeNot : Resisting Surveillance in Web Search

R. Kumar R. Jones, B. Pang, A. Tomkins
On the Identity Trail : Privacy , Anonymity and Identity in a Networked Society • 2008

Similar Papers

Loading similar papers…