Privacy-preserving query log mining for business confidentiality protection

B Poblete, M Spiliopoulou, R Baeza-Yates - … Transactions on the Web  …, 2010 - dl.acm.org
… our work is confidentiality protection for query log publishing and query log mining. Our
task … publication of an anonymized query log. Our study applies to services offered by third-party …

A survey of query log privacy-enhancing techniques from a policy perspective

A Cooper - ACM Transactions on the Web (TWEB), 2008 - dl.acm.org
… This article will explore seven categories of reasons a search engine may want to retain
query logs: improving ranking algorithms, language-based applications, query refinement, …

[PDF][PDF] Safelog: Supporting web search and mining by differentially-private query logs

S Zhang, GH Yang, L Singh, L Xiong - 2016 AAAI Fall Symposium …, 2016 - cdn.aaai.org
… anonymized query logs on the task of web search. We present Safelog, an effective framework
for implementing and evaluating both privacy and utility of an anonymized query log. To …

On the privacy of web search based on query obfuscation: A case study of trackmenot

ST Peddinti, N Saxena - Privacy Enhancing Technologies: 10th …, 2010 - Springer
… in practice against an adversarial search engine. … search privacy tool based on the principle
of query obfuscation. We demonstrate that a search engine, equipped with only a short-term

Mining search and browse logs for web search: A survey

D Jiang, J Pei, H Li - ACM Transactions on Intelligent Systems and …, 2013 - dl.acm.org
… in log mining. After that, we will present an overview of log mining technologies and applications
in Web search … Last, privacy preserving log mining remains a grand challenge. In 2006, …

Publishing search logs—a comparative study of privacy guarantees

M Gotz, A Machanavajjhala, G Wang… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
search logs are a gold mine for … privacy in search log publication. In particular, we show
that, under realistic settings, no differentially private algorithm can produce a sanitized search log

Website privacy preservation for query log publishing

B Poblete, M Spiliopoulou, R Baeza-Yates - … on Privacy, Security, and Trust …, 2007 - Springer
… engine query logs. We introduce a new privacy concern, website privacy as a special case
… on privacy preserving data mining and on query log anonymization for the protection of user …

Issues with privacy preservation in query log mining

R Baeza-Yates, R Jones, B Poblete… - Privacy-aware …, 2010 - api.taylorfrancis.com
… notion of privacy in our context, we characterize query logs and … In Section 14.3 we discuss
the problem of query log privacy … newer privacy-enhancing techniques for query log privacy

User k-anonymity for privacy preserving data mining of query logs

G Navarro-Arribas, V Torra, A Erola… - Information Processing & …, 2012 - Elsevier
query log, while preserving its utility. We provide the evaluation of our proposal in real query
logs, showing the privacy … use of such data in data mining processes based on clustering. …

Quantifying web-search privacy

A Gervais, R Shokri, A Singla, S Capkun… - Proceedings of the 2014 …, 2014 - dl.acm.org
… for quantifying web-search privacy. In Section 3, we present the dataset of web search queries
… respect to their web search, and we extract features from their web queries that reflect the …