Abstract | ||
---|---|---|
In this paper we study the privacy preservation properties of aspecific technique for query log anonymization: token-based hashing. In this approach, each query is tokenized, and then a secure hash function is applied to each token. We show that statistical techniques may be applied to partially compromise the anonymization. We then analyze the specific risks that arise from these partial compromises, focused on revelation of identity from unambiguous names, addresses, and so forth, and the revelation of facts associated with an identity that are deemed to be highly sensitive. Our goal in this work is two fold: to show that token-based hashing is unsuitable for anonymization, and to present a concrete analysis of specific techniques that may be effective in breaching privacy, against which other anonymization schemes should be measured. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1145/1242572.1242657 | WWW |
Keywords | Field | DocType |
aspecific technique,specific technique,privacy preservation property,breaching privacy,anonymization scheme,secure hash function,partial compromise,query log anonymization,specific risk,concrete analysis,privacy,hash function | Data mining,World Wide Web,Computer science,Hash function,Compromise,Security token,Dynamic perfect hashing | Conference |
Citations | PageRank | References |
52 | 4.53 | 22 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ravi Kumar | 1 | 13932 | 1642.48 |
Jasmine Novak | 2 | 2182 | 295.42 |
Bo Pang | 3 | 5795 | 451.00 |
Andrew Tomkins | 4 | 9388 | 1401.23 |