Skip to main content

Publishing search logs - A comparative study of privacy guarantees

Publication ,  Journal Article
Gotz, M; MacHanavajjhala, A; Wang, G; Xiao, X; Gehrke, J
Published in: IEEE Transactions on Knowledge and Data Engineering
February 6, 2012

Search engine companies collect the database of intentions, the histories of their users' search queries. These search logs are a gold mine for researchers. Search engine companies, however, are wary of publishing search logs in order not to disclose sensitive information. In this paper, we analyze algorithms for publishing frequent keywords, queries, and clicks of a search log. We first show how methods that achieve variants of k-anonymity are vulnerable to active attacks. We then demonstrate that the stronger guarantee ensured by -differential privacy unfortunately does not provide any utility for this problem. We then propose an algorithm ZEALOUS and show how to set its parameters to achieve (ε,δ )-probabilistic privacy. We also contrast our analysis of ZEALOUS with an analysis by Korolova et al. [17] that achieves (ε′,δ′)-indistinguishability. Our paper concludes with a large experimental study using real applications where we compare ZEALOUS and previous work that achieves k-anonymity in search log publishing. Our results show that ZEALOUS yields comparable utility to k-anonymity while at the same time achieving much stronger privacy guarantees. © 2006 IEEE.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

IEEE Transactions on Knowledge and Data Engineering

DOI

ISSN

1041-4347

Publication Date

February 6, 2012

Volume

24

Issue

3

Start / End Page

520 / 532

Related Subject Headings

  • Information Systems
  • 46 Information and computing sciences
  • 08 Information and Computing Sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Gotz, M., MacHanavajjhala, A., Wang, G., Xiao, X., & Gehrke, J. (2012). Publishing search logs - A comparative study of privacy guarantees. IEEE Transactions on Knowledge and Data Engineering, 24(3), 520–532. https://doi.org/10.1109/TKDE.2011.26
Gotz, M., A. MacHanavajjhala, G. Wang, X. Xiao, and J. Gehrke. “Publishing search logs - A comparative study of privacy guarantees.” IEEE Transactions on Knowledge and Data Engineering 24, no. 3 (February 6, 2012): 520–32. https://doi.org/10.1109/TKDE.2011.26.
Gotz M, MacHanavajjhala A, Wang G, Xiao X, Gehrke J. Publishing search logs - A comparative study of privacy guarantees. IEEE Transactions on Knowledge and Data Engineering. 2012 Feb 6;24(3):520–32.
Gotz, M., et al. “Publishing search logs - A comparative study of privacy guarantees.” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 3, Feb. 2012, pp. 520–32. Scopus, doi:10.1109/TKDE.2011.26.
Gotz M, MacHanavajjhala A, Wang G, Xiao X, Gehrke J. Publishing search logs - A comparative study of privacy guarantees. IEEE Transactions on Knowledge and Data Engineering. 2012 Feb 6;24(3):520–532.

Published In

IEEE Transactions on Knowledge and Data Engineering

DOI

ISSN

1041-4347

Publication Date

February 6, 2012

Volume

24

Issue

3

Start / End Page

520 / 532

Related Subject Headings

  • Information Systems
  • 46 Information and computing sciences
  • 08 Information and Computing Sciences