Computer Science – Databases
Scientific paper
2010-12-03
Proc. 2010 International Conference on Security and Cryptography (SECRYPT'10), July 2010, Athens, Greece
Computer Science
Databases
9 pages
Scientific paper
Web query log data contain information useful to research; however, release of such data can re-identify the search engine users issuing the queries. These privacy concerns go far beyond removing explicitly identifying information such as name and address, since non-identifying personal data can be combined with publicly available information to pinpoint to an individual. In this work we model web query logs as unstructured transaction data and present a novel transaction anonymization technique based on clustering and generalization techniques to achieve the k-anonymity privacy. We conduct extensive experiments on the AOL query log data. Our results show that this method results in a higher data utility compared to the state of-the-art transaction anonymization methods.
Fard Amin Milani
Wang Ke
No associations
LandOfFree
An Effective Clustering Approach to Web Query Log Anonymization does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with An Effective Clustering Approach to Web Query Log Anonymization, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and An Effective Clustering Approach to Web Query Log Anonymization will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-514511