An Effective Clustering Approach to Web Query Log Anonymization

Computer Science – Databases

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

9 pages

Scientific paper

Web query log data contain information useful to research; however, release of such data can re-identify the search engine users issuing the queries. These privacy concerns go far beyond removing explicitly identifying information such as name and address, since non-identifying personal data can be combined with publicly available information to pinpoint to an individual. In this work we model web query logs as unstructured transaction data and present a novel transaction anonymization technique based on clustering and generalization techniques to achieve the k-anonymity privacy. We conduct extensive experiments on the AOL query log data. Our results show that this method results in a higher data utility compared to the state of-the-art transaction anonymization methods.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

An Effective Clustering Approach to Web Query Log Anonymization does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with An Effective Clustering Approach to Web Query Log Anonymization, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and An Effective Clustering Approach to Web Query Log Anonymization will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-514511

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.