TY - GEN
T1 - A theoretical model for obfuscating web navigation trails
AU - Dankar, Fida Kamal
AU - El Emam, Khaled
PY - 2013
Y1 - 2013
N2 - Information about consumer's web navigation trails are increasingly being collected, analyzed, and used to target them with advertisements. This information can be quite personal, indicating individuals' likes and dislikes, as well as current and long term needs. While the ability to effectively target advertisements helps keep many sites and services on the web available freely, this practice has also raised privacy concerns. These concerns concern multiple factors: lack of transparency by the data aggregators and lack of control by the consumers. One viable approach that individuals can take to regain control is obfuscation, whereby real user requests are masked via the injection of noisy requests. In this paper, we describe a theoretical model and design for a web browser extension that relies on a trusted third party to generate fake HTTP requests (dummies). The dummy requests are generated as k different users' profiles surfing in parallel with the actual user. The value of k can be adjusted by the user to achieve the level of obfuscation they are comfortable with.
AB - Information about consumer's web navigation trails are increasingly being collected, analyzed, and used to target them with advertisements. This information can be quite personal, indicating individuals' likes and dislikes, as well as current and long term needs. While the ability to effectively target advertisements helps keep many sites and services on the web available freely, this practice has also raised privacy concerns. These concerns concern multiple factors: lack of transparency by the data aggregators and lack of control by the consumers. One viable approach that individuals can take to regain control is obfuscation, whereby real user requests are masked via the injection of noisy requests. In this paper, we describe a theoretical model and design for a web browser extension that relies on a trusted third party to generate fake HTTP requests (dummies). The dummy requests are generated as k different users' profiles surfing in parallel with the actual user. The value of k can be adjusted by the user to achieve the level of obfuscation they are comfortable with.
KW - behavioral targeting
KW - obfuscation
KW - private web navigation
KW - web tracking
UR - http://www.scopus.com/inward/record.url?scp=84876806050&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84876806050&partnerID=8YFLogxK
U2 - 10.1145/2457317.2457341
DO - 10.1145/2457317.2457341
M3 - Conference contribution
AN - SCOPUS:84876806050
SN - 9781450315999
T3 - ACM International Conference Proceeding Series
SP - 137
EP - 144
BT - Joint EDBT/ICDT 2013 Workshops - Proceedings
T2 - Joint EDBT/ICDT 2013 Workshops
Y2 - 18 March 2013 through 22 March 2013
ER -