A survey of query log privacy-enhancing techniques from a policy perspective
Author(s) -
A. Feder Cooper
Publication year - 2008
Publication title -
acm transactions on the web
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.438
H-Index - 44
eISSN - 1559-114X
pISSN - 1559-1131
DOI - 10.1145/1409220.1409222
Subject(s) - computer science , web search query , query expansion , variety (cybernetics) , web query classification , perspective (graphical) , query optimization , the internet , query language , sargable , information retrieval , control (management) , search engine , world wide web , artificial intelligence
As popular search engines face the sometimes conflicting interests of protecting privacy while retaining query logs for a variety of uses, numerous technical measures have been suggested to both enhance privacy and preserve at least a portion of the utility of query logs. This article seeks to assess seven of these techniques against three sets of criteria: (1) how well the technique protects privacy, (2) how well the technique preserves the utility of the query logs, and (3) how well the technique might be implemented as a user control. A user control is defined as a mechanism that allows individual Internet users to choose to have the technique applied to their own query logs.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom