Dr. Silvia Puglisi - me@hiro7.eu
In the early age of the Internet users enjoyed a large level of anonymity.
Users can't be anonymous online without a certain investment in time/skills/money.
Traditional
Modern
Traditional
Trade-off between system utility and user privacy.
Classify privacy threats in social applications.
Mitigation possibilities.
T.M.Cover and J.A. Thomas. Elements of Information Theory. Wiley,New York, second edition, 2006.
Edwin T. Jaynes. On the rationale of maximum-entropy methods. Proceedings of the IEEE, 70(9):939–952, 1982.
JavierParra-Arnau, David Rebollo-Monedero, and Jordi Forne. Measuring the privacy of user profiles in personalized information systems. Future Generation Computer Systems, 33:53–63, 2014.
the Kullback–Leibler divergence is a measure of discrepancy between two probability distributions
Tracking networks follow users' browsing habits while they surf the web.
The objective is collecting users' traces and surfing patterns.
These data constitute what is called the user's online footprint.
Partial user profile - what the tracker sees
Ad profile - what the tracker uses
Users are connected to tracking networks through the pages they visit.
Tracker were categorised according to the average degree of the neighbourhood of each node.
Tracker domain | avg k |
---|---|
tacoda.at.atwola.com | 180 |
bcp.crwdcntrl.net | 180 |
match.prod.bidr.io | 180 |
glitter.services.disquis.com | 180 |
ad.afy11.net | 180 |
idsync.lcdn.com | 180 |
mpp.vindicosuite.com | 180 |
aka-cdn-ns.adtechus.com | 180 |
client6.google.com |
180 |
i.simpli.fi |
180 |
ads.p161.net |
180 |
cms.quantserve.com |
180 |
ads.yahoocom |
129 |
graph.facebook.com |
118 |
ib.adnxs.com |
110 |
rs.gwallet.com |
108 |
bid.g.doubleclick.net |
98.333 |
for 1 user visiting 200 pages
The only way to deal with an unfree world is to become so
absolutely free that your very existence is an act of rebellion.Albert Camus