@beate

On anonymizing query logs via token-based hashing

, , , and . Proceedings of the 16th international conference on World Wide Web, page 629--638. New York, NY, USA, ACM, (2007)
DOI: 10.1145/1242572.1242657

Abstract

In this paper we study the privacy preservation properties of aspecific technique for query log anonymization: token-based hashing. In this approach, each query is tokenized, and then a secure hash function is applied to each token. We show that statistical techniques may be applied to partially compromise the anonymization. We then analyze the specific risks that arise from these partial compromises, focused on revelation of identity from unambiguous names, addresses, and so forth, and the revelation of facts associated with an identity that are deemed to be highly sensitive. Our goal in this work is two fold: to show that token-based hashing is unsuitable for anonymization, and to present a concrete analysis of specific techniques that may be effective in breaching privacy, against which other anonymization schemes should be measured.

Description

On anonymizing query logs via token-based hashing

Links and resources

Tags

community

  • @chriskoerner
  • @chato
  • @hotho
  • @beate
  • @dblp
@beate's tags highlighted