Protocols that hide user's preferences in electronic transactions

The Internet creates many new threats to personal privacy and raises some unique privacy concerns. In this paper we study the problem of how to protect users’ privacy in web transactions of digital products. In particular, we introduce a system which (1) allows a user to disclose his/her identity in...

Full description

Saved in:
Bibliographic Details
Main Authors: BAO, Feng, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2005
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1170
http://dx.doi.org/10.1016/j.comnet.2004.10.010
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2169
record_format dspace
spelling sg-smu-ink.sis_research-21692010-12-22T08:24:06Z Protocols that hide user's preferences in electronic transactions BAO, Feng DENG, Robert H. The Internet creates many new threats to personal privacy and raises some unique privacy concerns. In this paper we study the problem of how to protect users’ privacy in web transactions of digital products. In particular, we introduce a system which (1) allows a user to disclose his/her identity information (such as user account or credit card number) to a web site in exchange for a digital product, but (2) prevents the web site from learning which specific product the user intends to obtain. The problem concerned here is orthogonal to the problem of anonymous transactions [M. Reed, P. Syverson, D. Goldschag, Anonymous connections and Onion Routing, IEEE Journal of Selected Areas in Communication 16 (4) (1998) 482–494; M. Reiter, A. Rubin, Crowds: anonymity for web transactions, ACM Transactions on Information System Security, 1 (1) (1998) 66–92] but commensurate with the general problem of PIR (private information retrieval) [B. Chor, O. Goldreich, E. Kushilevita, M. Sudan, Private information retrieval, in: Proceedings of 36th FOCS, 1995, pp. 41–50; B. Chor, N. Gilboa, Computational private information retrieval, in: Proceedings of 29th STOC, 1997, pp. 304–313]. Most of the existing results in PIR, however, are theoretical in nature and can not be applied in practice due to their huge communication and computational overheads. In the present paper, we introduce two practical solutions that satisfy the above two requirements and analyze their security and performance. Another issue we study in this paper is how to recover sales statistics data in our user privacy-protected system. We present a novel solution to the problem along with its security analysis. 2005-07-01T07:00:00Z text https://ink.library.smu.edu.sg/sis_research/1170 info:doi/10.1016/j.comnet.2004.10.010 http://dx.doi.org/10.1016/j.comnet.2004.10.010 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Anonymizer Encryption Privacy protection On-line transaction Digital products Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Anonymizer
Encryption
Privacy protection
On-line transaction
Digital products
Information Security
spellingShingle Anonymizer
Encryption
Privacy protection
On-line transaction
Digital products
Information Security
BAO, Feng
DENG, Robert H.
Protocols that hide user's preferences in electronic transactions
description The Internet creates many new threats to personal privacy and raises some unique privacy concerns. In this paper we study the problem of how to protect users’ privacy in web transactions of digital products. In particular, we introduce a system which (1) allows a user to disclose his/her identity information (such as user account or credit card number) to a web site in exchange for a digital product, but (2) prevents the web site from learning which specific product the user intends to obtain. The problem concerned here is orthogonal to the problem of anonymous transactions [M. Reed, P. Syverson, D. Goldschag, Anonymous connections and Onion Routing, IEEE Journal of Selected Areas in Communication 16 (4) (1998) 482–494; M. Reiter, A. Rubin, Crowds: anonymity for web transactions, ACM Transactions on Information System Security, 1 (1) (1998) 66–92] but commensurate with the general problem of PIR (private information retrieval) [B. Chor, O. Goldreich, E. Kushilevita, M. Sudan, Private information retrieval, in: Proceedings of 36th FOCS, 1995, pp. 41–50; B. Chor, N. Gilboa, Computational private information retrieval, in: Proceedings of 29th STOC, 1997, pp. 304–313]. Most of the existing results in PIR, however, are theoretical in nature and can not be applied in practice due to their huge communication and computational overheads. In the present paper, we introduce two practical solutions that satisfy the above two requirements and analyze their security and performance. Another issue we study in this paper is how to recover sales statistics data in our user privacy-protected system. We present a novel solution to the problem along with its security analysis.
format text
author BAO, Feng
DENG, Robert H.
author_facet BAO, Feng
DENG, Robert H.
author_sort BAO, Feng
title Protocols that hide user's preferences in electronic transactions
title_short Protocols that hide user's preferences in electronic transactions
title_full Protocols that hide user's preferences in electronic transactions
title_fullStr Protocols that hide user's preferences in electronic transactions
title_full_unstemmed Protocols that hide user's preferences in electronic transactions
title_sort protocols that hide user's preferences in electronic transactions
publisher Institutional Knowledge at Singapore Management University
publishDate 2005
url https://ink.library.smu.edu.sg/sis_research/1170
http://dx.doi.org/10.1016/j.comnet.2004.10.010
_version_ 1770570885832376320