ObliviAd: Provably Secure and Practical Online Behavioral Advertising

被引:55
作者
Backes, Michael
Kate, Aniket
Maffei, Matteo
Pecina, Kim
机构
来源
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2012年
关键词
PERFORMANCE;
D O I
10.1109/SP.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Online behavioral advertising (OBA) involves the tracking of web users' online activities in order to deliver tailored advertisements. OBA has become a rapidly increasing source of revenue for a number of web services, and it is typically conducted by third-party data analytics firms such as brokers, which track user behaviors across web-sessions using mechanisms such as persistent cookies. This practice raises significant privacy concerns among users and privacy advocates alike. Therefore, the task of designing OBA systems that do not reveal user profiles to third parties has been receiving growing interest from the research community. Nevertheless, existing solutions are not ideal for privacy preserving OBA: some of them do not provide adequate privacy to users or adequate targeting information to brokers, while others require trusted third parties that are difficult to realize. In this paper, we propose ObliviAd,(1) a provably secure architecture for privacy preserving OBA. The distinguishing features of our approach are the usage of secure hardware-based private information retrieval for distributing advertisements and high-latency mixing of electronic tokens for billing advertisers without disclosing any information about client profiles to brokers. ObliviAd does not assume any trusted party and provides brokers an economical alternative that preserves the privacy of users without hampering the precision of ads selection. We present the first formal security definitions for OBA systems (namely, profile privacy, profile unlinkability, and billing correctness) and conduct a formal security analysis of ObliviAd using ProVerif, an automated cryptographic protocol verifier, establishing the aforementioned security properties against a strong adversarial model. Finally, we demonstrated the practicality of our approach with an experimental evaluation.
引用
收藏
页码:257 / 271
页数:15
相关论文
共 46 条
  • [11] Brown A., 2011, ACM CLOUD COMP SEC W
  • [12] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
  • [13] CHAUM D, 1990, P CRYPTO 88, P319
  • [14] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88
  • [15] Chor B, 1995, AN S FDN CO, P41, DOI 10.1109/SFCS.1995.492461
  • [16] Performance analysis of TLS web servers
    Coarfa, C
    Druschel, P
    Wallach, DS
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2006, 24 (01): : 39 - 69
  • [17] Verifying privacy-type properties of electronic voting protocols
    Delaune, Stephanie
    Kremer, Steve
    Ryan, Mark
    [J]. JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) : 435 - 487
  • [18] A new hardware-assisted PIR with O(n) shuffle cost
    Ding, Xuhua
    Yang, Yanjiang
    Deng, Robert H.
    Wang, Shuhong
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (04) : 237 - 252
  • [19] The Online Advertising Industry: Economics, Evolution, and Privacy
    Evans, David S.
    [J]. JOURNAL OF ECONOMIC PERSPECTIVES, 2009, 23 (03) : 37 - 60
  • [20] F. T. Commission, 2009, FTC STAFF REP SELF R