Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382268
|View full text |Cite
|
Sign up to set email alerts
|

Non-tracking web analytics

Abstract: Today, websites commonly use third party web analytics services to obtain aggregate information about users that visit their sites. This information includes demographics and visits to other sites as well as user behavior within their own sites. Unfortunately, to obtain this aggregate information, web analytics services track individual user browsing behavior across the web. This violation of user privacy has been strongly criticized, resulting in tools that block such tracking as well as anti-tracking legisla… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 42 publications
(57 citation statements)
references
References 18 publications
0
57
0
Order By: Relevance
“…That is, the ad-network might be able to reveal a specific user's response by comparing WKH DJJUHJDWLRQ UHVXOWV RI GLIIHUHQW TXHULHV 7R support statistics gathering with differential privacy guarantees, there is also a line of work proposing viable approaches [9,[14][15][16][17][18][19][20] .…”
Section: Other Secure Componentsmentioning
confidence: 99%
“…That is, the ad-network might be able to reveal a specific user's response by comparing WKH DJJUHJDWLRQ UHVXOWV RI GLIIHUHQW TXHULHV 7R support statistics gathering with differential privacy guarantees, there is also a line of work proposing viable approaches [9,[14][15][16][17][18][19][20] .…”
Section: Other Secure Componentsmentioning
confidence: 99%
“…Another example is that of an online publisher (e.g., a news website) C that wishes to know more about its online readership [2]. In this case, the aggregator A is an online advertiser that collects information about online users U and monetizes it with online publishers.…”
Section: Applicationsmentioning
confidence: 99%
“…Here the attacker is not polynomially bounded, since we work in a symbolic setting and under the perfect cryptography assumption: the Dolev-Yao attacker can only access the cryptographic libraries exported by the [17] program, which model the idealized semantics of cryptographic primitives by constructs of the language and are, thus, suitable for automated verification.…”
Section: Distributed Differential Privacymentioning
confidence: 99%
“…Analyzing the privacy properties of these systems by hand is not only tedious but, due to the complex nature of the systems and their underlying cryptographic protocols, also prone to overlooking attacks. For instance, we discovered a previously unknown attack on a recently proposed protocol for privacy-preserving web analytics by Akkus et al [17].…”
Section: Distributed Differential Privacymentioning
confidence: 99%
See 1 more Smart Citation