A practical privacy-preserving targeted advertising scheme for IPTV users
详细信息    查看全文
  • 作者:Leyli Javid Khayati ; Cengiz Orencik
  • 刊名:International Journal of Information Security
  • 出版年:2016
  • 出版时间:August 2016
  • 年:2016
  • 卷:15
  • 期:4
  • 页码:335-360
  • 全文大小:1,336 KB
  • 刊物类别:Computer Science
  • 刊物主题:Data Encryption
    Computer Communication Networks
    Operating Systems
    Coding and Information Theory
    Management of Computing and Information Systems
    Communications Engineering and Networks
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1615-5270
  • 卷排序:15
文摘
In this work, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of subscribers, a content provider (IPTV), advertisers and a semi-trusted server. To target potential customers, the advertiser can utilize not only demographic information of subscribers, but also their watching habits. The latter includes watching history, preferences for IPTV content and watching rate, which are periodically (e.g., weekly) published on a semi-trusted server (e.g., cloud server) along with anonymized demographics. Since the published data may leak sensitive information about subscribers, it is safeguarded using cryptographic techniques in addition to the anonymization of demographics. The techniques used by the advertiser, which can be manifested in its queries to the server, are considered (trade) secrets and therefore are protected as well. The server is oblivious to the published data and the queries of the advertiser as well as its own responses to these queries. Only a legitimate advertiser, endorsed with so-called trapdoors by the IPTV, can query the cloud server and access the query results. Even when some background information about users is available, query responses do not leak sensitive information about the IPTV users. The performance of the proposed scheme is evaluated with experiments, which show that the scheme is practical. The algorithms demonstrate both weak and strong scaling property and take advantage of high level of parallelism. The scheme can also be applied as a recommendation system.KeywordsIPTVTargeted advertisingPrivacyCryptographyCloud computing

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700