Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2351356.2351362acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Have your cake and eat it too!: preserving privacy while achieving high behavioral targeting performance

Published: 12 August 2012 Publication History

Abstract

Privacy is a major concern for Internet users and Internet policy regulators. Privacy violations usually entail either sharing Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website. On the other hand, Internet advertising through behavioral targeting is an important part of the Internet ecosystem, as it provides users more relevant information and enables content/data providers to provide free services to end users. In order to achieve effective behavioral targeting, it is desirable for the advertisers to access a set of users with the targeted behaviors. A key question is how should data flow from a provider (e.g. publisher) to a third party advertiser to achieve effective behavioral targeting, all while without directly sharing exact user behavior data. This paper attempts to answer this question and proposes a privacy preserving technique for behavioral targeting that does not entail a drastic reduction in advertising effectiveness. When behavioral targeting data is transferred to an advertiser, we use a smart, data mining-based noise injection method that perturbs the results (a set of users meeting specified criteria) by carefully adding noisy data points that maintain a high level of performance. Upon receiving the data, the advertiser cannot distinguish accurate data points adhering to specifications, versus noisy data, which does not meet the specifications. Using data from a major US top Online Travel Agent (OTA), we evaluated the proposed technique for location-based behavioral targeting, whereby advertisers run data campaigns targeting travelers for specific destinations. Our experimental results demonstrate that such data campaigns obtain results that enhance or preserve user privacy while maintaining a high level of targeting performance.

References

[1]
R. Agrawal and R. Srikant. Privacy-preserving data mining. In ACM Sigmod Record, volume 29, pages 439--450. ACM, 2000.
[2]
Amazon. Amazon mom program. http://www.amazon.com/gp/mom/signup/info (last visited: Jan 2012).
[3]
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 273--282. ACM, 2007.
[4]
M. Bilenko and M. Richardson. Predictive client-side profiles for personalized advertising. In Proceedings of 17th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD-11), 2011.
[5]
I. Dinur and K. Nissim. Revealing information while preserving privacy. In Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 202--210. ACM, 2003.
[6]
C. Dwork. Differential privacy. Automata, languages and programming, pages 1--12, 2006.
[7]
C. Dwork. Differential privacy. In Automata, Languages and Programming, volume 4052 of Lecture Notes in Computer Science, pages 1--12. Springer Berlin/Heidelberg, 2006.
[8]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. Theory of Cryptography, pages 265--284, 2006.
[9]
S. Fienberg and J. McIntyre. Data swapping: Variations on a theme by dalenius and reiss. In Privacy in Statistical Databases, pages 519--519. Springer, 2004.
[10]
A. Goldfarb and C. Tucker. Privacy regulation and online advertising. Management Science, 57(1):57--71, 2011.
[11]
S. Hansell. Aol removes search data on vast group of web users. New York Times, 8:C4, 2006.
[12]
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pages 49--60. ACM, 2005.
[13]
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on, pages 106--115. IEEE, 2007.
[14]
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1):3, 2007.
[15]
D. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Halpern. Worst-case background knowledge for privacy-preserving data publishing. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on, pages 126--135. IEEE, 2007.
[16]
J. Mayer and A. Narayanan. Do not track: Universal web tracking opt out. http://donottrack.us/.
[17]
F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In KDD '09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 627--636. ACM, 2009.
[18]
N. Mohammed, R. Chen, B. Fung, and S. Philip. Differentially private data release for data mining. Engineer, 18(40):2, 2011.
[19]
S. Nabar, K. Kenthapadi, N. Mishra, and R. Motwani. A survey of query auditing techniques for data privacy. Privacy-Preserving Data Mining, pages 415--431, 2008.
[20]
A. Narayanan and V. Shmatikov. How to break anonymity of the netflix prize dataset. CoRR, pages -1--1, 2006.
[21]
Netflix. Netflix Prize, 2006(begin), 2009(close). http://www.netflixprize.com/.
[22]
F. Provost, B. Dalessandro, R. Hook, X. Zhang, and A. Murray. Audience selection for on-line brand advertising: privacy-friendly social network targeting. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pages 707--716, New York, NY, USA, 2009. ACM.
[23]
A. Roth and T. Roughgarden. Interactive privacy via the median mechanism. In Proceedings of the 42nd ACM symposium on Theory of computing, pages 765--774. ACM, 2010.
[24]
P. Samarati. Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, pages 1010--1027, 2001.
[25]
L. Sweeney et al. k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems, 10(5):557--570, 2002.
[26]
R. Wong, J. Li, A. Fu, and K. Wang. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 754--759. ACM, 2006.
[27]
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. In Data Engineering (ICDE), 2010 IEEE 26th International Conference on, pages 225--236, march 2010.
[28]
Q. Zhang, N. Koudas, D. Srivastava, and T. Yu. Aggregate query answering on anonymized tables. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on, pages 116--125. IEEE, 2007.

Index Terms

  1. Have your cake and eat it too!: preserving privacy while achieving high behavioral targeting performance

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ADKDD '12: Proceedings of the Sixth International Workshop on Data Mining for Online Advertising and Internet Economy
    August 2012
    77 pages
    ISBN:9781450315456
    DOI:10.1145/2351356
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 August 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. behavioral targeting
    2. data mining
    3. privacy

    Qualifiers

    • Research-article

    Conference

    KDD '12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 12 of 21 submissions, 57%

    Upcoming Conference

    KDD '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 378
      Total Downloads
    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 25 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media