13 results on '"Petit, Albin"'
Search Results
2. Introducing Privacy in Current Web Search Engines
- Author
-
Petit, Albin
- Subjects
Privatsphäre ,Computersicherheit ,ddc:000 ,Datensicherung ,Suchmaschine - Abstract
During the last few years, the technological progress in collecting, storing and processing a large quantity of data for a reasonable cost has raised serious privacy issues. Privacy concerns many areas, but is especially important in frequently used services like search engines (e.g., Google, Bing, Yahoo!). These services allow users to retrieve relevant content on the Internet by exploiting their personal data. In this context, developing solutions to enable users to use these services in a privacy-preserving way is becoming increasingly important. In this thesis, we introduce SimAttack an attack against existing protection mechanism to query search engines in a privacy-preserving way. This attack aims at retrieving the original user query. We show with this attack that three representative state-of-the-art solutions do not protect the user privacy in a satisfactory manner. We therefore develop PEAS a new protection mechanism that better protects the user privacy. This solution leverages two types of protection: hiding the user identity (with a succession of two nodes) and masking users' queries (by combining them with several fake queries). To generate realistic fake queries, PEAS exploits previous queries sent by the users in the system. Finally, we present mechanisms to identify sensitive queries. Our goal is to adapt existing protection mechanisms to protect sensitive queries only, and thus save user resources (e.g., CPU, RAM). We design two modules to identify sensitive queries. By deploying these modules on real protection mechanisms, we establish empirically that they dramatically improve the performance of the protection mechanisms.
- Published
- 2017
3. Introduction de la confidentialité dans les moteurs de recherche Web actuels
- Author
-
Petit , Albin, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), Université de Lyon, Universität Passau (Deutscheland), Lionel Brunie, Michael Granitzer, Laboratoire d'InfoRmatique en Image et Systèmes d'information ( LIRIS ), Université Lumière - Lyon 2 ( UL2 ) -École Centrale de Lyon ( ECL ), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 ( UCBL ), Université de Lyon-Centre National de la Recherche Scientifique ( CNRS ) -Institut National des Sciences Appliquées de Lyon ( INSA Lyon ), and Université de Lyon-Institut National des Sciences Appliquées ( INSA ) -Institut National des Sciences Appliquées ( INSA )
- Subjects
IT - Information Technology ,Internet ,Privacy ,[INFO.INFO-WB]Computer Science [cs]/Web ,[ INFO.INFO-WB ] Computer Science [cs]/Web ,Informatique ,Vie privée ,Search Engines ,Moteurs de recherche - Abstract
During the last few years, the technological progress in collecting, storing and processing a large quantity of data for a reasonable cost has raised serious privacy issues. Privacy concerns many areas, but is especially important in frequently used services like search engines (e.g., Google, Bing, Yahoo!). These services allow users to retrieve relevant content on the Internet by exploiting their personal data. In this context, developing solutions to enable users to use these services in a privacy-preserving way is becoming increasingly important. In this thesis, we introduce SimAttack an attack against existing protection mechanism to query search engines in a privacy-preserving way. This attack aims at retrieving the original user query. We show with this attack that three representative state-of-the-art solutions do not protect the user privacy in a satisfactory manner. We therefore develop PEAS a new protection mechanism that better protects the user privacy. This solution leverages two types of protection: hiding the user identity (with a succession of two nodes) and masking users' queries (by combining them with several fake queries). To generate realistic fake queries, PEAS exploits previous queries sent by the users in the system. Finally, we present mechanisms to identify sensitive queries. Our goal is to adapt existing protection mechanisms to protect sensitive queries only, and thus save user resources (e.g., CPU, RAM). We design two modules to identify sensitive queries. By deploying these modules on real protection mechanisms, we establish empirically that they dramatically improve the performance of the protection mechanisms.; Au cours des dernières années les progrès technologiques permettant de collecter, stocker et traiter d'importantes quantités de données pour un faible coût, ont soulevés de sérieux problèmes concernant la vie privée. La protection de la vie privée concerne de nombreux domaines, en particulier les sites internet fréquemment utilisés comme les moteurs de recherche (ex. : Google, Bing, Yahoo!). Ces services permettent aux utilisateurs de retrouver efficacement du contenu sur Internet en exploitant leurs données personnelles. Dans ce contexte, développer des solutions pour permettre aux utilisateurs d'utiliser ces moteurs de recherche tout en protégeant leurs vies privées est devenu primordial. Dans cette thèse, nous introduirons SimAttack, une attaque contre les solutions protégeant la vie privée de l'utilisateur dans ses interactions avec les moteurs de recherche. Cette attaque vise à retrouver les requêtes initialement envoyées par l'utilisateur. Nous avons montré avec cette attaque que trois mécanismes représentatifs de l’état de l’art ne sont pas satisfaisants pour protéger la vie privée des utilisateurs. Par conséquent, nous avons développé PEAS, un nouveau mécanisme de protection qui améliore la protection de la vie privée de l'utilisateur. Cette solution repose sur deux types de protection : cacher l'identité de l'utilisateur (par une succession de deux serveurs) et masquer sa requête (en la combinant avec des fausses requêtes). Afin de générer des fausses requêtes réalistes, PEAS se base sur les précédentes requêtes envoyées par les utilisateurs du système. Pour finir, nous présenterons des mécanismes permettant d'identifier la sensibilité des requêtes. Notre objectif est d'adapter les mécanismes de protection existants pour protéger uniquement les requêtes sensibles, et ainsi économiser des ressources (ex. : CPU, mémoire vive). Nous avons développé deux modules pour identifier les requêtes sensibles. En déployant ces modules sur des mécanismes de protection existants, nous avons établi qu'ils permettent d'améliorer considérablement leurs performances.
- Published
- 2017
4. PEAS: Private, Efficient and Accurate Web Search
- Author
-
Petit, Albin, Cerqueus, Thomas, Ben Mokhtar, Sonia, Brunie, Lionel, Kosch, Harald, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), Faculty of Informatics and Mathematics (FMI), Fakultät für Informatik und Mathematik, Distribution, Recherche d'Information et Mobilité (DRIM), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), European Project: 600601,EEXCESS, Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Petit, Albin, and Enhancing Europe’s eXchange in Cultural Educational and Scientific reSources - EEXCESS - 600601 - INCOMING
- Subjects
[INFO.INFO-WB] Computer Science [cs]/Web ,[INFO.INFO-SI] Computer Science [cs]/Social and Information Networks [cs.SI] ,[INFO.INFO-WB]Computer Science [cs]/Web ,Unlinkability ,02 engineering and technology ,[INFO.INFO-SI]Computer Science [cs]/Social and Information Networks [cs.SI] ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Indistinguishability ,Privacy ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Web search ,020201 artificial intelligence & image processing ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
International audience; Accounting for the large number of queries sent by users to search engines on a daily basis, the latter are likely to learn and possibly leak sensitive information about individual users. To deal with this issue, several solutions have been proposed to query search engines in a privacy preserving way. A first category of solutions aim to hide users’ identities, thus enforcing unlinkability between a query and the identity of its originating user. A second category of approaches aims to obfuscate the content of users’ queries, or at generating fake queries in order to blur user profiles, thus enforcing indistinguishability between them. In this paper we propose PEAS, a new protocol for private Web search. PEAS combines a new efficient unlinkability protocol with a new accurate indistinguishability protocol. Experiments conducted using a real dataset of search logs show that compared to state-of-the-art approaches, PEAS decreases by up to 81.9% the number of queries linked to their original requesters. Furthermore, PEAS is accurate as it allows users to retrieve up to 95.3% of the results they would obtain using search engines in an unprotected way.
- Published
- 2015
5. Ubiquitous Access to Digital Cultural Heritage
- Author
-
Seifert, Christin, primary, Bailer, Werner, additional, Orgel, Thomas, additional, Gantner, Louis, additional, Kern, Roman, additional, Ziak, Hermann, additional, Petit, Albin, additional, Schlötterer, Jörg, additional, Zwicklbauer, Stefan, additional, and Granitzer, Michael, additional
- Published
- 2017
- Full Text
- View/download PDF
6. PAG: Private and Accountable Gossip
- Author
-
Decouchant, Jérémie, Ben Mokhtar, Sonia, Petit, Albin, Quéma, Vivien, Decouchant, Jérémie, Ben Mokhtar, Sonia, Petit, Albin, and Quéma, Vivien
- Abstract
A large variety of content sharing applications rely, at least partially, on gossip-based dissemination protocols. However, these protocols are subject to various types of faults, among which selfish behaviours performed by nodes that benefit from the system without contributing their fair share to it. Accountability mechanisms (e.g., PeerReview, AVMs, FullReview), which require that nodes log their interactions with others and periodically inspect each others’ logs are effective solutions to deter faults. However, these solutions require that nodes disclose the content of their logs, which may leak sensitive information about them. Building on a monitoring infrastructure and on homomorphic cryptographic procedures, we propose in this paper PAG, the first accountable and partially privacy-preserving gossip protocol. We assess PAG theoretically using the ProVerif cryptographic protocol verifier and evaluate it experimentally using both a real deployment on a cluster of 48 machines and simulations. The performance evaluation of PAG, performed using a video live streaming application, shows that it is compatible with the visualisation of live video content on commodity Internet connections. Furthermore, PAG’s bandwidth consumption inherits the desirable scalability properties of gossip when the number of users in the system grows.
- Published
- 2016
7. Leveraging Query Sensitivity for Practical Private Web Search
- Author
-
Boutet, Antoine, primary, Petit, Albin, additional, Mokhtar, Sonia Ben, additional, and Laporte, Léa, additional
- Published
- 2016
- Full Text
- View/download PDF
8. PAG: Private and Accountable Gossip
- Author
-
Decouchant, Jeremie, primary, Mokhtar, Sonia Ben, additional, Petit, Albin, additional, and Quema, Vivien, additional
- Published
- 2016
- Full Text
- View/download PDF
9. D6.2 -- First Security Proxy Prototype and Reputation Protocols
- Author
-
Mokhtar, Sonia Ben, Bennani, Nadia, Brunie, Lionel, Cerqueus, Thomas, Egyed-Zsigmond, Elöd, Hasan, Omar, Petit, Albin, Portier, Pierre-Edouard, Granitzer, Michael, Seifert, Christin, and Schlötterer, Jörg
- Published
- 2014
10. D6.3 -- Second Security Proxy Prototype and Reputation Protocols
- Author
-
Mokhtar, Sonia Ben, Bennani, Nadia, Brunie, Lionel, Calabretto, Sylvie, Cerqueus, Thomas, Egyed-Zsigmond, Elöd, Hasan, Omar, Petit, Albin, Portier, Pierre-Edouard, Granitzer, Michael, Seifert, Christin, and Schlötterer, Jörg
- Published
- 2014
11. D6.1 -- Policy Model for Privacy Preservation and Feasibility Report
- Author
-
Mokhtar, Sonia Ben, Bennani, Nadia, Brunie, Lionel, Cerqueus, Thomas, Egyed-Zsigmond, Elöd, Hasan, Omar, Petit, Albin, Portier, Pierre-Edouard, Granitzer, Michael, Seifert, Christin, and Schlötterer, Jörg
- Published
- 2013
12. PEAS: Private, Efficient and Accurate Web Search
- Author
-
Petit, Albin, primary, Cerqueus, Thomas, additional, Mokhtar, Sonia Ben, additional, Brunie, Lionel, additional, and Kosch, Harald, additional
- Published
- 2015
- Full Text
- View/download PDF
13. Towards efficient and accurate privacy preserving web search
- Author
-
Petit, Albin, primary, Ben Mokhtar, Sonia, additional, Brunie, Lionel, additional, and Kosch, Harald, additional
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.