International Journal of Information Security

, Volume 15, Issue 4, pp 335–360 | Cite as

A practical privacy-preserving targeted advertising scheme for IPTV users

  • Leyli Javid Khayati
  • Cengiz Orencik
  • Erkay Savas
  • Berkant Ustaoglu
Regular Contribution
  • 392 Downloads

Abstract

In this work, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of subscribers, a content provider (IPTV), advertisers and a semi-trusted server. To target potential customers, the advertiser can utilize not only demographic information of subscribers, but also their watching habits. The latter includes watching history, preferences for IPTV content and watching rate, which are periodically (e.g., weekly) published on a semi-trusted server (e.g., cloud server) along with anonymized demographics. Since the published data may leak sensitive information about subscribers, it is safeguarded using cryptographic techniques in addition to the anonymization of demographics. The techniques used by the advertiser, which can be manifested in its queries to the server, are considered (trade) secrets and therefore are protected as well. The server is oblivious to the published data and the queries of the advertiser as well as its own responses to these queries. Only a legitimate advertiser, endorsed with so-called trapdoors by the IPTV, can query the cloud server and access the query results. Even when some background information about users is available, query responses do not leak sensitive information about the IPTV users. The performance of the proposed scheme is evaluated with experiments, which show that the scheme is practical. The algorithms demonstrate both weak and strong scaling property and take advantage of high level of parallelism. The scheme can also be applied as a recommendation system.

Keywords

IPTV Targeted advertising Privacy Cryptography Cloud computing 

Notes

Acknowledgments

This work was supported by Turk Telekom under Grant Number 3014-02.

References

  1. 1.
    Khayati, L.J., Savas, E., Ustaoglu, B., Orencik, C.: Privacy-preserving targeted advertising scheme for iptv using the cloud. In: SECRYPT, pp. 74–83 (2012)Google Scholar
  2. 2.
    Kodialam, M., Lakshman, T., Mukherjee, S., Wang, L.: Online scheduling of targeted advertisements for iptv. In: 2010 Proceedings IEE, INFOCOM, pp. 1–9 (2010)Google Scholar
  3. 3.
    Min, W.H., Cheong, Y.G.: An interactive-content technique based approach to generating personalized advertisement for privacy protection. HCI 9, 185–191 (2009)Google Scholar
  4. 4.
    Kraus, J.: “Iptv privacy risks.” http://www.cedmagazine.com/articles/2006/02/iptv-privacy-risks, February 2006. Retrieved 02 April (2013)
  5. 5.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a berkeley view of cloud computing. In: Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009)Google Scholar
  6. 6.
    “Opinion 05/2012 on cloud computing.” http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2012/wp196_en.pdf, July 2012. Retrieved 02 April (2013)
  7. 7.
    Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Proceedings of the 14th International Conference on Financial Cryptography and Data Security, FC’10, pp. 136–149. Springer, Berlin (2010)Google Scholar
  8. 8.
    Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 557–570 (2002)MathSciNetCrossRefMATHGoogle Scholar
  9. 9.
    Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword searches. In: Proceedings of Eurocrypt 2004. LNCS, vol. 3027, pp. 506–522 (2004)Google Scholar
  10. 10.
    Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: ICDCS’10, pp. 253–262 (2010)Google Scholar
  11. 11.
    Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE INFOCOM (2011)Google Scholar
  12. 12.
    Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography, vol. 4392 of Lecture Notes in Computer Science, pp. 535–554, Springer, Berlin (2007)Google Scholar
  13. 13.
    Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: vol. 3873, pp. 414–426. Springer, Berlin (2005)Google Scholar
  14. 14.
    Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: TCC ’09: Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, pp. 457–473. Springer, Berlin (2009)Google Scholar
  15. 15.
    Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Rou, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J. (eds.) Advances in Cryptology CRYPTO 2013, vol. 8042 of Lecture Notes in Computer Science, pp. 353–373. Springer Berlin (2013)Google Scholar
  16. 16.
    Wang, P., Wang, H., Pieprzyk, J.: An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) Information Security Applications, vol. 5379 of LNCS, pp. 145–159. Springer, Berlin (2009)Google Scholar
  17. 17.
    Orencik, C., Savas, E.: An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distrib. Parallel Databases 32(1), 119–160 (2014)CrossRefGoogle Scholar
  18. 18.
    el Diehn, D., Abou-Tair, I., Köster, I., Höfke, K.: Security and privacy requirements in interactive tv. Multimed. Syst. 17, 393–408 (2011)CrossRefGoogle Scholar
  19. 19.
    Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007, 15:1–15:15 (2007)Google Scholar
  20. 20.
    “Eu directive 95/46/ec - the data protection directive.” http://www.dataprotection.ie/docs/EU-Directive-95-46-EC--Chapter-1/92.htm, October 1995. Retrieved January 02, (2014)
  21. 21.
    Aïmeur, E., Brassard, G., Fernandez, J., Mani, : Alambic : a privacy-preserving recommender system for electronic commerce. Int. J. Inf. Secur. 7(5), 307–334 (2008)CrossRefGoogle Scholar
  22. 22.
    Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Adv. Artif. Intell. 2009, 4:2–4:2 (2009)CrossRefGoogle Scholar
  23. 23.
    Herlocker, J., Konstan, J.A., Riedl, J.: An empirical analysis of design choices in neighborhood-based collaborative filtering algorithms. Inf. Retr. 5, 287–310 (2002)CrossRefGoogle Scholar
  24. 24.
  25. 25.
  26. 26.
    Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS ’06, pp. 79–88, ACM (2006)Google Scholar
  27. 27.
    Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Advances in Cryptology CRYPTO 96, vol. 1109 of Lecture Notes in Computer Science, pp. 1–15, Springer, Berlin (1996)Google Scholar
  28. 28.
    Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 111–125. IEEE, Los Alamitos, CA (2008)Google Scholar
  29. 29.
    Rappe, D.: Homomorphic cryptosystems and their applications. PhD thesis, University of Dortmund, Dortmund (2004)Google Scholar
  30. 30.
    Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) Advances in Cryptology—ASIACRYPT’99, vol. 1716 of Lecture Notes in Computer Science, pp. 165–179, Springer, Berlin (1999)Google Scholar
  31. 31.
    Bellare, M.: New proofs for NMAC and HMAC: Security without collision-resistance. In: Proceedings of the 26th Annual International Conference on Advances in Cryptology, CRYPTO’06, pp. 602–619. Springer, Berlin (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  • Leyli Javid Khayati
    • 1
  • Cengiz Orencik
    • 1
  • Erkay Savas
    • 1
  • Berkant Ustaoglu
    • 2
  1. 1.Faculty of Science and EngineeringSabanci UniversityIstanbulTurkey
  2. 2.Izmir Institute of TechnologyIzmirTurkey

Personalised recommendations