Conference Paper

A Secure and Privacy-Preserving Targeted Ad-System

DOI: 10.1007/978-3-642-14992-4_12 Conference: Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
Source: DBLP


Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy- preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to to all entities involved.

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This essay discusses the main privacy, security and trustability issues with the Internet of Things.
    Full-text · Article · Sep 2011 · Communications in Computer and Information Science
  • [Show abstract] [Hide abstract]
    ABSTRACT: Privacy has become a major concern in the Internet, resulting in an increased popularity of anonymizing systems aimed to protect users’ identities. However, service providers sometimes interpret this anonymity as a risk, since dishonest users may take advantage of it. A possible solution is to create a practical implementation of fairness mechanisms to reach an equilibrium between anonymity and its different types of revocation. Furthermore, in order to reach a wide acceptance, any new mechanism must be easily deployable in current systems and must be adaptable (from the functionality perspective) to the needs that may arise in different situations. To that end, we propose a set of extensions to the CRL and OCSP procedures of the X.509 infrastructure, and a new protocol for easing the task of providing evidence of illegitimate actions. On one hand, the adaptability of our scheme relies on the already widely deployed X.509 infrastructure. On the other hand, the functionality provided by our proposal is mainly built upon group signatures, which gives it a vast variety of schemes to choose from, depending on the specific needs that may arise.
    No preview · Article · Oct 2014 · Computers & Security