Privacy-Aware Personalization for Mobile Advertising

Slides:



Advertisements
Similar presentations
Predictive Client-Side Profiles for Personalized Advertising Misha Bilenko and Matt Richardson.
Advertisements

I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
A Privacy Preserving Index for Range Queries
The Role of History and Prediction in Data Privacy Kristen LeFevre University of Michigan May 13, 2009.
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
SplitX: High-Performance Private Analytics Ruichuan Chen (Bell Labs / Alcatel-Lucent) Istemi Ekin Akkus (MPI-SWS) Paul Francis (MPI-SWS)
Non-tracking Web Analytics Istemi Ekin Akkus 1, Ruichuan Chen 1, Michaela Hardt 2, Paul Francis 1, Johannes Gehrke 3 1 Max Planck Institute for Software.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Mudhakar Srivatsa, Ling Liu and Arun Iyengar Presented by Mounica Atluri.
TARGETED, NOT TRACKED: CLIENT-SIDE SOLUTIONS FOR PRIVACY-FRIENDLY BEHAVIORAL ADVERTISING Janice Tsai Misha Bilenko Matt Richardson.
Suman Nath Microsoft Research. Contextual Computing Make computing context-aware Context: location, activity, preference, history A lot of progresses.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Probabilistic Aggregation in Distributed Networks Ling Huang, Ben Zhao, Anthony Joseph and John Kubiatowicz {hling, ravenben, adj,
FeedTree: Sharing Web Micronews with Peer-to-Peer Event Notification D. Sandler, A. Mislove, A. Post, P. Druschel Presented by: Andrew Sutton.
Differentially Private Aggregation of Distributed Time-Series Vibhor Rastogi (University of Washington) Suman Nath (Microsoft Research)
An architecture for Privacy Preserving Mining of Client Information Jaideep Vaidya Purdue University This is joint work with Murat.
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson 1, Stuart Haber 2, William G. Horne 2, Tomas.
Query Biased Snippet Generation in XML Search Yi Chen Yu Huang, Ziyang Liu, Yi Chen Arizona State University.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Decentralized Resource Management for a Distributed Continuous Media Server Cyrus Shahabi and Farnoush Banaei-Kashani Presented by Leung Chi Kit.
A Search-based Method for Forecasting Ad Impression in Contextual Advertising Defense.
Lecture 21: Privacy and Online Advertising. References Challenges in Measuring Online Advertising Systems by Saikat Guha, Bin Cheng, and Paul Francis.
Database Laboratory Regular Seminar TaeHoon Kim.
GeoPKDD Geographic Privacy-aware Knowledge Discovery and Delivery Kick-off meeting Pisa, March 14, 2005.
R 18 G 65 B 145 R 0 G 201 B 255 R 104 G 113 B 122 R 216 G 217 B 218 R 168 G 187 B 192 Core and background colors: 1© Nokia Solutions and Networks 2014.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
APPLYING EPSILON-DIFFERENTIAL PRIVATE QUERY LOG RELEASING SCHEME TO DOCUMENT RETRIEVAL Sicong Zhang, Hui Yang, Lisa Singh Georgetown University August.
© 2009 Mobile VCE 6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
KAIS T A Bidding Protocol for Deploying Mobile Sensors 발표자 : 권 영 진 Guiling Wang, Guohong Cao, Tom LaPorta The Pennsylvania State University IEEE, ICNP.
How far removed are you? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL Marcin Nagy joint work with Thanh Bui, Emiliano De.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
Non-tracking Web Analytics Istemi Ekin Akkus, Ruichuan Chen, Michaela Hardt, Paul Francis, Johannes Gehrke Presentation by David Ferreras.
BEHAVIORAL TARGETING IN ON-LINE ADVERTISING: AN EMPIRICAL STUDY AUTHORS: JOANNA JAWORSKA MARCIN SYDOW IN DEFENSE: XILING SUN & ARINDAM PAUL.
Data Access and Security in Multiple Heterogeneous Databases Afroz Deepti.
Illustration: 3-Party Secure Sum Compare, match, and analyze data from different organizations without disclosing the private data to any other party Experimental.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Presented By Amarjit Datta
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Submitted by: Sounak Paul Computer Science & Engineering 4 th Year, 7 th semester Roll No:
Private Release of Graph Statistics using Ladder Functions J.ZHANG, G.CORMODE, M.PROCOPIUC, D.SRIVASTAVA, X.XIAO.
Text Information Management ChengXiang Zhai, Tao Tao, Xuehua Shen, Hui Fang, Azadeh Shakery, Jing Jiang.
Scalable Verifiable Encrypted Search Encrypted Search with Third Party Support and Protection From Dishonest Data Stores.
Privacy Preserving Outlier Detection using Locality Sensitive Hashing
IIIT Hyderabad Private Outlier Detection and Content based Encrypted Search Nisarg Raval MS by Research, CSE Advisors : Prof. C. V. Jawahar & Dr. Kannan.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
563.10: Bloom Cookies Web Search Personalization without User Tracking
Location Privacy.
OneSwarm: Privacy Preserving P2P
Designing Private Forums
Anupam Das , Nikita Borisov
Presentation transcript:

Privacy-Aware Personalization for Mobile Advertising Krishna Rawali Puppala Privacy-Aware Personalization for Mobile Advertising Michaela Hardt Suman Nath

Summary Contextual Computing Personalized Ad Delivery System Framework Ad selection Algorithms Distributed Count Protocol Experimental Set-up Conclusion

Contextual Computing

Personalized ad Delivery System Statistics gathering

Personalized ad Delivery system

Personalized ad Delivery System Billing Advertisers

Privacy Aware Ad Delivery Server only Personalization Repriv System Client only Personalization Privad System Can we formalize a common framework for personalized ad delivery that can be instantiated to any desired trade off point? Hybrid Framework

Privacy-Preserving Statistics Gathering Personalization information based on (Click-through rates) CTRs. Problems : Users may or may not available during the course of stats gathering Users might decline to participate Then how can we achieve stats gathering in an efficient and privacy preserving way??? Ans- Developed a differentially private protocol without a trusted third party

Framework Users who are served ads Advertisers who pay for clicks on their ads Ad service provider who decides which ads to display

Desiderata Goals for Ad Delivery Goals for Statistic Gathering Privacy Efficiency Revenue & Relevance Expected revenue is Goals for Statistic Gathering Privacy in the absence of trusted server Scalability Robustness

Privacy Aware Ad Delivery The P-E-R Trade Offs One has to find reasonable trade offs between the three design goals Optimizing Ad Delivery Client Side Computation Server Side Computation

Ad Selection Algorithms Client and Server can efficiently compute their parts of optimization jointly to choose the best set of ads that achieve a desired trade off. Approximation Algorithm Greedy Algorithm – Starts with A empty set and increments in each round that increases the expected revenue. Provides maximum coverage problem.

Greedy Algorithm

Private Statistics Gathering How to achieve statistics in a privacy way? Uses Server and a Proxy Server- Key distribution Proxy- Aggregation and Anonymization Ex – VeriSign as the proxy Assumptions Honest but curious servers Honest Fraction of Users Works with ε-differential privacy Noise is generated in the absence of trusted third party. Probabilistic relaxation (ε,δ)-differential privacy is adopted.

Privacy Preserving Distributed Count Counting Protocol

Privacy Preserving Estimates Top-Down Computation

Experimental Setup Dataset- Used a trace of location aware searches. Trace has a scheme : {user-ID, query, user-location, business-ID} Context- Evaluation to contexts on Location- User’s location Interest- Multi set of Ids the user clicked on before Query- The search query the user sends

Experimental Setup Attribute Generalization Context Hierarchy Location Interest Query Context Hierarchy

Evaluating Trade-Offs Effect of CTR Threshold Effect of Communication Complexity

Evaluating Trade-Offs(Cont) Effect of Information Disclosure

Conclusion Addressed the personalization ad delivery problem without compromising user privacy Proposed the differentially private protocol Computed statistics even in the presence of malicious users Finally Achieved P-E-R.