Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud

Leyli Javid Khayati, Erkay Savaş, Berkant Ustaoğlu, Cengiz Örencik

2012

Abstract

In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud server. To provide high quality directed advertising service, the advertiser can utilize not only demographic information of subscribers, but also their watching habits. The latter includes watching history, preferences for IPTV content and watching rate, which are published on the cloud server periodically (e.g. weekly) along with anonymized demographics. Since the published data may leak sensitive information about subscribers, it is safeguarded using cryptographic techniques in addition to the anonymization of demographics. The techniques used by the advertiser, which can be manifested in its queries to the cloud, are considered (trade) secrets and therefore are protected as well. The cloud is oblivious to the published data, the queries of the advertiser as well as its own responses to these queries. Only a legitimate advertiser, endorsed with a so-called {\em trapdoor} by the IPTV, can query the cloud and utilize the query results. The performance of the proposed scheme is evaluated with experiments, which show that the scheme is suitable for practical usage.

References

  1. Aïmeur, E., Brassard, G., Fernandez, J., and Mani (2008). Alambic : a privacy-preserving recommender system for electronic commerce. International Journal of Information Security, 7(5):307-334.
  2. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., and Zaharia, M. (2009). Above the clouds: A berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley.
  3. Ballard, L., Kamara, S., and Monrose, F. (2005). Achieving efficient conjunctive keyword searches over encrypted data. Springer, 3873:414-426.
  4. Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G. (2004). Public key encryption with keyword searchs. In proceedings of Eurocrypt 2004, LNCS 3027, pages 506-522.
  5. Boneh, D. and Waters, B. (2007). Conjunctive, Subset, and Range Queries on Encrypted Data. In Theory of Cryptography, volume 4392 of Lecture Notes in Computer Science, pages 535-554. Springer Berlin / Heidelberg.
  6. Cao, N., Wang, C., Li, M., Ren, K., and Lou, W. (2011). Privacy-preserving multi-keyword ranked search over encrypted cloud data. In IEEE INFOCOM.
  7. Ceselli, A., Damiani, E., Vimercati, S. D. C. D., Jajodia, S., Paraboschi, S., and Samarati, P. (2005). Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur., 8:119-152.
  8. el Diehn, D., Abou-Tair, I., Köster, I., and Höfke, K. (2011). Security and privacy requirements in interactive tv. Multimedia Systems, 17:393-408.
  9. Kamara, S. and Lauter, K. (2010). Cryptographic cloud storage. In Proceedings of the 14th international conference on Financial cryptography and data security, FC'10, pages 136-149. Springer-Verlag.
  10. Kodialam, M., Lakshman, T., Mukherjee, S., and Wang, L. (2010). Online scheduling of targeted advertisements for iptv. INFOCOM, 2010 Proceedings IEE, pages 1- 9.
  11. Min, W. H. and Cheong, Y. G. (2009). An interactivecontent technique based approach to generating personalized advertisement for privacy protection. In HCI (9), pages 185-191.
  12. O rencik, C. and Savas¸, E. (2012). Efficient and secure ranked multi-keyword search on encrypted cloud data. http://www.edbt.org/Proceedings/2012-Berlin/ papers/workshops/pais2012/a5-orencik.pdf. retrieved on May 14, 2012.
  13. Shen, E., Shi, E., and Waters, B. (2009). Predicate Privacy in Encryption Systems. In TCC 7809: Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, pages 457-473. Springer-Verlag.
  14. Sweeney, L. (2002). K-Anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst, 10:557-570.
  15. Wang, C., Cao, N., Li, J., Ren, K., and Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In ICDCS'10, pages 253-262.
  16. Wang, P., Wang, H., and Pieprzyk, J. (2009). An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In Chung, K.-I., Sohn, K., and Yung, M., editors, Information Security Applications, volume 5379 of LNCS, pages 145-159. Springer Berlin / Heidelberg.
Download


Paper Citation


in Harvard Style

Javid Khayati L., Savaş E., Ustaoğlu B. and Örencik C. (2012). Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 74-83. DOI: 10.5220/0004021900740083


in Bibtex Style

@conference{secrypt12,
author={Leyli Javid Khayati and Erkay Savaş and Berkant Ustaoğlu and Cengiz Örencik},
title={Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={74-83},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004021900740083},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud
SN - 978-989-8565-24-2
AU - Javid Khayati L.
AU - Savaş E.
AU - Ustaoğlu B.
AU - Örencik C.
PY - 2012
SP - 74
EP - 83
DO - 10.5220/0004021900740083