skip to main content
10.1145/1526709.1526782acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Privacy diffusion on the web: a longitudinal perspective

Published:20 April 2009Publication History

ABSTRACT

For the last few years we have been studying the diffusion of private information for users as they visit various Web sites triggering data gathering aggregation by third parties. This paper reports on our longitudinal study consisting of multiple snapshots of our examination of such diffusion over four years. We examine the various technical ways by which third-party aggregators acquire data and the depth of user-related information acquired. We study techniques for protecting privacy diffusion as well as limitations of such techniques. We introduce the concept of secondary privacy damage. Our results show increasing aggregation of user-related data by a steadily decreasing number of entities. A handful of companies are able to track users' movement across almost all of the popular Web sites. Virtually all the protection techniques have significant limitations highlighting the seriousness of the problem and the need for alternate solutions.

References

  1. Adblock plus: Save your time and traffic. http://adblockplus.org/Google ScholarGoogle Scholar
  2. C. Albanesius. Microsoft tips {IE8} privacy features, August 26 2008. http://www.pcmag.com/article2/0,2817,2328900,00.aspGoogle ScholarGoogle Scholar
  3. Alexa: Most popular web sites. http://www.alexa.com/Google ScholarGoogle Scholar
  4. Cuil -- your privacy. http://www.cuil.com/privacy/Google ScholarGoogle Scholar
  5. W. Davis. Polish on google's new chrome tarnished by privacy questions, September 2, 2008. http://www.mediapost.com/publications/index.cfm?fa=Articles.showArticle&art_aid$Google ScholarGoogle Scholar
  6. S. DeDeo. Pagestats, May 2006. http://www.cs.wpi.edu/cew/pagestats/Google ScholarGoogle Scholar
  7. European union directive 95/46/{EC}. http://www.cdt.org/privacy/eudirective/EU_Directive.html, 1995.Google ScholarGoogle Scholar
  8. A. Greenberg. Going 'incongnito' can you really web browse on the down low?, September 5, 2008. http://www.newsweek.com/id/157293?tid=relatedclGoogle ScholarGoogle Scholar
  9. I'm A Super.Com. Flash cookies: The silent privacy killer, October 9 2008. http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/Google ScholarGoogle Scholar
  10. C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell. Protecting browser state from web privacy attacks. In Proceedings of the International World Wide Web Conference, Edinburgh, Scotland, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Krishnamurthy, D. Malandrino, and C. E. Wills. Measuring privacy loss and the impact of privacy protection in web browsing. In Proceedings of the Symposium on Usable Privacy and Security, pages 52--63, Pittsburgh, PA USA, July 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Krishnamurthy and C. Wills. Cat and mouse: Content delivery tradeoffs in web access. In Proceedings of the International World Wide Web Conference, Edinburgh, Scotland, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Krishnamurthy and C. E. Wills. Generating a privacy footprint on the {Internet}. In Proceedings of IMC, October 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. B. Krishnamurthy and C. E. Wills. Characterizing privacy in online social networks. In Proceedings of the Workshop on Online Social Networks, pages 37--42, Seattle, WA USA, August 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Michael Afergan and Thomson Leighton and Timothy Johnson and Brian Mancuso and Ken Iwamoto. Method of data collection among participating content providers in a distributed network, 2008. United States Patent Application 20080092058. http://www.freepatentsonline.com/y2008/0092058.htmlGoogle ScholarGoogle Scholar
  16. Mike On Ads. How do behavioral networks work?, February 28 2007. http://www.mikeonads.com/2007/02/28/how-do-behavioral-networks-work/Google ScholarGoogle Scholar
  17. Noscript. https://addons.mozilla.org/firefox/722/Google ScholarGoogle Scholar
  18. S. Olsen and T. Krazit. Dell embraces google, May 25, 2006. http://news.cnet.com/Dell-embraces-Google/2100-1032_3-6077051.htmlGoogle ScholarGoogle Scholar
  19. Pests clasified in the category tracking cookie. http://www.pestpatrol.com/zks/pestinfo/tracking_cookie.aspGoogle ScholarGoogle Scholar
  20. Privacy on the web: Is it a losing battle?, June 25, 2008. Published in Knowledge@Wharton. http://knowledge.wharton.upenn.edu/article.cfm?articleid=1999Google ScholarGoogle Scholar
  21. P. Whoriskey. Candidates' web sites get to know the voters presidential campaigns tailor, target ads based on visitors' online habits, August 30 2008. http://www.washingtonpost.com/wp-dyn/content/article/2008/08/29/AR2008082903178Google ScholarGoogle Scholar
  22. Consumer tips: How to opt-out of cookies that track you. http://www.worldprivacyforum.org/cookieoptout.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. Privacy diffusion on the web: a longitudinal perspective

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      WWW '09: Proceedings of the 18th international conference on World wide web
      April 2009
      1280 pages
      ISBN:9781605584874
      DOI:10.1145/1526709

      Copyright © 2009 IW3C2 org

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 April 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,899of8,196submissions,23%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader