Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/4778
Title: Privacy-preserving targeted advertising scheme for IPTV using the cloud
Authors: Khayati, Leyli Javid
Savaş, Erkay
Ustaoğlu, Berkant
Örencik, Cengiz
Keywords: Targeted advertising
Cloud server
Cryptography
IPTV
Privacy
Issue Date: 2012
Publisher: SciTePress
Source: Khayati, L. J., Savaş, E., Ustaoğlu, B., and Örencik, C. (2012, July). Privacy-preserving targeted advertising scheme for IPTV using the cloud. In P. Samarati (Eds.), Proceedings of the International Conference on Security and Cryptography. Paper presented at the International Conference on Security and Cryptography, SECRYPT 2012; Rome; Italy (pp. 74-83). Setúbal, Portugal: SciTe Press.
Abstract: In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud server. To provide high quality directed advertising service, the advertiser can utilize not only demographic information of subscribers, but also their watching habits. The latter includes watching history, preferences for IPTV content and watching rate, which are published on the cloud server periodically (e.g. weekly) along with anonymized demographics. Since the published data may leak sensitive information about subscribers, it is safeguarded using cryptographic techniques in addition to the anonymization of demographics. The techniques used by the advertiser, which can be manifested in its queries to the cloud, are considered (trade) secrets and therefore are protected as well. The cloud is oblivious to the published data, the queries of the advertiser as well as its own responses to these queries. Only a legitimate advertiser, endorsed with a so-called trapdoor by the IPTV, can query the cloud and utilize the query results. The performance of the proposed scheme is evaluated with experiments, which show that the scheme is suitable for practical usage.
Description: International Conference on Security and Cryptography, SECRYPT 2012; Rome; Italy; 24 July 2012 through 27 July 2012
URI: http://doi.org/10.5220/0004021900740083
http://hdl.handle.net/11147/4778
ISBN: 9789898565242
Appears in Collections:Mathematics / Matematik
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection

Files in This Item:
File Description SizeFormat 
4778.pdfConference Paper226.08 kBAdobe PDFThumbnail
View/Open
Show full item record



CORE Recommender

SCOPUSTM   
Citations

1
checked on Apr 14, 2023

Page view(s)

128
checked on Feb 26, 2024

Download(s)

160
checked on Feb 26, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.