Best Practices to Protect Your Privacy Against Search Engines Data Mining – A Review
Internet of Things and Cloud Computing
Volume 6, Issue 3, September 2018, Pages: 56-62
Received: Aug. 30, 2018;
Accepted: Sep. 19, 2018;
Published: Oct. 13, 2018
Views 805 Downloads 62
Franck Seigneur Nininahazwe, School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China
Micheal Ernest Taylor, School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China
The internet has revolutionized the way people do things in the twenty first century. Most day to day activities are been done using the internet via search engines. Search engines are great tools which aids in surfing the web more easily. The most famous ones includes Google, Bing, Yahoo and many more others which provides users with directions to resources stored on the web and other websites. However these search engines pose several issues to users of which the most challenging of them, which has drawn the attention of many researchers is privacy. Search engines learn about the user while using them by gathering every bit of information such as identity, location and so on. In this paper, the authors discuss some protection methods and privacy techniques users can observe to prevent privacy invasion and data security whilst using these systems. The study further presents some comparisons between and gives detailed understanding to enable one have a clear idea. Further discussions and suggestions after the comparisons and a conclusion on the best ways to protect user’s privacy on the internet whilst using these internet based search engines are also presented by the authors.
Franck Seigneur Nininahazwe,
Micheal Ernest Taylor,
Best Practices to Protect Your Privacy Against Search Engines Data Mining – A Review, Internet of Things and Cloud Computing.
Vol. 6, No. 3,
2018, pp. 56-62.
Copyright © 2018 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/
) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Hinman, L. M. (2005) “Esse est indicato in Google: Ethical and political issues in search engines.” International Review of Information Ethics, 3(6), pp19-25.
Ye, S., Wu, F., Pandey, R., & Chen, H. (2009) “Noise injection for search privacy protection.” In Computational Science and Engineering, 2009. CSE'09. International Conference on Vol. 3. IEEE, pp1-8.
Dr. Mintz, S. (2015), Is it time for a Code of Ethics for SEOs? Orfalea College of Business at Cal Poly San Luis Obispo.
Clifton, C., Jiang, W., Muruguesan, M., & Nergiz, M. E. (2008) “Is privacy still an issue for data mining?” NGDM, Taylor and Francis.
Singh, D. K., & Swaroop, V. (2013) “Data security and privacy in data mining: research issues & preparation.” International Journal of Computer Trends and Technology, 4(2), pp194-200.
Mason, Andrew G. (2002). Cisco Secure Virtual Private Network. Cisco Press. p. 7.
"Virtual Private Networking: An Overview". Microsoft TechNet. September 4, 2001.
World-Wide Web Proxies, Ari Luotonen, April 1994
Tor metrics, https://metrics.torproject.org/
Tor network project, https://www.torproject.org/
I2p anonymous network, https://geti2p.net/
Timpanaro, J. P., Cholez, T., Chrisment, I., & Festor, O. (2015) “Evaluation of the anonymous I2P network's design choices against performance and security.” In Information Systems Security and Privacy (ICISSP), 2015 International Conference on. IEEE, pp1-10.
Ali, A., Khan, M., Saddique, M., Pirzada, U., Zohaib, M., Ahmad, I., & Debnath, N. (2016) “TOR vs I2P: A comparative study.” In Industrial Technology (ICIT), 2016 IEEE International Conference on. IEEE, pp1748-1751.