| Peer-Reviewed

Best Practices to Protect Your Privacy Against Search Engines Data Mining – A Review

Received: 30 August 2018     Accepted: 19 September 2018     Published: 13 October 2018
Views:       Downloads:
Abstract

The internet has revolutionized the way people do things in the twenty first century. Most day to day activities are been done using the internet via search engines. Search engines are great tools which aids in surfing the web more easily. The most famous ones includes Google, Bing, Yahoo and many more others which provides users with directions to resources stored on the web and other websites. However these search engines pose several issues to users of which the most challenging of them, which has drawn the attention of many researchers is privacy. Search engines learn about the user while using them by gathering every bit of information such as identity, location and so on. In this paper, the authors discuss some protection methods and privacy techniques users can observe to prevent privacy invasion and data security whilst using these systems. The study further presents some comparisons between and gives detailed understanding to enable one have a clear idea. Further discussions and suggestions after the comparisons and a conclusion on the best ways to protect user’s privacy on the internet whilst using these internet based search engines are also presented by the authors.

Published in Internet of Things and Cloud Computing (Volume 6, Issue 3)
DOI 10.11648/j.iotcc.20180603.11
Page(s) 56-62
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2018. Published by Science Publishing Group

Keywords

Search Engines, Privacy, Tor Network, I2p

References
[1] Hinman, L. M. (2005) “Esse est indicato in Google: Ethical and political issues in search engines.” International Review of Information Ethics, 3(6), pp19-25.
[2] Ye, S., Wu, F., Pandey, R., & Chen, H. (2009) “Noise injection for search privacy protection.” In Computational Science and Engineering, 2009. CSE'09. International Conference on Vol. 3. IEEE, pp1-8.
[3] Dr. Mintz, S. (2015), Is it time for a Code of Ethics for SEOs? Orfalea College of Business at Cal Poly San Luis Obispo.
[4] Clifton, C., Jiang, W., Muruguesan, M., & Nergiz, M. E. (2008) “Is privacy still an issue for data mining?” NGDM, Taylor and Francis.
[5] Singh, D. K., & Swaroop, V. (2013) “Data security and privacy in data mining: research issues & preparation.” International Journal of Computer Trends and Technology, 4(2), pp194-200.
[6] Mason, Andrew G. (2002). Cisco Secure Virtual Private Network. Cisco Press. p. 7.
[7] "Virtual Private Networking: An Overview". Microsoft TechNet. September 4, 2001.
[8] World-Wide Web Proxies, Ari Luotonen, April 1994
[9] Tor metrics, https://metrics.torproject.org/
[10] Tor network project, https://www.torproject.org/
[11] I2p anonymous network, https://geti2p.net/
[12] Timpanaro, J. P., Cholez, T., Chrisment, I., & Festor, O. (2015) “Evaluation of the anonymous I2P network's design choices against performance and security.” In Information Systems Security and Privacy (ICISSP), 2015 International Conference on. IEEE, pp1-10.
[13] Ali, A., Khan, M., Saddique, M., Pirzada, U., Zohaib, M., Ahmad, I., & Debnath, N. (2016) “TOR vs I2P: A comparative study.” In Industrial Technology (ICIT), 2016 IEEE International Conference on. IEEE, pp1748-1751.
Cite This Article
  • APA Style

    Franck Seigneur Nininahazwe, Micheal Ernest Taylor. (2018). Best Practices to Protect Your Privacy Against Search Engines Data Mining – A Review. Internet of Things and Cloud Computing, 6(3), 56-62. https://doi.org/10.11648/j.iotcc.20180603.11

    Copy | Download

    ACS Style

    Franck Seigneur Nininahazwe; Micheal Ernest Taylor. Best Practices to Protect Your Privacy Against Search Engines Data Mining – A Review. Internet Things Cloud Comput. 2018, 6(3), 56-62. doi: 10.11648/j.iotcc.20180603.11

    Copy | Download

    AMA Style

    Franck Seigneur Nininahazwe, Micheal Ernest Taylor. Best Practices to Protect Your Privacy Against Search Engines Data Mining – A Review. Internet Things Cloud Comput. 2018;6(3):56-62. doi: 10.11648/j.iotcc.20180603.11

    Copy | Download

  • @article{10.11648/j.iotcc.20180603.11,
      author = {Franck Seigneur Nininahazwe and Micheal Ernest Taylor},
      title = {Best Practices to Protect Your Privacy Against Search Engines Data Mining – A Review},
      journal = {Internet of Things and Cloud Computing},
      volume = {6},
      number = {3},
      pages = {56-62},
      doi = {10.11648/j.iotcc.20180603.11},
      url = {https://doi.org/10.11648/j.iotcc.20180603.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20180603.11},
      abstract = {The internet has revolutionized the way people do things in the twenty first century. Most day to day activities are been done using the internet via search engines. Search engines are great tools which aids in surfing the web more easily. The most famous ones includes Google, Bing, Yahoo and many more others which provides users with directions to resources stored on the web and other websites. However these search engines pose several issues to users of which the most challenging of them, which has drawn the attention of many researchers is privacy. Search engines learn about the user while using them by gathering every bit of information such as identity, location and so on. In this paper, the authors discuss some protection methods and privacy techniques users can observe to prevent privacy invasion and data security whilst using these systems. The study further presents some comparisons between and gives detailed understanding to enable one have a clear idea. Further discussions and suggestions after the comparisons and a conclusion on the best ways to protect user’s privacy on the internet whilst using these internet based search engines are also presented by the authors.},
     year = {2018}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Best Practices to Protect Your Privacy Against Search Engines Data Mining – A Review
    AU  - Franck Seigneur Nininahazwe
    AU  - Micheal Ernest Taylor
    Y1  - 2018/10/13
    PY  - 2018
    N1  - https://doi.org/10.11648/j.iotcc.20180603.11
    DO  - 10.11648/j.iotcc.20180603.11
    T2  - Internet of Things and Cloud Computing
    JF  - Internet of Things and Cloud Computing
    JO  - Internet of Things and Cloud Computing
    SP  - 56
    EP  - 62
    PB  - Science Publishing Group
    SN  - 2376-7731
    UR  - https://doi.org/10.11648/j.iotcc.20180603.11
    AB  - The internet has revolutionized the way people do things in the twenty first century. Most day to day activities are been done using the internet via search engines. Search engines are great tools which aids in surfing the web more easily. The most famous ones includes Google, Bing, Yahoo and many more others which provides users with directions to resources stored on the web and other websites. However these search engines pose several issues to users of which the most challenging of them, which has drawn the attention of many researchers is privacy. Search engines learn about the user while using them by gathering every bit of information such as identity, location and so on. In this paper, the authors discuss some protection methods and privacy techniques users can observe to prevent privacy invasion and data security whilst using these systems. The study further presents some comparisons between and gives detailed understanding to enable one have a clear idea. Further discussions and suggestions after the comparisons and a conclusion on the best ways to protect user’s privacy on the internet whilst using these internet based search engines are also presented by the authors.
    VL  - 6
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China

  • School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China

  • Sections