Startseite An Effective Approach for the Protection of User Privacy in a Digital Library
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

An Effective Approach for the Protection of User Privacy in a Digital Library

  • Zongda Wu , Jian Xie , Jun Pan EMAIL logo und Xining Su
Veröffentlicht/Copyright: 4. Dezember 2019
Libri
Aus der Zeitschrift Libri Band 69 Heft 4

Abstract

In a digital library, an increasingly important problem is how to prevent the exposure of user privacy in an untrusted network. This study aims to design an effective approach for the protection of user privacy in a digital library, by consulting the basic ideas of encryption and anonymization. In our proposed approach, any privacy data, which can identify user’s real identity, should be encrypted first before being submitted to the library server, to achieve anonymization of user identity. Then, to solve the problem of querying encrypted privacy data, additional feature data are constructed for the encrypted data, such that much of the query processing can be completed at the server-side, without decrypting the data, thereby improving the efficiency of each kind of user query operation. Both theoretical analysis and experimental evaluation demonstrate the effectiveness of the approach, which can improve the security of users’ data privacy and behavior privacy on the untrusted server-side, without compromising the availability (i. e. accuracy, efficiency, and usability) of digital library services. This paper provides a valuable study attempt at the protection of digital library users’ privacy, which has a positive influence on the development of a privacy-preserving library in an untrusted network environment.

Acknowledgements

This study is supported by the National Social Science Foundation of China “Research on Semantic Model for the Protection of Users’ Preference Privacy in Personalized Information Retrieval” (No. 19BTQ056).

References

Chen, G., H. Bai, L. Shou, K. Chen, and Y. Gao. 2011. “UPS: Efficient Privacy Protection in Personalized Web Search”. Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval, 615–24.Suche in Google Scholar

Choi, S. G., D. Dachman-Soled, T. Malkin, and H. Wee. 2017. “A Black-box Construction of Non-malleable Encryption from Semantically Secure Encryption.” Journal of Cryptology 2: 1–30.10.1007/s00145-017-9254-zSuche in Google Scholar

Ding, W., Z. Yan, and R. H. Deng. 2017. “Encrypted Data Processing with Homomorphic Re-encryption.” Information Science 409: 35–45.10.1016/j.ins.2017.05.004Suche in Google Scholar

Gangadharan, S. P. 2017. “Library Privacy in Practice: System Change and Challenges.” A Journal of Law and Policy for the Information Society 13 (1): 175–98.Suche in Google Scholar

Han, J., Y. Yang, X. Huang, T. H. Yuen, J. Li, and J. Cao. 2016b. “Accountable Mobile E-commerce Scheme via Identity-based Plaintext-checkable Encryption.” Information Sciences 345: 143–55.10.1016/j.ins.2016.01.045Suche in Google Scholar

Han, Z., S. Huang, H. Li, and N. Ren. 2016a. “Risk Assessment of Digital Library Information Security: A Case Study.” The Electronic Library 34 (3): 471–87.10.1108/EL-09-2014-0158Suche in Google Scholar

Juan, V., P. Josep, and H. S. Juan. 2014. “DocCloud: A Document Recommender System on Cloud Computing with Plausible Deniability.” Information Sciences 258 (10): 387–402.10.1016/j.ins.2013.04.007Suche in Google Scholar

Li, C., W. Zhang, and Y. Lang. 2015. “Dynamic Risk Assessment Model of Information System Security in Digital Library.” Information Science (Chinese) 33 (5): 76–80.Suche in Google Scholar

Li, C. T., C. L. Chen, C. C. Lee, C. Y. Weng, and C. M. Chen. 2017. “A Novel Three-party Password-Based Authenticated Key Exchange Protocol with User Anonymity Based on Chaotic Maps.” Soft Computing 6: 1–12.10.1007/s00500-017-2504-zSuche in Google Scholar

Li, D., and Cai, B. 2010. “Protect Reader’s Rights and Interests in Public Library by Rules and Regulations.” Journal of Library Science in China (chinese) 36 (4): 17–23.Suche in Google Scholar

Li, Q., J. Ma, R. Li, X. Liu, J. Xiong, and D. Chen. 2016. “Secure, Efficient and Revocable Multi-authority Access Control System in Cloud Storage.” Computers and Security 59: 45–59.10.1016/j.cose.2016.02.002Suche in Google Scholar

Mei, Z., H. Zhu, Z. Cui, Z. Wu, G. Peng, B. Wu, and C. Zhang. 2018. “Executing Multidimensional Range Query Efficiently and Flexibly over Outsourced Ciphertext in the Cloud.” Information Sciences 432: 79–96.10.1016/j.ins.2017.11.065Suche in Google Scholar

Mironov, I., O. Pandey, O. Reingold, and G. Segev. 2018. “Incremental Deterministic Public-key Encryption.” Journal of Cryptology 31 (1): 134–61.10.1007/s00145-017-9252-1Suche in Google Scholar

Power, D., M. Slaymaker, and A. Simpson. 2018. “On Formalizing and Normalizing Role-based Access Control Systems.” The Computer Journal 52 (3): 305–25.10.1093/comjnl/bxn016Suche in Google Scholar

Shang, S., Y. Hui, P. Hui, P. Cuff, and S. Kulkarni. 2014. “Beyond Personalization and Anonymity: Towards a Group-based Recommender System”. Proceedings of the 29th Annual ACM Symposium on Applied Computing, 266–73.Suche in Google Scholar

Shao, Z., B. Yang, and Q. Liang. 2014. “Integrity Verification of Outsourced Digital Library Resources in Cloud Computing.” Library Tribune (Chinese) 30 (12): 98–103.Suche in Google Scholar

She, W., I. Yen, F. Bastani, B. Tran, and B. Thuraisingham. 2016. “Role-Based Integrated Access Control and Data Provenance for SOA Based Net-centric Systems.” IEEE Transactions on Services Computing 9 (6): 940–53.10.1109/TSC.2015.2432795Suche in Google Scholar

Shou, L., H. Bai, K. Chen, and G. Chen. 2012. “Supporting Privacy Protection in Personalized Web Search.” IEEE Transactions on Knowledge and Data Engineering 26 (2): 453–67.10.1109/TKDE.2012.201Suche in Google Scholar

Tian, H., Y. Zhang, C. Li, and C. X. Xing. 2017. “A Survey of Confidentiality Protection for Cloud Databases.” Chinese Journal of Computers 10: 2245–70.Suche in Google Scholar

Wang, Q., and R. Cao. 2016. “Investigation and Analysis of the Data Preservation Policy in British Universities.” Journal of Library Science in China (chinese) 42 (5): 102–15.Suche in Google Scholar

Wu, Z., G. Li, Q. Liu, G. Xu, and E. Chen. 2018d. “Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation.” IEEE Transactions on Services Computing 11 (3): 493–506.10.1109/TSC.2016.2575825Suche in Google Scholar

Wu, Z., J. Shi, C. Lu, E. Chen, G. Xu, G. Li, S. Xie, and P. S. Yu. 2015. “Constructing Plausible Innocuous Pseudo Queries to Protect User Query Intention.” Information Sciences 325: 215–26.10.1016/j.ins.2015.07.010Suche in Google Scholar

Wu, Z., J. Xie, C. Zheng, Z. Zhifeng, and C. Enhong. 2018a. “A Framework for the Protection of User Behavior Preference Privacy of Digital Library.” Journal of Library Science in China (chinese) 44 (2): 72–85.Suche in Google Scholar

Wu, Z., G. Xu, C. Lu, E. Chen, F. Jiang, and G. Li. 2018c. “An Effective Approach for the Protection of Privacy Text Data in the CloudDB.” World Wide Web 21 (4): 915–38.10.1007/s11280-017-0491-8Suche in Google Scholar

Wu, Z., C. Zheng, J. Xiejian, Z. Zhou, X. Guandong, and E. Chen. 2018b. “An Approach for the Protection of User Book Browsing Preference Privacy in a Digital Library.” The Electronic Library 36: 4.10.1108/EL-07-2017-0162Suche in Google Scholar

Xiang, L., and M. Xiang. 2018. “The Evolving Path of Chinese and Foreign Information Security Systems.” Journal of Library Science in China 44: 113–31.Suche in Google Scholar

Zhang, F., V. E. Lee, and R. Jin. 2014. “k-CoRating: Filling up Data to Obtain Privacy and Utility”. Proceedings of the AAAI Conference on Artificial Intelligence, 320–27.Suche in Google Scholar

Received: 2018-12-03
Accepted: 2019-03-30
Published Online: 2019-12-04
Published in Print: 2019-11-18

© 2019 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 31.10.2025 von https://www.degruyterbrill.com/document/doi/10.1515/libri-2018-0148/html?lang=de
Button zum nach oben scrollen