Abstract
In a digital library, an increasingly important problem is how to prevent the exposure of user privacy in an untrusted network. This study aims to design an effective approach for the protection of user privacy in a digital library, by consulting the basic ideas of encryption and anonymization. In our proposed approach, any privacy data, which can identify user’s real identity, should be encrypted first before being submitted to the library server, to achieve anonymization of user identity. Then, to solve the problem of querying encrypted privacy data, additional feature data are constructed for the encrypted data, such that much of the query processing can be completed at the server-side, without decrypting the data, thereby improving the efficiency of each kind of user query operation. Both theoretical analysis and experimental evaluation demonstrate the effectiveness of the approach, which can improve the security of users’ data privacy and behavior privacy on the untrusted server-side, without compromising the availability (i. e. accuracy, efficiency, and usability) of digital library services. This paper provides a valuable study attempt at the protection of digital library users’ privacy, which has a positive influence on the development of a privacy-preserving library in an untrusted network environment.
Acknowledgements
This study is supported by the National Social Science Foundation of China “Research on Semantic Model for the Protection of Users’ Preference Privacy in Personalized Information Retrieval” (No. 19BTQ056).
References
Chen, G., H. Bai, L. Shou, K. Chen, and Y. Gao. 2011. “UPS: Efficient Privacy Protection in Personalized Web Search”. Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval, 615–24.Suche in Google Scholar
Choi, S. G., D. Dachman-Soled, T. Malkin, and H. Wee. 2017. “A Black-box Construction of Non-malleable Encryption from Semantically Secure Encryption.” Journal of Cryptology 2: 1–30.10.1007/s00145-017-9254-zSuche in Google Scholar
Ding, W., Z. Yan, and R. H. Deng. 2017. “Encrypted Data Processing with Homomorphic Re-encryption.” Information Science 409: 35–45.10.1016/j.ins.2017.05.004Suche in Google Scholar
Gangadharan, S. P. 2017. “Library Privacy in Practice: System Change and Challenges.” A Journal of Law and Policy for the Information Society 13 (1): 175–98.Suche in Google Scholar
Han, J., Y. Yang, X. Huang, T. H. Yuen, J. Li, and J. Cao. 2016b. “Accountable Mobile E-commerce Scheme via Identity-based Plaintext-checkable Encryption.” Information Sciences 345: 143–55.10.1016/j.ins.2016.01.045Suche in Google Scholar
Han, Z., S. Huang, H. Li, and N. Ren. 2016a. “Risk Assessment of Digital Library Information Security: A Case Study.” The Electronic Library 34 (3): 471–87.10.1108/EL-09-2014-0158Suche in Google Scholar
Juan, V., P. Josep, and H. S. Juan. 2014. “DocCloud: A Document Recommender System on Cloud Computing with Plausible Deniability.” Information Sciences 258 (10): 387–402.10.1016/j.ins.2013.04.007Suche in Google Scholar
Li, C., W. Zhang, and Y. Lang. 2015. “Dynamic Risk Assessment Model of Information System Security in Digital Library.” Information Science (Chinese) 33 (5): 76–80.Suche in Google Scholar
Li, C. T., C. L. Chen, C. C. Lee, C. Y. Weng, and C. M. Chen. 2017. “A Novel Three-party Password-Based Authenticated Key Exchange Protocol with User Anonymity Based on Chaotic Maps.” Soft Computing 6: 1–12.10.1007/s00500-017-2504-zSuche in Google Scholar
Li, D., and Cai, B. 2010. “Protect Reader’s Rights and Interests in Public Library by Rules and Regulations.” Journal of Library Science in China (chinese) 36 (4): 17–23.Suche in Google Scholar
Li, Q., J. Ma, R. Li, X. Liu, J. Xiong, and D. Chen. 2016. “Secure, Efficient and Revocable Multi-authority Access Control System in Cloud Storage.” Computers and Security 59: 45–59.10.1016/j.cose.2016.02.002Suche in Google Scholar
Mei, Z., H. Zhu, Z. Cui, Z. Wu, G. Peng, B. Wu, and C. Zhang. 2018. “Executing Multidimensional Range Query Efficiently and Flexibly over Outsourced Ciphertext in the Cloud.” Information Sciences 432: 79–96.10.1016/j.ins.2017.11.065Suche in Google Scholar
Mironov, I., O. Pandey, O. Reingold, and G. Segev. 2018. “Incremental Deterministic Public-key Encryption.” Journal of Cryptology 31 (1): 134–61.10.1007/s00145-017-9252-1Suche in Google Scholar
Power, D., M. Slaymaker, and A. Simpson. 2018. “On Formalizing and Normalizing Role-based Access Control Systems.” The Computer Journal 52 (3): 305–25.10.1093/comjnl/bxn016Suche in Google Scholar
Shang, S., Y. Hui, P. Hui, P. Cuff, and S. Kulkarni. 2014. “Beyond Personalization and Anonymity: Towards a Group-based Recommender System”. Proceedings of the 29th Annual ACM Symposium on Applied Computing, 266–73.Suche in Google Scholar
Shao, Z., B. Yang, and Q. Liang. 2014. “Integrity Verification of Outsourced Digital Library Resources in Cloud Computing.” Library Tribune (Chinese) 30 (12): 98–103.Suche in Google Scholar
She, W., I. Yen, F. Bastani, B. Tran, and B. Thuraisingham. 2016. “Role-Based Integrated Access Control and Data Provenance for SOA Based Net-centric Systems.” IEEE Transactions on Services Computing 9 (6): 940–53.10.1109/TSC.2015.2432795Suche in Google Scholar
Shou, L., H. Bai, K. Chen, and G. Chen. 2012. “Supporting Privacy Protection in Personalized Web Search.” IEEE Transactions on Knowledge and Data Engineering 26 (2): 453–67.10.1109/TKDE.2012.201Suche in Google Scholar
Tian, H., Y. Zhang, C. Li, and C. X. Xing. 2017. “A Survey of Confidentiality Protection for Cloud Databases.” Chinese Journal of Computers 10: 2245–70.Suche in Google Scholar
Wang, Q., and R. Cao. 2016. “Investigation and Analysis of the Data Preservation Policy in British Universities.” Journal of Library Science in China (chinese) 42 (5): 102–15.Suche in Google Scholar
Wu, Z., G. Li, Q. Liu, G. Xu, and E. Chen. 2018d. “Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation.” IEEE Transactions on Services Computing 11 (3): 493–506.10.1109/TSC.2016.2575825Suche in Google Scholar
Wu, Z., J. Shi, C. Lu, E. Chen, G. Xu, G. Li, S. Xie, and P. S. Yu. 2015. “Constructing Plausible Innocuous Pseudo Queries to Protect User Query Intention.” Information Sciences 325: 215–26.10.1016/j.ins.2015.07.010Suche in Google Scholar
Wu, Z., J. Xie, C. Zheng, Z. Zhifeng, and C. Enhong. 2018a. “A Framework for the Protection of User Behavior Preference Privacy of Digital Library.” Journal of Library Science in China (chinese) 44 (2): 72–85.Suche in Google Scholar
Wu, Z., G. Xu, C. Lu, E. Chen, F. Jiang, and G. Li. 2018c. “An Effective Approach for the Protection of Privacy Text Data in the CloudDB.” World Wide Web 21 (4): 915–38.10.1007/s11280-017-0491-8Suche in Google Scholar
Wu, Z., C. Zheng, J. Xiejian, Z. Zhou, X. Guandong, and E. Chen. 2018b. “An Approach for the Protection of User Book Browsing Preference Privacy in a Digital Library.” The Electronic Library 36: 4.10.1108/EL-07-2017-0162Suche in Google Scholar
Xiang, L., and M. Xiang. 2018. “The Evolving Path of Chinese and Foreign Information Security Systems.” Journal of Library Science in China 44: 113–31.Suche in Google Scholar
Zhang, F., V. E. Lee, and R. Jin. 2014. “k-CoRating: Filling up Data to Obtain Privacy and Utility”. Proceedings of the AAAI Conference on Artificial Intelligence, 320–27.Suche in Google Scholar
© 2019 Walter de Gruyter GmbH, Berlin/Boston
Artikel in diesem Heft
- Frontmatter
- Best Student Research Paper Award
- Circling the Reality of Public Institutions: An e-Delphi Study of Information, Culture, and Community Stakeholders Voicing the Way Forward in Detroit, Michigan
- Articles
- Periodic Information-seeking Behaviors of First-time Mothers in China
- A Study on the Library’s Cultural Value Based on the Perceptions of Users and Librarians in Korea
- Information Literacy Self-Efficacy of Business Students in Pakistan
- An Effective Approach for the Protection of User Privacy in a Digital Library
- Knowledge Sharing at the Overstrand Municipality in Western Cape Hermanus, South Africa
- Miscellaneous
- Best Student Research Paper Award 2020
Artikel in diesem Heft
- Frontmatter
- Best Student Research Paper Award
- Circling the Reality of Public Institutions: An e-Delphi Study of Information, Culture, and Community Stakeholders Voicing the Way Forward in Detroit, Michigan
- Articles
- Periodic Information-seeking Behaviors of First-time Mothers in China
- A Study on the Library’s Cultural Value Based on the Perceptions of Users and Librarians in Korea
- Information Literacy Self-Efficacy of Business Students in Pakistan
- An Effective Approach for the Protection of User Privacy in a Digital Library
- Knowledge Sharing at the Overstrand Municipality in Western Cape Hermanus, South Africa
- Miscellaneous
- Best Student Research Paper Award 2020