Home An Effective Approach for the Protection of User Privacy in a Digital Library
Article
Licensed
Unlicensed Requires Authentication

An Effective Approach for the Protection of User Privacy in a Digital Library

  • Zongda Wu , Jian Xie , Jun Pan EMAIL logo and Xining Su
Published/Copyright: December 4, 2019

Abstract

In a digital library, an increasingly important problem is how to prevent the exposure of user privacy in an untrusted network. This study aims to design an effective approach for the protection of user privacy in a digital library, by consulting the basic ideas of encryption and anonymization. In our proposed approach, any privacy data, which can identify user’s real identity, should be encrypted first before being submitted to the library server, to achieve anonymization of user identity. Then, to solve the problem of querying encrypted privacy data, additional feature data are constructed for the encrypted data, such that much of the query processing can be completed at the server-side, without decrypting the data, thereby improving the efficiency of each kind of user query operation. Both theoretical analysis and experimental evaluation demonstrate the effectiveness of the approach, which can improve the security of users’ data privacy and behavior privacy on the untrusted server-side, without compromising the availability (i. e. accuracy, efficiency, and usability) of digital library services. This paper provides a valuable study attempt at the protection of digital library users’ privacy, which has a positive influence on the development of a privacy-preserving library in an untrusted network environment.

Acknowledgements

This study is supported by the National Social Science Foundation of China “Research on Semantic Model for the Protection of Users’ Preference Privacy in Personalized Information Retrieval” (No. 19BTQ056).

References

Chen, G., H. Bai, L. Shou, K. Chen, and Y. Gao. 2011. “UPS: Efficient Privacy Protection in Personalized Web Search”. Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval, 615–24.Search in Google Scholar

Choi, S. G., D. Dachman-Soled, T. Malkin, and H. Wee. 2017. “A Black-box Construction of Non-malleable Encryption from Semantically Secure Encryption.” Journal of Cryptology 2: 1–30.10.1007/s00145-017-9254-zSearch in Google Scholar

Ding, W., Z. Yan, and R. H. Deng. 2017. “Encrypted Data Processing with Homomorphic Re-encryption.” Information Science 409: 35–45.10.1016/j.ins.2017.05.004Search in Google Scholar

Gangadharan, S. P. 2017. “Library Privacy in Practice: System Change and Challenges.” A Journal of Law and Policy for the Information Society 13 (1): 175–98.Search in Google Scholar

Han, J., Y. Yang, X. Huang, T. H. Yuen, J. Li, and J. Cao. 2016b. “Accountable Mobile E-commerce Scheme via Identity-based Plaintext-checkable Encryption.” Information Sciences 345: 143–55.10.1016/j.ins.2016.01.045Search in Google Scholar

Han, Z., S. Huang, H. Li, and N. Ren. 2016a. “Risk Assessment of Digital Library Information Security: A Case Study.” The Electronic Library 34 (3): 471–87.10.1108/EL-09-2014-0158Search in Google Scholar

Juan, V., P. Josep, and H. S. Juan. 2014. “DocCloud: A Document Recommender System on Cloud Computing with Plausible Deniability.” Information Sciences 258 (10): 387–402.10.1016/j.ins.2013.04.007Search in Google Scholar

Li, C., W. Zhang, and Y. Lang. 2015. “Dynamic Risk Assessment Model of Information System Security in Digital Library.” Information Science (Chinese) 33 (5): 76–80.Search in Google Scholar

Li, C. T., C. L. Chen, C. C. Lee, C. Y. Weng, and C. M. Chen. 2017. “A Novel Three-party Password-Based Authenticated Key Exchange Protocol with User Anonymity Based on Chaotic Maps.” Soft Computing 6: 1–12.10.1007/s00500-017-2504-zSearch in Google Scholar

Li, D., and Cai, B. 2010. “Protect Reader’s Rights and Interests in Public Library by Rules and Regulations.” Journal of Library Science in China (chinese) 36 (4): 17–23.Search in Google Scholar

Li, Q., J. Ma, R. Li, X. Liu, J. Xiong, and D. Chen. 2016. “Secure, Efficient and Revocable Multi-authority Access Control System in Cloud Storage.” Computers and Security 59: 45–59.10.1016/j.cose.2016.02.002Search in Google Scholar

Mei, Z., H. Zhu, Z. Cui, Z. Wu, G. Peng, B. Wu, and C. Zhang. 2018. “Executing Multidimensional Range Query Efficiently and Flexibly over Outsourced Ciphertext in the Cloud.” Information Sciences 432: 79–96.10.1016/j.ins.2017.11.065Search in Google Scholar

Mironov, I., O. Pandey, O. Reingold, and G. Segev. 2018. “Incremental Deterministic Public-key Encryption.” Journal of Cryptology 31 (1): 134–61.10.1007/s00145-017-9252-1Search in Google Scholar

Power, D., M. Slaymaker, and A. Simpson. 2018. “On Formalizing and Normalizing Role-based Access Control Systems.” The Computer Journal 52 (3): 305–25.10.1093/comjnl/bxn016Search in Google Scholar

Shang, S., Y. Hui, P. Hui, P. Cuff, and S. Kulkarni. 2014. “Beyond Personalization and Anonymity: Towards a Group-based Recommender System”. Proceedings of the 29th Annual ACM Symposium on Applied Computing, 266–73.Search in Google Scholar

Shao, Z., B. Yang, and Q. Liang. 2014. “Integrity Verification of Outsourced Digital Library Resources in Cloud Computing.” Library Tribune (Chinese) 30 (12): 98–103.Search in Google Scholar

She, W., I. Yen, F. Bastani, B. Tran, and B. Thuraisingham. 2016. “Role-Based Integrated Access Control and Data Provenance for SOA Based Net-centric Systems.” IEEE Transactions on Services Computing 9 (6): 940–53.10.1109/TSC.2015.2432795Search in Google Scholar

Shou, L., H. Bai, K. Chen, and G. Chen. 2012. “Supporting Privacy Protection in Personalized Web Search.” IEEE Transactions on Knowledge and Data Engineering 26 (2): 453–67.10.1109/TKDE.2012.201Search in Google Scholar

Tian, H., Y. Zhang, C. Li, and C. X. Xing. 2017. “A Survey of Confidentiality Protection for Cloud Databases.” Chinese Journal of Computers 10: 2245–70.Search in Google Scholar

Wang, Q., and R. Cao. 2016. “Investigation and Analysis of the Data Preservation Policy in British Universities.” Journal of Library Science in China (chinese) 42 (5): 102–15.Search in Google Scholar

Wu, Z., G. Li, Q. Liu, G. Xu, and E. Chen. 2018d. “Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation.” IEEE Transactions on Services Computing 11 (3): 493–506.10.1109/TSC.2016.2575825Search in Google Scholar

Wu, Z., J. Shi, C. Lu, E. Chen, G. Xu, G. Li, S. Xie, and P. S. Yu. 2015. “Constructing Plausible Innocuous Pseudo Queries to Protect User Query Intention.” Information Sciences 325: 215–26.10.1016/j.ins.2015.07.010Search in Google Scholar

Wu, Z., J. Xie, C. Zheng, Z. Zhifeng, and C. Enhong. 2018a. “A Framework for the Protection of User Behavior Preference Privacy of Digital Library.” Journal of Library Science in China (chinese) 44 (2): 72–85.Search in Google Scholar

Wu, Z., G. Xu, C. Lu, E. Chen, F. Jiang, and G. Li. 2018c. “An Effective Approach for the Protection of Privacy Text Data in the CloudDB.” World Wide Web 21 (4): 915–38.10.1007/s11280-017-0491-8Search in Google Scholar

Wu, Z., C. Zheng, J. Xiejian, Z. Zhou, X. Guandong, and E. Chen. 2018b. “An Approach for the Protection of User Book Browsing Preference Privacy in a Digital Library.” The Electronic Library 36: 4.10.1108/EL-07-2017-0162Search in Google Scholar

Xiang, L., and M. Xiang. 2018. “The Evolving Path of Chinese and Foreign Information Security Systems.” Journal of Library Science in China 44: 113–31.Search in Google Scholar

Zhang, F., V. E. Lee, and R. Jin. 2014. “k-CoRating: Filling up Data to Obtain Privacy and Utility”. Proceedings of the AAAI Conference on Artificial Intelligence, 320–27.Search in Google Scholar

Received: 2018-12-03
Accepted: 2019-03-30
Published Online: 2019-12-04
Published in Print: 2019-11-18

© 2019 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 31.10.2025 from https://www.degruyterbrill.com/document/doi/10.1515/libri-2018-0148/html?lang=en
Scroll to top button