Abstract
This paper reviews a large number of research achievements relevant to user privacy protection in an untrusted network environment, and then analyzes and evaluates their application limitations in personalized information retrieval, to establish the conditional constraints that an effective approach for user preference privacy protection in personalized information retrieval should meet, thus providing a basic reference for the solution of this problem. First, based on the basic framework of a personalized information retrieval platform, we establish a complete set of constraints for user preference privacy protection in terms of security, usability, efficiency, and accuracy. Then, we comprehensively review the technical features for all kinds of popular methods for user privacy protection, and analyze their application limitations in personalized information retrieval, according to the constraints of preference privacy protection. The results show that personalized information retrieval has higher requirements for users’ privacy protection, i.e., it is required to comprehensively improve the security of users’ preference privacy on the untrusted server-side, under the precondition of not changing the platform, algorithm, efficiency, and accuracy of personalized information retrieval. However, all kinds of existing privacy methods still cannot meet the above requirements. This paper is an important study attempt to the problem of user preference privacy protection of personalized information retrieval, which can provide a basic reference and direction for the further study of the problem.
Funding source: National Social Science Foundation of ChinaNatural Science Foundation of Zhejiang Province
Award Identifier / Grant number: 19BTQ056
-
Research funding: This work is a research achievement from the Zhijiang Youth Project of Zhejiang Social Science Planning, and supported in part by the Major Humanities and Social Sciences Research Project of Zhejiang Provincial Universities (No. 2021GH017) and the Zhejiang Provincial Natural Science Foundation of China (LZ18F020001 and LY19F020018).
References
Agir, B., T. G. Papaioannou, R. Narendula, K. Aberer, and J.-P. Hubaux. 2014. “User-Side Adaptive Protection of Location Privacy in Participatory Sensing.” GeoInformatica 18: 165–91, https://doi.org/10.1007/s10707-013-0193-z.Search in Google Scholar
Andrés, M. E., N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. 2013. “Geo-indistinguishability: Differential Privacy for Location-Based Systems.” In Proceedings of the ACM Conference on Computer and Communications Security, 901–14.10.1145/2508859.2516735Search in Google Scholar
Arain, Q. A., Z. Deng, I. Memon, A. Zubedi, and F. A. Mangi. 2017. “Map Services Based on Multiple Mix-Zones with Location Privacy Protection Over Road Network.” Wireless Personal Communications 97 (3): 2617–32, https://doi.org/10.1007/s11277-017-4626-0.Search in Google Scholar
Arain, Q. A., Z. Deng, I. Memon, S. Arain, A. Kareem Shaikh, A. Zubedi, M. Ali Unar, A. Ashraf, and R. Shaikh. 2016. “Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication.” Wireless Personal Communications 95 (2): 1–17, https://doi.org/10.1007/s11277-016-3906-4.Search in Google Scholar
Arampatzis, A., G. Drosatos, and P. S. Efraimidis. 2015. “Versatile Query Scrambling for Private Web Search.” Information Retrieval Journal 18 (4): 331–58, doi:https://doi.org/10.1007/s10791-015-9256-0.Search in Google Scholar
Ateniese, G., A. De Santis, A. Lisa Ferrara, and B. Masucci. 2012. “Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.” Journal of Cryptology 25 (2): 243–70, https://doi.org/10.1007/s00145-010-9094-6.Search in Google Scholar
Bachlechner, D., K. La Fors, and A. M. Sears. 2018. “The Role of Privacy-Preserving Technologies in the Age of Big Data.” In Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy, 192–8.Search in Google Scholar
Balasooriya, P., S. Wibowo, and M. Wells. 2017. “Data Security and Privacy on the Cloud: Driving to the Next Era of Technology with Confidence.” Lecture Notes in Electrical Engineering 10: 89–102.10.1007/978-981-10-5281-1_22Search in Google Scholar
Baumeler, Ä., and A. Broadbent. 2013. “Quantum Private Information Retrieval Has Linear Communication Complexity.” Journal of Cryptology 28 (1): 161–75.10.1007/s00145-014-9180-2Search in Google Scholar
Bindschaedler, V., and R. Shokri. 2016. “Synthesizing Plausible Privacy-Preserving Location Traces.” In Proceedings of the 2016 IEEE Symposium on Security and Privacy, 79–87.10.1109/SP.2016.39Search in Google Scholar
Bordenabe, N. E., K. Chatzikokolakis, and C. Palamidessi. 2014. “Optimal Geo-Indistinguishable Mechanisms for Location Privacy.” In Proceedings of the ACM Conference on Computer and Communications Security, 251–62.10.1145/2660267.2660345Search in Google Scholar
Cao, D., X. He, L. Nie, X. Wei, X. Hu, S. Wu, and T.-S. Chua. 2017. “Cross-platform App Recommendation by Jointly Modeling Ratings and Texts.” ACM Transactions on Information Systems 35: 1–27, https://doi.org/10.1145/3017429.Search in Google Scholar
Chatzikokolakis, K., C. Palamidessi, and M. Stronati. 2015. “Constructing Elastic Distinguishability Metrics for Location Privacy.” In Proceedings of the Privacy Enhancing Technologies Symposium, 156–70.10.1515/popets-2015-0023Search in Google Scholar
Chow, C. Y., M. F. Mokbel, and W. G. Aref. 2009. “Casper*: Query Processing for Location Services without Compromising Privacy.” ACM Transactions on Database Systems 34: 1–48, https://doi.org/10.1145/1620585.1620591.Search in Google Scholar
Damiani, M. 2014. “Location Privacy Models in Mobile Applications: Conceptual View Research Directions.” GeoInformatica 18: 819–42, https://doi.org/10.1007/s10707-014-0205-7.Search in Google Scholar
Dewri, R., and R. Thurimella. 2014. “Exploiting Service Similarity for Privacy in Location-Based Search Queries.” IEEE Transactions on Parallel and Distributed Systems 25: 374–83, https://doi.org/10.1109/tpds.2013.34.Search in Google Scholar
Dewri, R., and R. Thurimella. 2016. “Mobile Local Search with Noisy Locations.” Pervasive and Mobile Computing 32: 78–92, https://doi.org/10.1016/j.pmcj.2016.04.014.Search in Google Scholar
Gao, S., J. Ma, W. Shi, G. Zhan, and C. Sun. 2013. “TrPF:A Trajectory Privacy Preserving Framework for Participatory Sensing.” IEEE Transactions on Information Forensics and Security 8 (6): 874–87, https://doi.org/10.1109/tifs.2013.2252618.Search in Google Scholar
Gedik, B., and L. Liu. 2008. “Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms.” IEEE Transactions on Mobile Computing 7: 1–18, https://doi.org/10.1109/tmc.2007.1062.Search in Google Scholar
Ghinita, G., P. Kalnis, K. Ali, C. Shahabi, and K.-L. Tan. 2008. “Private Queries in Location Based Services: Anonymizers Are Not Necessary.” In Proceedings of the SIGMOD International Conference on Management of Data, 121–32.10.1145/1376616.1376631Search in Google Scholar
Gupta, R., and U. Pratap Rao. 2017. “An Exploration to Location Based Service and its Privacy Preserving Techniques: A Survey.” Wireless Personal Communications 96: 1973–2007, https://doi.org/10.1007/s11277-017-4284-2.Search in Google Scholar
Kato, R., M. Iwata, and T. Hara. 2012. “A Dummy-Based Anonymization Method Based on User Trajectory with Pauses.” In Proceedings of the ACM SIGSPATIAL Conference on Advances in Geographic Information Systems, 289–300.10.1145/2424321.2424354Search in Google Scholar
Lee, A.-R., H.-I. I. Kim, and J.-W. Chang. 2012. “Grid-based Cloaking Area Creation Scheme Supporting Continuous Location-Based Services.” In Proceedings of the ACM Symposium on Applied Computing, 537–43.10.1145/2245276.2245379Search in Google Scholar
Li, Q., J. Ma, R. Li, X. Liu, J. Xiong, and D. Chen. 2016. “Secure, Efficient and Revocable Multi-Authority Access Control System in Cloud Storage.” Computers and Security 59: 45–59, https://doi.org/10.1016/j.cose.2016.02.002.Search in Google Scholar
Liu, X., Z. Han, M. Pan, H. Yue, X. Li, and Y. Fang. 2012. “Traffic-aware Multiple Mix-Zone Placement for Protecting Location Privacy.” In Proceedings of the IEEE International Conference on Computer Communications, 972–80.Search in Google Scholar
Lu, C., Z. Wu, M. Liu, W. Chen, and J. Guo. 2013. “A Patient Privacy Protection Scheme for Medical Information System.” Journal of Medical Systems 37: 9942, https://doi.org/10.1007/s10916-013-9982-z.Search in Google Scholar
Mai, J.-E. 2016. “Big Data Privacy: The Datafication of Personal Information.” The Information Society 32 (3): 192–9, https://doi.org/10.1080/01972243.2016.1153010.Search in Google Scholar
Mei, Z., H. Zhu, Z. Cui, Z. Wu, B. Wu, and C. Zhang. 2018. “Executing Multidimensional Range Query Efficiently and Flexibly Over Outsourced Ciphertext in the Cloud.” Information Sciences 432: 79–96, https://doi.org/10.1016/j.ins.2017.11.065.Search in Google Scholar
Mouratidis, K., and L. Y. Man. 2012. “Shortest Path Computation with No Information Leakage.” Proceedings of the VLDB Endowment 5 (8): 692–70, https://doi.org/10.14778/2212351.2212352.Search in Google Scholar
Murugesan, M., and W. Christopher. 2009. “Clifton. “Providing Privacy through Plausibly Deniable Search.” In Proceedings of the 2009 SIAM International Conference on Data Mining, 768–79.10.1137/1.9781611972795.66Search in Google Scholar
Narayanan, A., and V. Shmatikov. 2008. “Robust De-anonymization of Large Sparse Datasets.” In Proceedings of the IEEE Symposium on Security and Privacy, 111–25.10.1109/SP.2008.33Search in Google Scholar
Niu, B., Q. Li, X. Zhu, and H. Li. 2014. “Achieving k-Anonymity in Privacy-Aware Location-Based Services.” In Proceedings of the IEEE International Conference on Computer Communications, 754–62.10.1109/INFOCOM.2014.6848002Search in Google Scholar
Pang, H., J. Shen, and R. Krishnan. 2010. “Privacy-preserving Similarity-Based Text Retrieval.” ACM Transactions on Internet Technology 4 (1). Article 4.10.1145/1667067.1667071Search in Google Scholar
Pang, H., X. Xiao, and J. Shen. 2012. “Obfuscating the Topical Intention in Enterprise Text Search.” In Proceedings of the IEEE International Conference on Data Engineering, 1168–79.10.1109/ICDE.2012.43Search in Google Scholar
Papadopoulos, S., S. Bakiras, and D. Papadias. 2010. “Nearest Neighbor Search with Strong Location Privacy.” Proceedings of the VLDB Endowment 3 (1): 619–29, https://doi.org/10.14778/1920841.1920920.Search in Google Scholar
Power, D., M. Slaymaker, and A. Simpson. 2018. “On Formalizing and Normalizing Role-Based Access Control Systems.” The Computer Journal 52 (3): 305–25.10.1093/comjnl/bxn016Search in Google Scholar
Shang, S., Y. Hui, H. Pan, C. Paul, and S. Kulkarni. 2014. “Beyond Personalization and Anonymity: Towards a Group-Based Recommender System.” In Proceedings of the ACM Symposium on Applied Computing, 266–73.10.1145/2554850.2554924Search in Google Scholar
She, W., B. N. Tran, I.-L. Yen, F. Bastani, and B. Thuraisingham. 2016. “Role-based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems.” IEEE Transactions on Services Computing 9 (6): 940–53, https://doi.org/10.1109/tsc.2015.2432795.Search in Google Scholar
Sun, Y., B. Zhang, B. Zhao, X. Su, and J. Su. 2015. “Mix-Zones Optimal Deployment for Protecting Location Privacy in VANET.” Peer-to-Peer Networking and Applications 8 (6): 1108–21, https://doi.org/10.1007/s12083-014-0269-z.Search in Google Scholar
Viejo, A., and D. Sánchez. 2014. “Profiling Social Networks to Provide Useful and Privacy-Preserving Web Search.” Journal of the Association for Information Science and Technology 65 (12): 2444–58, https://doi.org/10.1002/asi.23144.Search in Google Scholar
Wang, S., Q. Hu, Y. Sun, and J. Huang. 2018. “Privacy Preservation in Location-Based Services.” IEEE Communications Magazine 56 (3): 134–40, https://doi.org/10.1109/mcom.2018.1700288.Search in Google Scholar
Wu, Z., G. Xu, Y. Zong, X. Yi, E. Chen, and Y. Zhang. 2012. “Executing SQL Queries Over Encrypted Character Strings in the Database-As-Service Model.” Knowledge-Based Systems 35: 332–48, https://doi.org/10.1016/j.knosys.2012.05.009.Search in Google Scholar
Wu, Z., J. Shi, C. Lu, E. Chen, and G. Xu. 2015. “Constructing Plausible Innocuous Pseudo Queries to Protect User Query Intention.” Information Sciences 325: 215–26, https://doi.org/10.1016/j.ins.2015.07.010.Search in Google Scholar
Wu, Z., G. Xu, C. Lu, E. Chen, F. Jiang, and G. Li. 2018a. “An Effective Approach for the Protection of Privacy Text Data in the CloudDB.” World Wide Web 21 (4): 915–38, https://doi.org/10.1007/s11280-017-0491-8.Search in Google Scholar
Wu, Z., G. Li, L. Qi, G. Xu, and E. Chen. 2018b. “Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation.” IEEE Transactions on Services Computing 11 (3): 493–506, https://doi.org/10.1109/tsc.2016.2575825.Search in Google Scholar
Wu, Z., C. Zheng, J. Xiejian, Z. Zhou, G. Xu, and E. Chen. 2018c. “An Approach for the Protection of User Book Browsing Preference Privacy in a Digital Library.” The Electronic Library 36 (6): 1154–66, https://doi.org/10.1108/el-07-2017-0162.Search in Google Scholar
Wu, Z., R. Li, Z. Zhou, J. Jiang, J. Guo, and X. Su. 2020. “A User Sensitive Subject Protection Approach for Book Search Service.” Journal of the Association for Information Science and Technology 712: 183–95, https://doi.org/10.1002/ASI.24227.Search in Google Scholar
Wu, Z., J. Xie, X. Lian, and J. Pan. 2019. “A Privacy Protection Approach for XML-Based Archives Management in a Cloud Environment.” The Electronic Library 37 (6): 970–83, https://doi.org/10.1108/el-05-2019-0127.Search in Google Scholar
Xie, H., X. Li, T. Wang, L. Chen, K. Li, F. Lee Wang, Y. Cai, Q. Li, and H. Min. 2015. “Personalized Search for Social Media Via Dominating Verbal Context.” Neurocomputing 172: 27–37.10.1016/j.neucom.2014.12.109Search in Google Scholar
Xue, A. Y., R. Zhang, Y. Zheng, X. Xie, J. Huang, and Z. Xu. 2013a. “Destination Prediction by Sub-trajectory Synthesis and Privacy Protection against Such Prediction.” In Proceedings of the IEEE International Conference on Data Engineering, 254–65.10.1109/ICDE.2013.6544830Search in Google Scholar
Xue, A. Y., R. Zhang, Y. Zheng, and X. Xie. 2013b. “DesTeller: A System for Destination Prediction Based on Trajectories with Privacy Protection.” Proceedings of the VLDB Endowment 6: 1198–201, https://doi.org/10.14778/2536274.2536275.Search in Google Scholar
Yilmaz, E., H. Ferhatosmanoglu, and E. Ayday. 2018. “Privacy-Preserving Aggregate Queries for Optimal Location Selection.” IEEE Transactions on Dependable and Secure Computing 16: 329–43.10.1109/TDSC.2017.2693986Search in Google Scholar
Zhang, W., Y. Lin, S. Xiao, J. Wu, and S. Zhou. 2016. “Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing.” IEEE Transactions on Computers 65 (5): 1566–77, https://doi.org/10.1109/tc.2015.2448099.Search in Google Scholar
Zhang, X., X. Gui, and Z. Wu. 2015. “Privacy Preservation for Location-Based Services: A Survey.” Chinese Journal of Software 26 (9): 2373–90.Search in Google Scholar
© 2021 Walter de Gruyter GmbH, Berlin/Boston
Articles in the same Issue
- Frontmatter
- Articles
- Some Thoughts Evoked by Peter Lor, Bradley Wiles, and Johannes Britz, “Re-thinking Information Ethics: Truth, Conspiracy Theories, and Librarians in the COVID-19 Era,” in LIBRI, March 2021
- The Protection of User Preference Privacy in Personalized Information Retrieval: Challenges and Overviews
- The Perception of Library and Information Science (LIS) Professionals about Research Data Management Services in University Libraries of Pakistan
- Augmented Reality for Supporting Adult-child Shared Reading
- Critical Perspectives on Diversity and Equality in U.S. LIS Practice: Four HBCU-affiliated Leaders Weigh in
- Student Experiences with Digital Citizenship: A Comparative Cultural Study
- An Unbalanced and Inadequate Development of the Chinese Public Libraries’ Public Culture Services: An Investigation of 31 Senior Library Specialists
Articles in the same Issue
- Frontmatter
- Articles
- Some Thoughts Evoked by Peter Lor, Bradley Wiles, and Johannes Britz, “Re-thinking Information Ethics: Truth, Conspiracy Theories, and Librarians in the COVID-19 Era,” in LIBRI, March 2021
- The Protection of User Preference Privacy in Personalized Information Retrieval: Challenges and Overviews
- The Perception of Library and Information Science (LIS) Professionals about Research Data Management Services in University Libraries of Pakistan
- Augmented Reality for Supporting Adult-child Shared Reading
- Critical Perspectives on Diversity and Equality in U.S. LIS Practice: Four HBCU-affiliated Leaders Weigh in
- Student Experiences with Digital Citizenship: A Comparative Cultural Study
- An Unbalanced and Inadequate Development of the Chinese Public Libraries’ Public Culture Services: An Investigation of 31 Senior Library Specialists