An approach for the protection of users' book browsing preference privacy in a digital library

被引:18
作者
Wu, Zongda [1 ]
Zheng, Chengren [2 ]
Xiejian, Jian [2 ]
Zhou, Zhifeng [2 ]
Xu, Guandong [3 ]
Chen, Enhong [4 ]
机构
[1] Wenzhou Univ, Oujiang Coll, Wenzhou, Peoples R China
[2] Wenzhou Univ, Wenzhou, Peoples R China
[3] Univ Technol, Sydney, NSW, Australia
[4] Univ Sci & Technol China, Hefei, Anhui, Peoples R China
关键词
Digital library; Behaviour preference; Book browsing; Personal privacy; QUERIES;
D O I
10.1108/EL-07-2017-0162
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose The problem of privacy protection in digital libraries is causing people to have increasingly extensive concerns. This study aims to design an approach to protect the preference privacy behind users' book browsing behaviors in a digital library. Design/methodology/approach This paper proposes a client-based approach, whose basic idea is to construct a group of plausible book browsing dummy behaviors, and submit them together with users' true behaviors to the untrusted server, to cover up users' sensitive preferences. Findings Both security analysis and evaluation experiment demonstrate the effectiveness of the approach, which can ensure the privacy security of users' book browsing preferences on the untrusted digital library server, without compromising the usability, accuracy and efficiency of book services. Originality/value To the best of the authors' knowledge, this paper provides the first attempt to the protection of users' behavior privacy in digital libraries, which will have a positive influence on the development of privacy-preserving libraries in the new network era.
引用
收藏
页码:1154 / 1166
页数:13
相关论文
共 23 条
[1]  
Al-Suqri Mohammed Nasser, 2012, International Journal of Digital Library Systems, V3, P54, DOI 10.4018/ijdls.2012100103
[2]  
Chen G, 2011, PROCEEDINGS OF THE 34TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR'11), P615
[3]   Private information retrieval [J].
Chor, B ;
Goldreich, O ;
Kushilevitz, E ;
Sudan, M .
JOURNAL OF THE ACM, 1998, 45 (06) :965-982
[4]  
Gangadharan S.P., 2017, J LAW POLICY INFORM, V13, P175
[5]   Risk assessment of digital library information security: a case study [J].
Han, Zhengbiao ;
Huang, Shuiqing ;
Li, Huan ;
Ren, Ni .
ELECTRONIC LIBRARY, 2016, 34 (03) :471-487
[6]   Blind evaluation of location based queries using space transformation to preserve location privacy [J].
Khoshgozaran, Ali ;
Shirani-Mehr, Houtan ;
Shahabi, Cyrus .
GEOINFORMATICA, 2013, 17 (04) :599-634
[7]  
Li C., 2015, INFORM SCI CHINESE, V33, P76
[8]  
Li D., 2010, J LIB SCI CHINA CHIN, V36, P17
[9]  
Murugesan Mummoorthy., 2009, PROVIDING PRIVACY PL, P768
[10]   Robust de-anonymization of large sparse datasets [J].
Narayanan, Arvind ;
Shmatikov, Vitaly .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :111-125