A dummy-based user privacy protection approach for text information retrieval

被引:147
作者
Wu, Zongda [1 ,3 ]
Shen, Shigen [1 ]
Lian, Xinze [2 ]
Su, Xinning [3 ]
Chen, Enhong [4 ]
机构
[1] Shaoxing Univ, Dept Comp Sci & Engn, Shaoxing 312000, Zhejiang, Peoples R China
[2] Wenzhou Univ, Oujiang Coll, Wenzhou 325035, Zhejiang, Peoples R China
[3] Nanjing Univ, Sch Informat Management, Nanjing 210023, Jiangsu, Peoples R China
[4] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230027, Anhui, Peoples R China
关键词
Text retrieval; Privacy protection; Feature distribution; Topic significance; WEB SEARCH; QUERIES; SCHEME;
D O I
10.1016/j.knosys.2020.105679
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Text retrieval enables people to efficiently obtain the desired data from massive text data, so has become one of the most popular services in information retrieval community. However, while providing great convenience for users, text retrieval results in a serious issue on user privacy. In this paper, we propose a dummy-based approach for text retrieval privacy protection. Its basic idea is to use well-designed dummy queries to cover up user queries and thus protect user privacy. First, we present a client-based system framework for the protection of user privacy, which requires no change to the existing algorithm of text retrieval, and no compromise to the accuracy of text retrieval. Second, we define a user privacy model to formulate the requirements that ideal dummy queries should meet, i.e., (1) having highly similar feature distributions with user queries, and (2) effectively reducing the significance of user query topics. Third, by means of the knowledge derived from Wikipedia, we present an implementation algorithm to construct a group of ideal dummy queries that can well meet the privacy model. Finally, we demonstrate the effectiveness of our approach by theoretical analysis and experimental evaluation. The results show that by constructing dummy queries that have similar feature distributions but unrelated topics with user queries, the privacy behind users' textual queries can be effectively protected, under the precondition of not compromising the accuracy and usability of text retrieval. (C) 2020 Published by Elsevier B.V.
引用
收藏
页数:14
相关论文
共 33 条
[1]   Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks [J].
Arain, Qasim Ali ;
Memon, Imran ;
Deng, Zhongliang ;
Memon, Muhammad Hammad ;
Mangi, Farman Ali ;
Zubedi, Asma .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) :5563-5607
[2]   Behavior-Based Personalization in Web Search [J].
Cai, Fei ;
Wang, Shuaiqiang ;
de Rijke, Maarten .
JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, 2017, 68 (04) :855-868
[3]   A survey of privacy enhancing technologies for smart cities [J].
Curzon, James ;
Almehmadi, Abdulaziz ;
El-Khatib, Khalil .
PERVASIVE AND MOBILE COMPUTING, 2019, 55 :76-95
[4]   Efficient Recommendation of De-Identification Policies Using MapReduce [J].
Ding, Xiaofeng ;
Wang, Li ;
Shao, Zhiyuan ;
Jin, Hai .
IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) :343-354
[5]   A Dummy-Based Approach for Preserving Source Rate Privacy [J].
Diyanat, Abolfazl ;
Khonsari, Ahmad ;
Shariatpanahi, Seyed Pooya .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1321-1332
[6]   Efficient Private Information Retrieval Over Unsynchronized Databases [J].
Fanti, Giulia ;
Ramchandran, Kannan .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2015, 9 (07) :1229-1239
[7]   Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption [J].
Han, Jinguang ;
Yang, Ye ;
Huang, Xinyi ;
Yuen, Tsz Hon ;
Li, Jiguo ;
Cao, Jie .
INFORMATION SCIENCES, 2016, 345 :143-155
[8]   Internet of things security: A top-down survey [J].
Kouicem, Djamel Eddine ;
Bouabdallah, Abdelmadjid ;
Lakhlef, Hicham .
COMPUTER NETWORKS, 2018, 141 :199-221
[9]   An efficient and provably secure time-limited key management scheme for outsourced data [J].
Kumar, Naveen ;
Tiwari, Shailesh ;
Zheng, Zhigao ;
Mishra, Krishn K. ;
Sangaiah, Arun Kumar .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (15)
[10]  
[李凤华 Li Fenghua], 2015, [通信学报, Journal on Communications], V36, P114