The Protection of User Preference Privacy in Personalized Information Retrieval: Challenges and Overviews

被引:11
作者
Wu, Zongda [1 ,2 ]
Lu, Chenglang [3 ]
Zhao, Youlin [2 ,4 ]
Xie, Jian [5 ]
Zou, Dongdong [6 ]
Su, Xinning [4 ]
机构
[1] Shaoxing Univ, Dept Comp Sci & Engn, Shaoxing, Peoples R China
[2] Nanjing Univ, Sch Informat Management, Nanjing, Jiangsu, Peoples R China
[3] Zhejiang Inst Mech & Elect Engn, Hangzhou, Peoples R China
[4] Nanjing Univ, Nanjing, Jiangsu, Peoples R China
[5] Shaoxing Univ, Shaoxing, Peoples R China
[6] Wenzhou Univ, Oujiang Coll, Wenzhou, Zhejiang, Peoples R China
来源
LIBRI-INTERNATIONAL JOURNAL OF LIBRARIES AND INFORMATION STUDIES | 2021年 / 71卷 / 03期
关键词
information retrieval; personalized; privacy protection; user preferences; LOCATION PRIVACY; ACCESS-CONTROL; K-ANONYMITY; MIX-ZONES; SEARCH; SERVICE; QUERIES;
D O I
10.1515/libri-2019-0140
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This paper reviews a large number of research achievements relevant to user privacy protection in an untrusted network environment, and then analyzes and evaluates their application limitations in personalized information retrieval, to establish the conditional constraints that an effective approach for user preference privacy protection in personalized information retrieval should meet, thus providing a basic reference for the solution of this problem. First, based on the basic framework of a personalized information retrieval platform, we establish a complete set of constraints for user preference privacy protection in terms of security, usability, efficiency, and accuracy. Then, we comprehensively review the technical features for all kinds of popular methods for user privacy protection, and analyze their application limitations in personalized information retrieval, according to the constraints of preference privacy protection. The results show that personalized information retrieval has higher requirements for users' privacy protection, i.e., it is required to comprehensively improve the security of users' preference privacy on the untrusted server-side, under the precondition of not changing the platform, algorithm, efficiency, and accuracy of personalized information retrieval. However, all kinds of existing privacy methods still cannot meet the above requirements. This paper is an important study attempt to the problem of user preference privacy protection of personalized information retrieval, which can provide a basic reference and direction for the further study of the problem.
引用
收藏
页码:227 / 237
页数:11
相关论文
共 54 条
[1]   User-side adaptive protection of location privacy in participatory sensing [J].
Agir, Berker ;
Papaioannou, Thanasis G. ;
Narendula, Rammohan ;
Aberer, Karl ;
Hubaux, Jean-Pierre .
GEOINFORMATICA, 2014, 18 (01) :165-191
[2]  
Andres M. E., 2013, ACM CCS, P901
[3]  
[Anonymous], 2012, ACM S APPL COMP
[4]   Map Services Based on Multiple Mix-zones with Location Privacy Protection over Road Network [J].
Arain, Qasim Ali ;
Deng, Zhongliang ;
Memon, Imran ;
Zubedi, Asma ;
Mangi, Farman Ali .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) :2617-2632
[5]   Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks [J].
Arain, Qasim Ali ;
Deng Zhongliang ;
Memon, Imran ;
Arain, Salman ;
Shaikh, Faisal Kareem ;
Zubedi, Asma ;
Unar, Mukhtiar Ali ;
Ashraf, Aisha ;
Shaikh, Roshan .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) :505-521
[6]   Versatile Query Scrambling for Private Web Search [J].
Arampatzis, Avi ;
Drosatos, George ;
Efraimidis, Pavlos S. .
INFORMATION RETRIEVAL JOURNAL, 2015, 18 (04) :331-358
[7]   Provably-Secure Time-Bound Hierarchical Key Assignment Schemes [J].
Ateniese, Giuseppe ;
De Santis, Alfredo ;
Ferrara, Anna Lisa ;
Masucci, Barbara .
JOURNAL OF CRYPTOLOGY, 2012, 25 (02) :243-270
[8]  
Bachlechner D., 2018, P 13 PRE ICIS WORKSH, P192
[9]  
Balasooriya P., 2017, LECT NOTES ELECT ENG, V10, P89
[10]   Quantum Private Information Retrieval has Linear Communication Complexity [J].
Baumeler, Aemin ;
Broadbent, Anne .
JOURNAL OF CRYPTOLOGY, 2015, 28 (01) :161-175