How to protect reader lending privacy under a cloud environment: a technical method

被引:23
作者
Wu, Zongda [1 ]
Shen, Shigen [2 ]
Lu, Chenglang [3 ]
Li, Huxiong [2 ]
Su, Xinning [4 ]
机构
[1] Shaoxing Univ, Dept Comp Sci & Engn, Shaoxing, Peoples R China
[2] Shaoxing Univ, Shaoxing, Peoples R China
[3] Zhejiang Inst Mech & Elect Engn, Hangzhou, Peoples R China
[4] Nanjing Univ, Nanjing, Peoples R China
关键词
Cloud environment; Digital library; Lending privacy; Literature record;
D O I
10.1108/LHT-07-2020-0178
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose In this paper, the authors propose an effective mechanism for the protection of digital library readers' lending privacy under a cloud environment. Design/methodology/approach The basic idea of the method is that for each literature circulation record, before being submitted to the untrusted cloud database of a digital library for storage, its reader number has to be encrypted strictly at a client, so as to make it unable for an attacker at the cloud to know the specific reader associated with each circulation record and thus protect readers' lending privacy. Moreover, the authors design an effective method for querying the encrypted literature circulation records, so as to ensure the accuracy and efficiency of each kind of database queries related to the encrypted reader number field of literature circulation records. Findings Finally, both theoretical analysis and experimental evaluation demonstrate the effectiveness of the proposed methods. Originality/value This paper presents the first study attempt to the privacy protection of readers' literature circulations, which can improve the security of readers' lending privacy in the untrusted cloud, without compromising the accuracy and efficiency of each kind of database queries in the digital library. It is of positive significance to construct a privacy-preserving digital library platform.
引用
收藏
页码:1746 / 1765
页数:20
相关论文
共 33 条
  • [1] Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks
    Arain, Qasim Ali
    Deng Zhongliang
    Memon, Imran
    Arain, Salman
    Shaikh, Faisal Kareem
    Zubedi, Asma
    Unar, Mukhtiar Ali
    Ashraf, Aisha
    Shaikh, Roshan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 505 - 521
  • [2] Range query estimation with data skewness for top-k retrieval
    Ayanso, Anteneh
    Goes, Paulo B.
    Mehta, Kumar
    [J]. DECISION SUPPORT SYSTEMS, 2014, 57 : 258 - 273
  • [3] Metadata and universal access in digital library environments
    Beyene, Wondwossen Mulualem
    [J]. LIBRARY HI TECH, 2017, 35 (02) : 210 - 221
  • [4] Multifactor Identity Verification Using Aggregated Proof of Knowledge
    Bhargav-Spantzel, Abhilasha
    Squicciarini, Anna Cinzia
    Xue, Rui
    Bertino, Elisa
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (04): : 372 - 383
  • [5] Large Age-Gap face verification by feature injection in deep networks
    Bianco, Simone
    [J]. PATTERN RECOGNITION LETTERS, 2017, 90 : 36 - 42
  • [6] Chu, 2019, J LIB SCI CHINA, V45, P12
  • [7] Gangadharan S.P., 2017, J LAW POLICY INFORM, V13, P175
  • [8] Guesmi H., 2013, Multimedia Tools and Applications, V74, P3253
  • [9] Statistical study of characteristics of online reading behavior networks in university digital library
    Han, Lihong
    Zhang, Gaofeng
    Yong, Binbin
    He, Qiang
    Feng, Fang
    Zhou, Qingguo
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2019, 22 (03): : 1175 - 1187
  • [10] Risk assessment of digital library information security: a case study
    Han, Zhengbiao
    Huang, Shuiqing
    Li, Huan
    Ren, Ni
    [J]. ELECTRONIC LIBRARY, 2016, 34 (03) : 471 - 487