Abstract
In this article, aiming at a Chinese keyword-based book search service, from a technological perspective, we propose to modify a user query sequence carefully to confuse the user query topics and thus protect the user topic privacy on the untrusted server, without compromising the accuracy of each book search service. First, we propose a client-based framework for the privacy protection of book search, and then a privacy model to formulate the constraints in terms of accuracy, efficiency, and security, which the cover queries generated based on a user query sequence should meet. Second, we present a modification algorithm for a user query sequence, based on some heuristic strategies, which can quickly generate a cover query sequence meeting the privacy model by replacing, deleting, and adding keywords for each user query. Finally, both theoretical analysis and experimental evaluation demonstrate the effectiveness of the proposed approach, i.e., which can improve the security of users’ topic privacy on the untrusted server without compromising the efficiency, accuracy, and usability of an existing Chinese keyword book search service, so it has a positive impact for the construction of a privacy-preserving text retrieval platform under an untrusted network environment.
- . 2021. Privacy laws and privacy by design schemes for the internet of things: A developers perspective. ACM Comput. Surv. 54, 5 (2021), 1–38.Google Scholar
Digital Library
- . 2015. Versatile query scrambling for private web search. Inf. Retr. J. 18, 4 (2015), 331–358.Google Scholar
Digital Library
- . 2019. Noisy private information retrieval: On separability of channel coding and information retrieval. IEEE Trans. Inf. Theor. 65, 12 (2019), 8232–8249.Google Scholar
Digital Library
- . 2022. Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. Peer-to-Peer Netw. Applic. 15, 1 (2022), 461–472.Google Scholar
Cross Ref
- . 2022. Secure frequency control of hybrid power system under DoS attacks via lie algebra. IEEE Trans. Inf. Forens. Secur. 17 (2022), 1172–1184.Google Scholar
Cross Ref
- . 2018. Internet of cloud: Security and privacy issues. In Cloud Computing for Optimization: Foundations, Applications, and Challenges. Springer, 271–301.Google Scholar
- . 2022. MSEva: A musculoskeletal rehabilitation evaluation system based on EMG signals. ACM Trans. Sensor Netw. 19, 1 (2022), 1–23.Google Scholar
- . 2016. A dummy-based approach for preserving source rate privacy. IEEE Trans. Inf. Forens. Secur. 11, 6 (2016), 1321–1332.Google Scholar
Digital Library
- . 2019. Differential privacy for power grid obfuscation. IEEE Trans. Smart Grid 11, 2 (2019), 1356–1366.Google Scholar
Cross Ref
- . 2018. Dummy generation based on user-movement estimation for location privacy protection. IEEE Access 6 (2018), 22958–22969.Google Scholar
Cross Ref
- . 2021. Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Comput. Surv. 54, 1 (2021), 1–36.Google Scholar
- . 2019. Book search using social information, user profiles and query expansion with pseudo relevance feedback. Appl. Intell. 49, 6 (2019), 2178–2200.Google Scholar
Digital Library
- . 2017. Consensus of nonlinear second-order multi-agent systems with mixed time-delays and intermittent communications. Neurocomputing 251 (2017), 115–126.Google Scholar
Digital Library
- . 2020. A multi-objective adaptive evolutionary algorithm to extract communities in networks. Swarm Evolut. Computat. 52 (2020), 100629.Google Scholar
Cross Ref
- . 2019. Graph representation learning with encoding edges. Neurocomputing 361 (2019), 29–39.Google Scholar
Digital Library
- . 2022c. Secure, efficient and weighted access control for cloud-assisted industrial IoT. IEEE Internet Things J. 9, 18 (2022), 16917–16927.Google Scholar
- . 2022a. Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet Things J. 9, 16 (2022), 15138–15149.Google Scholar
- . 2022b. Synchronized provable data possession based on blockchain for digital twin. IEEE Trans. Inf. Forens. Secur. 17 (2022), 472–485.Google Scholar
Cross Ref
- . 2016. Quantum image encryption based on generalized affine transform and logistic map. Quant. Inf. Process. 15, 7 (2016), 2701–2724.Google Scholar
Digital Library
- . 2019. Neural Chinese word segmentation with dictionary. Neurocomputing 338 (2019), 46–54.Google Scholar
Digital Library
- . 2017. Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds. IEEE Trans. Inf. Forens. Secur. 13, 2 (2017), 408–420.Google Scholar
Digital Library
- . 2002. The development of cataloging in China. Catalog. Classif. Quart. 35, 1-2 (2002), 137–154.Google Scholar
Cross Ref
- . 2021. FedCPF: An efficient-communication federated learning approach for vehicular edge computing in 6G communication networks. IEEE Trans. Intell. Transport. Syst. 23, 2 (2021), 1616–1629.Google Scholar
Digital Library
- . 2019. Personalized information recommendation model based on context contribution and item correlation. Measurement 142 (2019), 30–39.Google Scholar
Cross Ref
- . 2021. Sparse, dense, and attentional representations for text retrieval. Trans. Assoc. Computat. Ling. 9 (2021), 329–345.Google Scholar
Cross Ref
- . 2018. Encouraging patron adoption of privacy-protection technologies: Challenges for public libraries. IFLA J. 44, 3 (2018), 195–202.Google Scholar
Cross Ref
- . 2021. Privacy and security in cognitive cities: A systematic review. Appl. Sci. 11, 10 (2021), 4471.Google Scholar
Cross Ref
- . 2020. Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access 9 (2020), 8512–8545.Google Scholar
Cross Ref
- . 2016. TrackMeorNot: Enabling flexible control on web tracking. In Proceedings of the 25th International Conference on World Wide Web. 99–109.Google Scholar
Digital Library
- . 2021. UCoin: An efficient privacy preserving scheme for cryptocurrencies. IEEE Trans. Depend. Secure Comput. 20, 1 (2021), 242–255.Google Scholar
- . 2021. Security challenges and opportunities for smart contracts in Internet of Things: A survey. IEEE Internet Things J. 8, 15 (2021), 12004–12020.Google Scholar
Cross Ref
- . 2019. Shadow health records meet new data privacy laws. Science 363, 6426 (2019), 448–450.Google Scholar
Cross Ref
- . 2021. Modeling, detecting, and mitigating threats against industrial healthcare systems: A combined software defined networking and reinforcement learning approach. IEEE Trans. Industr. Inform. 18, 3 (2021), 2041–2052.Google Scholar
Cross Ref
- . 2019. Private information retrieval in graph-based replication systems. IEEE Trans. Inf. Theor. 66, 6 (2019), 3590–3602.Google Scholar
Cross Ref
- . 2022a. Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes. Digit. Commun. Netw.
DOI: Google ScholarCross Ref
- . 2022b. Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination. J. Inf. Secur. Applic. 66 (2022), 103140.Google Scholar
Digital Library
- . 2012. Supporting privacy protection in personalized web search. IEEE Trans. Knowl. Data Eng. 26, 2 (2012), 453–467.Google Scholar
Digital Library
- . 2022. Semantic private information retrieval. IEEE Trans. Inf. Theor. 68, 4 (2022), 2635–2652.Google Scholar
Cross Ref
- . 2022. Edge computing enabled video segmentation for real-time traffic monitoring in internet of vehicles. Pattern Recog. 121 (2022), 108146.Google Scholar
Digital Library
- . 2022. Safeguarding cross-silo federated learning with local differential privacy. Digit. Commun. Netw. 8, 4 (2022), 446–454.Google Scholar
- . 2019. Preserving balance between privacy and data integrity in edge-assisted Internet of Things. IEEE Internet Things J. 7, 4 (2019), 2679–2689.Google Scholar
Cross Ref
- . 2020b. A contextual approach to information privacy research. J. Assoc. Inf. Sci. Techn. 71, 4 (2020), 485–490.Google Scholar
Digital Library
- . 2020a. A dummy-based user privacy protection approach for text information retrieval. Knowl.-based Syst. 195 (2020), 105679.Google Scholar
Cross Ref
- . 2021. An effective approach for the protection of user commodity viewing privacy in e-commerce website. Knowl.-based Syst. 220 (2021), 106952.Google Scholar
Cross Ref
- . 2020c. A location privacy-preserving system based on query range cover-up or location-based services. IEEE Trans. Vehic. Technol. 69, 5 (2020), 5244–5254.Google Scholar
Cross Ref
- . 2018. The evolving path of Chinese and foreign information security systems. J. Libr. Sci. China 44, 2 (2018), 113–131.Google Scholar
- . 2018. Private information retrieval for secure distributed storage systems. IEEE Trans. Inf. Forens. Secur. 13, 12 (2018), 2953–2964.Google Scholar
Digital Library
- . 2021. Similarity measures based on the generalized distance of neutrosophic Z-number sets and their multi-attribute decision making method. Soft Comput. 25, 22 (2021), 13975–13985.Google Scholar
Digital Library
- . 2020a. Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton. Int. J. Distrib. Sensor Netw. 16, 11 (2020), 1550147720972944.Google Scholar
Cross Ref
- . 2020b. Towards personalized and semantic retrieval: An end-to-end solution for E-commerce search via embedding learning. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. 2407–2416.Google Scholar
Digital Library
- . 2023. Semantic-aware dehazing network with adaptive feature fusion. IEEE Trans. Cyber. 53, 1 (2023), 454–467.Google Scholar
- . 2019. An ultra-low complexity and high efficiency approach for lossless alpha channel coding. IEEE Trans. Multim. 22, 3 (2019), 786–794.Google Scholar
Cross Ref
- . 2020. Preserving privacy in WiFi localization with plausible dummy locations. IEEE Trans. Vehic. Technol. 69, 10 (2020), 11909–11925.Google Scholar
Cross Ref
- . 2021. Contextualized query expansion via unsupervised chunk selection for text retrieval. Inf. Process. Manag. 58, 5 (2021), 102672.Google Scholar
Digital Library
Index Terms
A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval
Recommendations
Short Video Users’ Personal Privacy Leakage and Protection Measures
Intelligent Computing Theories and ApplicationAbstractInformation security has long been a concern of the people. The widespread use of short videos has raised the academia and industry’s attention to the leakage of users’ personal privacy and protection measures. In short videos, there are three ...
Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks
Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533Online Social Networks (OSNs) such as Facebook, Twitter, and so on recently are major impact in communication and social interaction. Users can share any information with others. However, they have concerns about losing privacy due to lack of an ...
Capturing P3P semantics using an enforceable lattice-based structure
PAIS '11: Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information SocietyWith the increasing amount of data collected by service providers, privacy concerns increase for data owners who must provide private data to receive services. Legislative acts require service providers to protect the privacy of customers. Privacy ...






Comments