skip to main content
research-article

A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval

Published:09 May 2023Publication History
Skip Abstract Section

Abstract

In this article, aiming at a Chinese keyword-based book search service, from a technological perspective, we propose to modify a user query sequence carefully to confuse the user query topics and thus protect the user topic privacy on the untrusted server, without compromising the accuracy of each book search service. First, we propose a client-based framework for the privacy protection of book search, and then a privacy model to formulate the constraints in terms of accuracy, efficiency, and security, which the cover queries generated based on a user query sequence should meet. Second, we present a modification algorithm for a user query sequence, based on some heuristic strategies, which can quickly generate a cover query sequence meeting the privacy model by replacing, deleting, and adding keywords for each user query. Finally, both theoretical analysis and experimental evaluation demonstrate the effectiveness of the proposed approach, i.e., which can improve the security of users’ topic privacy on the untrusted server without compromising the efficiency, accuracy, and usability of an existing Chinese keyword book search service, so it has a positive impact for the construction of a privacy-preserving text retrieval platform under an untrusted network environment.

REFERENCES

  1. Aljeraisy Atheer, Barati Masoud, Rana Omer, and Perera Charith. 2021. Privacy laws and privacy by design schemes for the internet of things: A developers perspective. ACM Comput. Surv. 54, 5 (2021), 138.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Arampatzis Avi, Drosatos George, and Efraimidis Pavlos S.. 2015. Versatile query scrambling for private web search. Inf. Retr. J. 18, 4 (2015), 331358.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Banawan Karim and Ulukus Sennur. 2019. Noisy private information retrieval: On separability of channel coding and information retrieval. IEEE Trans. Inf. Theor. 65, 12 (2019), 82328249.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Benarous Leila and Kadri Benamar. 2022. Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. Peer-to-Peer Netw. Applic. 15, 1 (2022), 461472.Google ScholarGoogle ScholarCross RefCross Ref
  5. Cheng Zihao, Yue Dong, Shen Shigen, Hu Songlin, and Chen Lei. 2022. Secure frequency control of hybrid power system under DoS attacks via lie algebra. IEEE Trans. Inf. Forens. Secur. 17 (2022), 11721184.Google ScholarGoogle ScholarCross RefCross Ref
  6. Cook Allan, Robinson Michael, Ferrag Mohamed Amine, Maglaras Leandros A., He Ying, Jones Kevin, and Janicke Helge. 2018. Internet of cloud: Security and privacy issues. In Cloud Computing for Optimization: Foundations, Applications, and Challenges. Springer, 271301.Google ScholarGoogle Scholar
  7. Dai Yuanchao, Wu Jing, Fan Yuanzhao, Wang Jin, Niu Jianwei, Gu Fei, and Shen Shigen. 2022. MSEva: A musculoskeletal rehabilitation evaluation system based on EMG signals. ACM Trans. Sensor Netw. 19, 1 (2022), 1–23.Google ScholarGoogle Scholar
  8. Diyanat Abolfazl, Khonsari Ahmad, and Shariatpanahi Seyed Pooya. 2016. A dummy-based approach for preserving source rate privacy. IEEE Trans. Inf. Forens. Secur. 11, 6 (2016), 13211332.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Fioretto Ferdinando, Mak Terrence W. K., and Hentenryck Pascal Van. 2019. Differential privacy for power grid obfuscation. IEEE Trans. Smart Grid 11, 2 (2019), 13561366.Google ScholarGoogle ScholarCross RefCross Ref
  10. Hayashida Shuhei, Amagata Daichi, Hara Takahiro, and Xie Xing. 2018. Dummy generation based on user-movement estimation for location privacy protection. IEEE Access 6 (2018), 2295822969.Google ScholarGoogle ScholarCross RefCross Ref
  11. Jiang Hongbo, Li Jie, Zhao Ping, Zeng Fanzi, Xiao Zhu, and Iyengar Arun. 2021. Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Comput. Surv. 54, 1 (2021), 136.Google ScholarGoogle Scholar
  12. Kumar Ritesh, Bhanodai Guggilla, and Pamula Rajendra. 2019. Book search using social information, user profiles and query expansion with pseudo relevance feedback. Appl. Intell. 49, 6 (2019), 21782200.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Li Hongjie, Zhu Yinglian, Wang Jietai, Liu Jianhua, Shen Shigen, Gao Huimin, and Sun Yaxin. 2017. Consensus of nonlinear second-order multi-agent systems with mixed time-delays and intermittent communications. Neurocomputing 251 (2017), 115126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Li Qi, Cao Zehong, Ding Weiping, and Li Qing. 2020. A multi-objective adaptive evolutionary algorithm to extract communities in networks. Swarm Evolut. Computat. 52 (2020), 100629.Google ScholarGoogle ScholarCross RefCross Ref
  15. Li Qi, Cao Zehong, Zhong Jiang, and Li Qing. 2019. Graph representation learning with encoding edges. Neurocomputing 361 (2019), 2939.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Li Qi, Zhang Qianqian, Huang Haiping, Zhang Wei, Chen Wei, and Wang Huaqun. 2022c. Secure, efficient and weighted access control for cloud-assisted industrial IoT. IEEE Internet Things J. 9, 18 (2022), 16917–16927.Google ScholarGoogle Scholar
  17. Li Tian, Wang Huaqun, He Debiao, and Yu Jia. 2022a. Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet Things J. 9, 16 (2022), 15138–15149.Google ScholarGoogle Scholar
  18. Li Tian, Wang Huaqun, He Debiao, and Yu Jia. 2022b. Synchronized provable data possession based on blockchain for digital twin. IEEE Trans. Inf. Forens. Secur. 17 (2022), 472485.Google ScholarGoogle ScholarCross RefCross Ref
  19. Liang Hao-Ran, Tao Xiang-Yang, and Zhou Nan-Run. 2016. Quantum image encryption based on generalized affine transform and logistic map. Quant. Inf. Process. 15, 7 (2016), 27012724.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Liu Junxin, Wu Fangzhao, Wu Chuhan, Huang Yongfeng, and Xie Xing. 2019. Neural Chinese word segmentation with dictionary. Neurocomputing 338 (2019), 4654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Liu Jianhua, Yu Jiadi, and Shen Shigen. 2017. Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds. IEEE Trans. Inf. Forens. Secur. 13, 2 (2017), 408420.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Liu Suqing and Shen Zhenghua. 2002. The development of cataloging in China. Catalog. Classif. Quart. 35, 1-2 (2002), 137154.Google ScholarGoogle ScholarCross RefCross Ref
  23. Liu Su, Yu Jiong, Deng Xiaoheng, and Wan Shaohua. 2021. FedCPF: An efficient-communication federated learning approach for vehicular edge computing in 6G communication networks. IEEE Trans. Intell. Transport. Syst. 23, 2 (2021), 16161629.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Lu Qibei and Guo Feipeng. 2019. Personalized information recommendation model based on context contribution and item correlation. Measurement 142 (2019), 3039.Google ScholarGoogle ScholarCross RefCross Ref
  25. Luan Yi, Eisenstein Jacob, Toutanova Kristina, and Collins Michael. 2021. Sparse, dense, and attentional representations for text retrieval. Trans. Assoc. Computat. Ling. 9 (2021), 329345.Google ScholarGoogle ScholarCross RefCross Ref
  26. Maceli Monica G.. 2018. Encouraging patron adoption of privacy-protection technologies: Challenges for public libraries. IFLA J. 44, 3 (2018), 195202.Google ScholarGoogle ScholarCross RefCross Ref
  27. Machin Juvenal, Batista Edgar, Martínez-Ballesté Antoni, and Solanas Agusti. 2021. Privacy and security in cognitive cities: A systematic review. Appl. Sci. 11, 10 (2021), 4471.Google ScholarGoogle ScholarCross RefCross Ref
  28. Majeed Abdul and Lee Sungchang. 2020. Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access 9 (2020), 85128545.Google ScholarGoogle ScholarCross RefCross Ref
  29. Meng Wei, Lee Byoungyoung, Xing Xinyu, and Lee Wenke. 2016. TrackMeorNot: Enabling flexible control on web tracking. In Proceedings of the 25th International Conference on World Wide Web. 99109.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Nosouhi Mohammad Reza, Yu Shui, Sood Keshav, Grobler Marthie, Jurdak Raja, Dorri Ali, and Shen Shigen. 2021. UCoin: An efficient privacy preserving scheme for cryptocurrencies. IEEE Trans. Depend. Secure Comput. 20, 1 (2021), 242–255.Google ScholarGoogle Scholar
  31. Peng Kai, Li Meijun, Huang Haojun, Wang Chen, Wan Shaohua, and Choo Kim-Kwang Raymond. 2021. Security challenges and opportunities for smart contracts in Internet of Things: A survey. IEEE Internet Things J. 8, 15 (2021), 1200412020.Google ScholarGoogle ScholarCross RefCross Ref
  32. Price W. Nicholson, Kaminski Margot E., Minssen Timo, and Spector-Bagdady Kayte. 2019. Shadow health records meet new data privacy laws. Science 363, 6426 (2019), 448450.Google ScholarGoogle ScholarCross RefCross Ref
  33. Radoglou-Grammatikis Panagiotis, Rompolos Konstantinos, Sarigiannidis Panagiotis, Argyriou Vasileios, Lagkas Thomas, Sarigiannidis Antonios, Goudos Sotirios, and Wan Shaohua. 2021. Modeling, detecting, and mitigating threats against industrial healthcare systems: A combined software defined networking and reinforcement learning approach. IEEE Trans. Industr. Inform. 18, 3 (2021), 20412052.Google ScholarGoogle ScholarCross RefCross Ref
  34. Raviv Netanel, Tamo Itzhak, and Yaakobi Eitan. 2019. Private information retrieval in graph-based replication systems. IEEE Trans. Inf. Theor. 66, 6 (2019), 35903602.Google ScholarGoogle ScholarCross RefCross Ref
  35. Shen Yizhou, Shen Shigen, Li Qi, Zhou Haiping, Wu Zongda, and Qu Youyang. 2022a. Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes. Digit. Commun. Netw.DOI:Google ScholarGoogle ScholarCross RefCross Ref
  36. Shen Yizhou, Shen Shigen, Wu Zongda, Zhou Haiping, and Yu Shui. 2022b. Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination. J. Inf. Secur. Applic. 66 (2022), 103140.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Shou Lidan, Bai He, Chen Ke, and Chen Gang. 2012. Supporting privacy protection in personalized web search. IEEE Trans. Knowl. Data Eng. 26, 2 (2012), 453467.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Vithana Sajani, Banawan Karim, and Ulukus Sennur. 2022. Semantic private information retrieval. IEEE Trans. Inf. Theor. 68, 4 (2022), 2635–2652.Google ScholarGoogle ScholarCross RefCross Ref
  39. Wan Shaohua, Ding Songtao, and Chen Chen. 2022. Edge computing enabled video segmentation for real-time traffic monitoring in internet of vehicles. Pattern Recog. 121 (2022), 108146.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Wang Chen, Wu Xinkui, Liu Gaoyang, Deng Tianping, Peng Kai, and Wan Shaohua. 2022. Safeguarding cross-silo federated learning with local differential privacy. Digit. Commun. Netw. 8, 4 (2022), 446–454.Google ScholarGoogle Scholar
  41. Wang Tian, Bhuiyan Md Zakirul Alam, Wang Guojun, Qi Lianyong, Wu Jie, and Hayajneh Thaier. 2019. Preserving balance between privacy and data integrity in edge-assisted Internet of Things. IEEE Internet Things J. 7, 4 (2019), 26792689.Google ScholarGoogle ScholarCross RefCross Ref
  42. Wu Philip Fei, Vitak Jessica, and Zimmer Michael T.. 2020b. A contextual approach to information privacy research. J. Assoc. Inf. Sci. Techn. 71, 4 (2020), 485490.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Wu Zongda, Shen Shigen, Lian Xinze, Su Xinning, and Chen Enhong. 2020a. A dummy-based user privacy protection approach for text information retrieval. Knowl.-based Syst. 195 (2020), 105679.Google ScholarGoogle ScholarCross RefCross Ref
  44. Wu Zongda, Shen Shigen, Zhou Haiping, Li Huxiong, Lu Chenglang, and Zou Dongdong. 2021. An effective approach for the protection of user commodity viewing privacy in e-commerce website. Knowl.-based Syst. 220 (2021), 106952.Google ScholarGoogle ScholarCross RefCross Ref
  45. Wu Zongda, Wang Ruiqin, Li Qi, Lian Xinze, Xu Guandong, Chen Enhong, and Liu Xiyang. 2020c. A location privacy-preserving system based on query range cover-up or location-based services. IEEE Trans. Vehic. Technol. 69, 5 (2020), 52445254.Google ScholarGoogle ScholarCross RefCross Ref
  46. Xiang Liling and Cheng M.. 2018. The evolving path of Chinese and foreign information security systems. J. Libr. Sci. China 44, 2 (2018), 113131.Google ScholarGoogle Scholar
  47. Yang Heecheol, Shin Wonjae, and Lee Jungwoo. 2018. Private information retrieval for secure distributed storage systems. IEEE Trans. Inf. Forens. Secur. 13, 12 (2018), 29532964.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Ye Jun. 2021. Similarity measures based on the generalized distance of neutrosophic Z-number sets and their multi-attribute decision making method. Soft Comput. 25, 22 (2021), 1397513985.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Zhang Hong, Shen Shigen, Cao Qiying, Wu Xiaojun, and Liu Shaofeng. 2020a. Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton. Int. J. Distrib. Sensor Netw. 16, 11 (2020), 1550147720972944.Google ScholarGoogle ScholarCross RefCross Ref
  50. Zhang Han, Wang Songlin, Zhang Kang, Tang Zhiling, Jiang Yunjiang, Xiao Yun, Yan Weipeng, and Yang Wen-Yun. 2020b. Towards personalized and semantic retrieval: An end-to-end solution for E-commerce search via embedding learning. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. 24072416.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Zhang Shengdong, Ren Wenqi, Tan Xin, Wang Zhi-Jie, Liu Yong, Zhang Jingang, Zhang Xiaoqin, and Cao Xiaochun. 2023. Semantic-aware dehazing network with adaptive feature fusion. IEEE Trans. Cyber. 53, 1 (2023), 454–467.Google ScholarGoogle Scholar
  52. Zhao Liping, Lin Tao, Zhang Dongyu, Zhou Kailun, and Wang Shuhui. 2019. An ultra-low complexity and high efficiency approach for lossless alpha channel coding. IEEE Trans. Multim. 22, 3 (2019), 786794.Google ScholarGoogle ScholarCross RefCross Ref
  53. Zhao Ping, Liu Wuwu, Zhang Guanglin, Li Zongpeng, and Wang Lin. 2020. Preserving privacy in WiFi localization with plausible dummy locations. IEEE Trans. Vehic. Technol. 69, 10 (2020), 1190911925.Google ScholarGoogle ScholarCross RefCross Ref
  54. Zheng Zhi, Hui Kai, He Ben, Han Xianpei, Sun Le, and Yates Andrew. 2021. Contextualized query expansion via unsupervised chunk selection for text retrieval. Inf. Process. Manag. 58, 5 (2021), 102672.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Asian and Low-Resource Language Information Processing
      ACM Transactions on Asian and Low-Resource Language Information Processing  Volume 22, Issue 5
      May 2023
      653 pages
      ISSN:2375-4699
      EISSN:2375-4702
      DOI:10.1145/3596451
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 May 2023
      • Online AM: 17 January 2023
      • Accepted: 12 November 2022
      • Revised: 6 October 2022
      • Received: 14 April 2022
      Published in tallip Volume 22, Issue 5

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!