2019
DOI: 10.1002/asi.24227
|View full text |Cite
|
Sign up to set email alerts
|

A user sensitive subject protection approach for book search service

Abstract: In a digital library, book search is one of the most important information services. However, with the rapid development of network technologies such as cloud computing, the server‐side of a digital library is becoming more and more untrusted; thus, how to prevent the disclosure of users' book query privacy is causing people's increasingly extensive concern. In this article, we propose to construct a group of plausible fake queries for each user book query to cover up the sensitive subjects behind users' queri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 87 publications
(38 citation statements)
references
References 14 publications
0
38
0
Order By: Relevance
“…Therefore, we believe that the use of the bHHOSRL_KELM model can make a more accurate clinical decision-making. Due to its great optimization capability, the proposed HHOSRL algorithm can also be applied to solve other problems, such as problems in video deblurring [ 73 ], microgrid planning [ 74 ], information retrieval services [ [75] , [76] , [77] ], image dehazing [ 78 ], kayak cycle phase segmentation [ 79 ], human motion capture [ 80 ], fault detection [ 81 ], video coding optimization [ 82 ], outlier detection [ 83 ], location-based services [ 84 , 85 ], image retrieval [ 86 ], multivariate time series analysis [ 87 ] and multi-objective problems [ 88 ].…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, we believe that the use of the bHHOSRL_KELM model can make a more accurate clinical decision-making. Due to its great optimization capability, the proposed HHOSRL algorithm can also be applied to solve other problems, such as problems in video deblurring [ 73 ], microgrid planning [ 74 ], information retrieval services [ [75] , [76] , [77] ], image dehazing [ 78 ], kayak cycle phase segmentation [ 79 ], human motion capture [ 80 ], fault detection [ 81 ], video coding optimization [ 82 ], outlier detection [ 83 ], location-based services [ 84 , 85 ], image retrieval [ 86 ], multivariate time series analysis [ 87 ] and multi-objective problems [ 88 ].…”
Section: Discussionmentioning
confidence: 99%
“…However, the work takes into account only the textual feature of a single user query, without considering the semantic relevance between users' current queries and users' historical queries, consequently, making it still possible for an attacker of rich prior knowledge to rule out the dummies. Then, the authors proposed a similar privacy protection approach for book search service in a digital library [32]. In summary, most of the existing methods did not fully consider the data distribution characteristics for users' queries, and also did not consider the semantic associations between query locations and query attributes (e.g., it is not appropriate to query subway stations in the countryside), as a result, leading to a negative impact on the quality of constructed dummy queries, and increasing the exposure risk of user privacy [2].…”
Section: Dummy-based Methodsmentioning
confidence: 99%
“…However, this kind of method generally requires the change to the existing LBS algorithm on the server, and the support of additional hardware and algorithms, thereby, decreasing its actual usability in practice. (4) In a dummy-based method, each user query is submitted together with a group of dummy queries to the server to make it difficult for the untrusted server to infer the location or attribute related to the user query [9,32]. However, the effectiveness of this kind of method depends on the quality of dummy query construction, i.e., it is easily threatened by inference attacks based on query feature distribution [2].…”
Section: Motivationsmentioning
confidence: 99%
See 2 more Smart Citations