2018
DOI: 10.1108/el-07-2017-0162
|View full text |Cite
|
Sign up to set email alerts
|

An approach for the protection of users’ book browsing preference privacy in a digital library

Abstract: Purpose The problem of privacy protection in digital libraries is causing people to have increasingly extensive concerns. This study aims to design an approach to protect the preference privacy behind users’ book browsing behaviors in a digital library. Design/methodology/approach This paper proposes a client-based approach, whose basic idea is to construct a group of plausible book browsing dummy behaviors, and submit them together with users’ true behaviors to the untrusted server, to cover up users’ sensi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…However, an emerging stream of research focuses on the use of so-called "intelligent libraries," with studies addressing the deployment of e-books in such venues (Cheng, 2009;Liu et al, 2020;Chen (2009), and Gul and Bano (2019) including industry environment, software/hardware requirements, market opportunities, development conditions and distribution platforms. Other studies have examined the use of radio-frequency identification (RFID) technologies in libraries (Li et al, 2019;Gul and Bano, 2019;Wu et al, 2018) including RFID applications for journal borrowing, library collection circulation and management and user privacy. Investigations into digital service development have surveyed user service demands and satisfaction (Yahui and Ke, 2010;Hsieh and Lin, 2009).…”
Section: Introductionmentioning
confidence: 99%
“…However, an emerging stream of research focuses on the use of so-called "intelligent libraries," with studies addressing the deployment of e-books in such venues (Cheng, 2009;Liu et al, 2020;Chen (2009), and Gul and Bano (2019) including industry environment, software/hardware requirements, market opportunities, development conditions and distribution platforms. Other studies have examined the use of radio-frequency identification (RFID) technologies in libraries (Li et al, 2019;Gul and Bano, 2019;Wu et al, 2018) including RFID applications for journal borrowing, library collection circulation and management and user privacy. Investigations into digital service development have surveyed user service demands and satisfaction (Yahui and Ke, 2010;Hsieh and Lin, 2009).…”
Section: Introductionmentioning
confidence: 99%
“…Traditional security measures such as identity verification and access control can prevent unwanted users from accessing data, but they can't stop internal cloud users from accessing and revealing sensitive information [327]. As such, there are some research focuses on this privacy issues within different domain such as digital library [328], [329], cloud computing [330], [327], e-commerce [331], and so on. Therefore, inclusion of privacy issue in combinatorial t-way testing strategy domain is what is more welcome.…”
Section: Discussionmentioning
confidence: 99%
“…The supply chain vendor selection problem [50], the dry port location selection challenge in China [51], the thermal power plant location selection problem [52], the solar power plant location selection problem [53], and the wind power plant location selection problem [54] have all recently been solved by utilizing the fuzzy AHP method. Recently, some researchers have utilized neutrosophic functions for applications like scheduling [55][56][57][58] and for security enhancement [59][60][61][62][63][64][65][66]. Pairwise comparisons in fuzzy AHP are made using linguistic variables, which are represented as triangular numbers.…”
Section: Methodsmentioning
confidence: 99%