2015
DOI: 10.1016/j.ins.2015.07.010
|View full text |Cite
|
Sign up to set email alerts
|

Constructing plausible innocuous pseudo queries to protect user query intention

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…In addition to location privacy, some researchers also attempt to leverage dummy queries to protect textual privacy. For example, aiming at text retrieval, in [31], the authors attempted to improve the quality of dummy queries based on a semantic space derived from Wikipedia. However, the work takes into account only the textual feature of a single user query, without considering the semantic relevance between users' current queries and users' historical queries, consequently, making it still possible for an attacker of rich prior knowledge to rule out the dummies.…”
Section: Dummy-based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to location privacy, some researchers also attempt to leverage dummy queries to protect textual privacy. For example, aiming at text retrieval, in [31], the authors attempted to improve the quality of dummy queries based on a semantic space derived from Wikipedia. However, the work takes into account only the textual feature of a single user query, without considering the semantic relevance between users' current queries and users' historical queries, consequently, making it still possible for an attacker of rich prior knowledge to rule out the dummies.…”
Section: Dummy-based Methodsmentioning
confidence: 99%
“…(3) Algorithm candidates. In the experiments, we used the following four dummybased algorithm candidates: (1) Privacy, i.e., the approach proposed in this paper; (2) Priva-cyLS [9], which constructs dummy queries to protect the location privacy by considering the location frequency feature; (3) PrivacyQS [31], which constructs dummy queries to protect the query privacy by considering the query context; and (4) Random (used as the baseline), which uses a random way to construct dummy locations and dummy attributes. In the experiments, we did not compare against other algorithms mentioned in the related work section, since they are designed under different privacy models (i.e., pseudonym, obfuscation or encryption), so they are incomparable to our approach.…”
Section: Methodsmentioning
confidence: 99%
“…Major developed countries formulated related standards and specifications; for example, the Document Management Guidelines in Cloud Computing Environment issued by the US government and the Risk Management Suggestions for Document Preservation in Cloud Computing from the Australian document and archives committee. However, an endless stream of privacy leakage incidents showed that laws and regulations cannot fundamentally solve the privacy problem in the cloud environment, so the solution cannot depart from the support of technical means (Wu et al, 2015(Wu et al, , 2018b. To ensure data security, archives systems have used a variety of technical methods (Lu et al, 2013), mainly including: identity authentication, access control, and data encryption.…”
Section: Xml-based Archives Managementmentioning
confidence: 99%
“…user's book browsing behaviors can reflect some categories of interest to the user). The security of users' data privacy can be ensured by encryption (Pang et al, 2012;Wu et al, 2015). However, encryption cannot ensure the security of users' behavior privacy (Wu et al, 2016), because encrypting users' behaviors would make the server unable to understand the behaviors, and thus make the service unavailable.…”
Section: Introductionmentioning
confidence: 99%