Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval

Published: 09 May 2023 Publication History
  • Get Citation Alerts
  • Abstract

    In this article, aiming at a Chinese keyword-based book search service, from a technological perspective, we propose to modify a user query sequence carefully to confuse the user query topics and thus protect the user topic privacy on the untrusted server, without compromising the accuracy of each book search service. First, we propose a client-based framework for the privacy protection of book search, and then a privacy model to formulate the constraints in terms of accuracy, efficiency, and security, which the cover queries generated based on a user query sequence should meet. Second, we present a modification algorithm for a user query sequence, based on some heuristic strategies, which can quickly generate a cover query sequence meeting the privacy model by replacing, deleting, and adding keywords for each user query. Finally, both theoretical analysis and experimental evaluation demonstrate the effectiveness of the proposed approach, i.e., which can improve the security of users’ topic privacy on the untrusted server without compromising the efficiency, accuracy, and usability of an existing Chinese keyword book search service, so it has a positive impact for the construction of a privacy-preserving text retrieval platform under an untrusted network environment.

    References

    [1]
    Atheer Aljeraisy, Masoud Barati, Omer Rana, and Charith Perera. 2021. Privacy laws and privacy by design schemes for the internet of things: A developers perspective. ACM Comput. Surv. 54, 5 (2021), 1–38.
    [2]
    Avi Arampatzis, George Drosatos, and Pavlos S. Efraimidis. 2015. Versatile query scrambling for private web search. Inf. Retr. J. 18, 4 (2015), 331–358.
    [3]
    Karim Banawan and Sennur Ulukus. 2019. Noisy private information retrieval: On separability of channel coding and information retrieval. IEEE Trans. Inf. Theor. 65, 12 (2019), 8232–8249.
    [4]
    Leila Benarous and Benamar Kadri. 2022. Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. Peer-to-Peer Netw. Applic. 15, 1 (2022), 461–472.
    [5]
    Zihao Cheng, Dong Yue, Shigen Shen, Songlin Hu, and Lei Chen. 2022. Secure frequency control of hybrid power system under DoS attacks via lie algebra. IEEE Trans. Inf. Forens. Secur. 17 (2022), 1172–1184.
    [6]
    Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, and Helge Janicke. 2018. Internet of cloud: Security and privacy issues. In Cloud Computing for Optimization: Foundations, Applications, and Challenges. Springer, 271–301.
    [7]
    Yuanchao Dai, Jing Wu, Yuanzhao Fan, Jin Wang, Jianwei Niu, Fei Gu, and Shigen Shen. 2022. MSEva: A musculoskeletal rehabilitation evaluation system based on EMG signals. ACM Trans. Sensor Netw. 19, 1 (2022), 1–23.
    [8]
    Abolfazl Diyanat, Ahmad Khonsari, and Seyed Pooya Shariatpanahi. 2016. A dummy-based approach for preserving source rate privacy. IEEE Trans. Inf. Forens. Secur. 11, 6 (2016), 1321–1332.
    [9]
    Ferdinando Fioretto, Terrence W. K. Mak, and Pascal Van Hentenryck. 2019. Differential privacy for power grid obfuscation. IEEE Trans. Smart Grid 11, 2 (2019), 1356–1366.
    [10]
    Shuhei Hayashida, Daichi Amagata, Takahiro Hara, and Xing Xie. 2018. Dummy generation based on user-movement estimation for location privacy protection. IEEE Access 6 (2018), 22958–22969.
    [11]
    Hongbo Jiang, Jie Li, Ping Zhao, Fanzi Zeng, Zhu Xiao, and Arun Iyengar. 2021. Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Comput. Surv. 54, 1 (2021), 1–36.
    [12]
    Ritesh Kumar, Guggilla Bhanodai, and Rajendra Pamula. 2019. Book search using social information, user profiles and query expansion with pseudo relevance feedback. Appl. Intell. 49, 6 (2019), 2178–2200.
    [13]
    Hongjie Li, Yinglian Zhu, Jietai Wang, Jianhua Liu, Shigen Shen, Huimin Gao, and Yaxin Sun. 2017. Consensus of nonlinear second-order multi-agent systems with mixed time-delays and intermittent communications. Neurocomputing 251 (2017), 115–126.
    [14]
    Qi Li, Zehong Cao, Weiping Ding, and Qing Li. 2020. A multi-objective adaptive evolutionary algorithm to extract communities in networks. Swarm Evolut. Computat. 52 (2020), 100629.
    [15]
    Qi Li, Zehong Cao, Jiang Zhong, and Qing Li. 2019. Graph representation learning with encoding edges. Neurocomputing 361 (2019), 29–39.
    [16]
    Qi Li, Qianqian Zhang, Haiping Huang, Wei Zhang, Wei Chen, and Huaqun Wang. 2022c. Secure, efficient and weighted access control for cloud-assisted industrial IoT. IEEE Internet Things J. 9, 18 (2022), 16917–16927.
    [17]
    Tian Li, Huaqun Wang, Debiao He, and Jia Yu. 2022a. Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet Things J. 9, 16 (2022), 15138–15149.
    [18]
    Tian Li, Huaqun Wang, Debiao He, and Jia Yu. 2022b. Synchronized provable data possession based on blockchain for digital twin. IEEE Trans. Inf. Forens. Secur. 17 (2022), 472–485.
    [19]
    Hao-Ran Liang, Xiang-Yang Tao, and Nan-Run Zhou. 2016. Quantum image encryption based on generalized affine transform and logistic map. Quant. Inf. Process. 15, 7 (2016), 2701–2724.
    [20]
    Junxin Liu, Fangzhao Wu, Chuhan Wu, Yongfeng Huang, and Xing Xie. 2019. Neural Chinese word segmentation with dictionary. Neurocomputing 338 (2019), 46–54.
    [21]
    Jianhua Liu, Jiadi Yu, and Shigen Shen. 2017. Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds. IEEE Trans. Inf. Forens. Secur. 13, 2 (2017), 408–420.
    [22]
    Suqing Liu and Zhenghua Shen. 2002. The development of cataloging in China. Catalog. Classif. Quart. 35, 1-2 (2002), 137–154.
    [23]
    Su Liu, Jiong Yu, Xiaoheng Deng, and Shaohua Wan. 2021. FedCPF: An efficient-communication federated learning approach for vehicular edge computing in 6G communication networks. IEEE Trans. Intell. Transport. Syst. 23, 2 (2021), 1616–1629.
    [24]
    Qibei Lu and Feipeng Guo. 2019. Personalized information recommendation model based on context contribution and item correlation. Measurement 142 (2019), 30–39.
    [25]
    Yi Luan, Jacob Eisenstein, Kristina Toutanova, and Michael Collins. 2021. Sparse, dense, and attentional representations for text retrieval. Trans. Assoc. Computat. Ling. 9 (2021), 329–345.
    [26]
    Monica G. Maceli. 2018. Encouraging patron adoption of privacy-protection technologies: Challenges for public libraries. IFLA J. 44, 3 (2018), 195–202.
    [27]
    Juvenal Machin, Edgar Batista, Antoni Martínez-Ballesté, and Agusti Solanas. 2021. Privacy and security in cognitive cities: A systematic review. Appl. Sci. 11, 10 (2021), 4471.
    [28]
    Abdul Majeed and Sungchang Lee. 2020. Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access 9 (2020), 8512–8545.
    [29]
    Wei Meng, Byoungyoung Lee, Xinyu Xing, and Wenke Lee. 2016. TrackMeorNot: Enabling flexible control on web tracking. In Proceedings of the 25th International Conference on World Wide Web. 99–109.
    [30]
    Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler, Raja Jurdak, Ali Dorri, and Shigen Shen. 2021. UCoin: An efficient privacy preserving scheme for cryptocurrencies. IEEE Trans. Depend. Secure Comput. 20, 1 (2021), 242–255.
    [31]
    Kai Peng, Meijun Li, Haojun Huang, Chen Wang, Shaohua Wan, and Kim-Kwang Raymond Choo. 2021. Security challenges and opportunities for smart contracts in Internet of Things: A survey. IEEE Internet Things J. 8, 15 (2021), 12004–12020.
    [32]
    W. Nicholson Price, Margot E. Kaminski, Timo Minssen, and Kayte Spector-Bagdady. 2019. Shadow health records meet new data privacy laws. Science 363, 6426 (2019), 448–450.
    [33]
    Panagiotis Radoglou-Grammatikis, Konstantinos Rompolos, Panagiotis Sarigiannidis, Vasileios Argyriou, Thomas Lagkas, Antonios Sarigiannidis, Sotirios Goudos, and Shaohua Wan. 2021. Modeling, detecting, and mitigating threats against industrial healthcare systems: A combined software defined networking and reinforcement learning approach. IEEE Trans. Industr. Inform. 18, 3 (2021), 2041–2052.
    [34]
    Netanel Raviv, Itzhak Tamo, and Eitan Yaakobi. 2019. Private information retrieval in graph-based replication systems. IEEE Trans. Inf. Theor. 66, 6 (2019), 3590–3602.
    [35]
    Yizhou Shen, Shigen Shen, Qi Li, Haiping Zhou, Zongda Wu, and Youyang Qu. 2022a. Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes. Digit. Commun. Netw.DOI:
    [36]
    Yizhou Shen, Shigen Shen, Zongda Wu, Haiping Zhou, and Shui Yu. 2022b. Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination. J. Inf. Secur. Applic. 66 (2022), 103140.
    [37]
    Lidan Shou, He Bai, Ke Chen, and Gang Chen. 2012. Supporting privacy protection in personalized web search. IEEE Trans. Knowl. Data Eng. 26, 2 (2012), 453–467.
    [38]
    Sajani Vithana, Karim Banawan, and Sennur Ulukus. 2022. Semantic private information retrieval. IEEE Trans. Inf. Theor. 68, 4 (2022), 2635–2652.
    [39]
    Shaohua Wan, Songtao Ding, and Chen Chen. 2022. Edge computing enabled video segmentation for real-time traffic monitoring in internet of vehicles. Pattern Recog. 121 (2022), 108146.
    [40]
    Chen Wang, Xinkui Wu, Gaoyang Liu, Tianping Deng, Kai Peng, and Shaohua Wan. 2022. Safeguarding cross-silo federated learning with local differential privacy. Digit. Commun. Netw. 8, 4 (2022), 446–454.
    [41]
    Tian Wang, Md Zakirul Alam Bhuiyan, Guojun Wang, Lianyong Qi, Jie Wu, and Thaier Hayajneh. 2019. Preserving balance between privacy and data integrity in edge-assisted Internet of Things. IEEE Internet Things J. 7, 4 (2019), 2679–2689.
    [42]
    Philip Fei Wu, Jessica Vitak, and Michael T. Zimmer. 2020b. A contextual approach to information privacy research. J. Assoc. Inf. Sci. Techn. 71, 4 (2020), 485–490.
    [43]
    Zongda Wu, Shigen Shen, Xinze Lian, Xinning Su, and Enhong Chen. 2020a. A dummy-based user privacy protection approach for text information retrieval. Knowl.-based Syst. 195 (2020), 105679.
    [44]
    Zongda Wu, Shigen Shen, Haiping Zhou, Huxiong Li, Chenglang Lu, and Dongdong Zou. 2021. An effective approach for the protection of user commodity viewing privacy in e-commerce website. Knowl.-based Syst. 220 (2021), 106952.
    [45]
    Zongda Wu, Ruiqin Wang, Qi Li, Xinze Lian, Guandong Xu, Enhong Chen, and Xiyang Liu. 2020c. A location privacy-preserving system based on query range cover-up or location-based services. IEEE Trans. Vehic. Technol. 69, 5 (2020), 5244–5254.
    [46]
    Liling Xiang and M. Cheng. 2018. The evolving path of Chinese and foreign information security systems. J. Libr. Sci. China 44, 2 (2018), 113–131.
    [47]
    Heecheol Yang, Wonjae Shin, and Jungwoo Lee. 2018. Private information retrieval for secure distributed storage systems. IEEE Trans. Inf. Forens. Secur. 13, 12 (2018), 2953–2964.
    [48]
    Jun Ye. 2021. Similarity measures based on the generalized distance of neutrosophic Z-number sets and their multi-attribute decision making method. Soft Comput. 25, 22 (2021), 13975–13985.
    [49]
    Hong Zhang, Shigen Shen, Qiying Cao, Xiaojun Wu, and Shaofeng Liu. 2020a. Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton. Int. J. Distrib. Sensor Netw. 16, 11 (2020), 1550147720972944.
    [50]
    Han Zhang, Songlin Wang, Kang Zhang, Zhiling Tang, Yunjiang Jiang, Yun Xiao, Weipeng Yan, and Wen-Yun Yang. 2020b. Towards personalized and semantic retrieval: An end-to-end solution for E-commerce search via embedding learning. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. 2407–2416.
    [51]
    Shengdong Zhang, Wenqi Ren, Xin Tan, Zhi-Jie Wang, Yong Liu, Jingang Zhang, Xiaoqin Zhang, and Xiaochun Cao. 2023. Semantic-aware dehazing network with adaptive feature fusion. IEEE Trans. Cyber. 53, 1 (2023), 454–467.
    [52]
    Liping Zhao, Tao Lin, Dongyu Zhang, Kailun Zhou, and Shuhui Wang. 2019. An ultra-low complexity and high efficiency approach for lossless alpha channel coding. IEEE Trans. Multim. 22, 3 (2019), 786–794.
    [53]
    Ping Zhao, Wuwu Liu, Guanglin Zhang, Zongpeng Li, and Lin Wang. 2020. Preserving privacy in WiFi localization with plausible dummy locations. IEEE Trans. Vehic. Technol. 69, 10 (2020), 11909–11925.
    [54]
    Zhi Zheng, Kai Hui, Ben He, Xianpei Han, Le Sun, and Andrew Yates. 2021. Contextualized query expansion via unsupervised chunk selection for text retrieval. Inf. Process. Manag. 58, 5 (2021), 102672.

    Cited By

    View all
    • (2024)Optimal PID controller for the DC-DC buck converter using the improved sine cosine algorithmResults in Control and Optimization10.1016/j.rico.2023.10035214(100352)Online publication date: Mar-2024
    • (2024)Joint learning of multi-level dynamic brain networks for autism spectrum disorder diagnosisComputers in Biology and Medicine10.1016/j.compbiomed.2024.108054171(108054)Online publication date: Mar-2024
    • (2023)Multi-criteria decision-making based on Pythagorean cubic fuzzy Einstein aggregation operators for investment managementAIMS Mathematics10.3934/math.20238668:7(16961-16988)Online publication date: 2023
    • Show More Cited By

    Index Terms

    1. A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Asian and Low-Resource Language Information Processing
      ACM Transactions on Asian and Low-Resource Language Information Processing  Volume 22, Issue 5
      May 2023
      653 pages
      ISSN:2375-4699
      EISSN:2375-4702
      DOI:10.1145/3596451
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 May 2023
      Online AM: 17 January 2023
      Accepted: 12 November 2022
      Revised: 06 October 2022
      Received: 14 April 2022
      Published in TALLIP Volume 22, Issue 5

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Chinese
      2. book search
      3. topic privacy
      4. privacy protection
      5. privacy model

      Qualifiers

      • Research-article

      Funding Sources

      • Zhejiang Philosophy and Social Science Planning Project
      • Key project of Humanities and Social Sciences in Colleges and Universities of Zhejiang Province
      • Humanities and Social Sciences Project of the Ministry of Education of China
      • Zhejiang Provincial Natural Science Foundation

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)151
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 10 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Optimal PID controller for the DC-DC buck converter using the improved sine cosine algorithmResults in Control and Optimization10.1016/j.rico.2023.10035214(100352)Online publication date: Mar-2024
      • (2024)Joint learning of multi-level dynamic brain networks for autism spectrum disorder diagnosisComputers in Biology and Medicine10.1016/j.compbiomed.2024.108054171(108054)Online publication date: Mar-2024
      • (2023)Multi-criteria decision-making based on Pythagorean cubic fuzzy Einstein aggregation operators for investment managementAIMS Mathematics10.3934/math.20238668:7(16961-16988)Online publication date: 2023
      • (2023)An enhanced ant colony optimizer with Cauchy-Gaussian fusion and novel movement strategy for multi-threshold COVID-19 X-ray image segmentationFrontiers in Neuroinformatics10.3389/fninf.2023.112678317Online publication date: 17-Mar-2023
      • (2023)An artificial bee bare-bone hunger games search for global optimization and high-dimensional feature selectioniScience10.1016/j.isci.2023.10667926:5(106679)Online publication date: May-2023
      • (2023)Intelligent predictive maintenance of hydraulic systems based on virtual knowledge graphEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.106798126:PAOnline publication date: 1-Nov-2023
      • (2023)Dynamic mechanism-assisted artificial bee colony optimization for image segmentation of COVID-19 chest X-rayDisplays10.1016/j.displa.2023.10248579(102485)Online publication date: Sep-2023
      • (2023)Multiband seizure type classification based on 3D convolution with attention mechanismsComputers in Biology and Medicine10.1016/j.compbiomed.2023.107517166(107517)Online publication date: Nov-2023
      • (2023)Poisson-based image editing for semi-supervised vitiligo lesion segmentation with limited annotationsComputers in Biology and Medicine10.1016/j.compbiomed.2023.107320165:COnline publication date: 1-Oct-2023
      • (2023)Dual-path multi-scale context dense aggregation network for retinal vessel segmentationComputers in Biology and Medicine10.1016/j.compbiomed.2023.107269164(107269)Online publication date: Sep-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media