Search results
1 – 2 of 2Zongda Wu, Chengren Zheng, Jian Xiejian, Zhifeng Zhou, Guandong Xu and Enhong Chen
The problem of privacy protection in digital libraries is causing people to have increasingly extensive concerns. This study aims to design an approach to protect the preference…
Abstract
Purpose
The problem of privacy protection in digital libraries is causing people to have increasingly extensive concerns. This study aims to design an approach to protect the preference privacy behind users’ book browsing behaviors in a digital library.
Design/methodology/approach
This paper proposes a client-based approach, whose basic idea is to construct a group of plausible book browsing dummy behaviors, and submit them together with users’ true behaviors to the untrusted server, to cover up users’ sensitive preferences.
Findings
Both security analysis and evaluation experiment demonstrate the effectiveness of the approach, which can ensure the privacy security of users’ book browsing preferences on the untrusted digital library server, without compromising the usability, accuracy and efficiency of book services.
Originality/value
To the best of the authors’ knowledge, this paper provides the first attempt to the protection of users’ behavior privacy in digital libraries, which will have a positive influence on the development of privacy-preserving libraries in the new network era.
Details
Keywords
Zongda Wu, Jian Xie, Xinze Lian and Jun Pan
The security of archival privacy data in the cloud has become the main obstacle to the application of cloud computing in archives management. To this end, aiming at XML archives…
Abstract
Purpose
The security of archival privacy data in the cloud has become the main obstacle to the application of cloud computing in archives management. To this end, aiming at XML archives, this paper aims to present a privacy protection approach that can ensure the security of privacy data in the untrusted cloud, without compromising the system availability.
Design/methodology/approach
The basic idea of the approach is as follows. First, the privacy data before being submitted to the cloud should be strictly encrypted on a trusted client to ensure the security. Then, to query the encrypted data efficiently, the approach constructs some key feature data for the encrypted data, so that each XML query defined on the privacy data can be executed correctly in the cloud.
Findings
Finally, both theoretical analysis and experimental evaluation demonstrate the overall performance of the approach in terms of security, efficiency and accuracy.
Originality/value
This paper presents a valuable study attempting to protect privacy for the management of XML archives in a cloud environment, so it has a positive significance to promote the application of cloud computing in a digital archive system.
Details