Field |
Value |
Language |
dc.contributor.author |
Wu, Z |
|
dc.contributor.author |
Lin, G |
|
dc.contributor.author |
Liu, H |
|
dc.contributor.author |
Xie, J |
|
dc.contributor.author |
Xu, G
https://orcid.org/0000-0003-4493-6663
|
|
dc.contributor.author |
Chen, E |
|
dc.contributor.author |
Li, G |
|
dc.date.accessioned |
2025-03-10T04:35:49Z |
|
dc.date.available |
2025-03-10T04:35:49Z |
|
dc.identifier.citation |
Journal of Data and Information Quality |
|
dc.identifier.issn |
1936-1955 |
|
dc.identifier.issn |
1936-1963 |
|
dc.identifier.uri |
http://hdl.handle.net/10453/185628
|
|
dc.description.abstract |
<jats:p>Along with the wide popularization of mobile terminal devices such as smart phones, mobile libraries, which provide mobile book information services as the core business, have become an important part of people’s daily life. However, with the rapid development of emerging network technologies such as cloud computing, the server side of a mobile library has become more and more untrusted, and the problem of reader preference privacy associated with mobile book information services has become increasingly prominent. To this end, this paper proposes to construct a group of false requests of mobile book information service at a trusted client of a mobile library, which are then submitted to the untrusted server side together with a true request, so as to confuse the reader book preference privacy. Firstly, we define a theoretical model for the protection of reader preference privacy. It measures the confusion effect of false requests on a true request by introducing the concepts of book information entropy, location information entropy, and book location joint entropy. It measures the concealment effect of false requests on readers’ mobile book preferences by introducing the concepts of book category distance and location region distance. Secondly, we present a specific implementation algorithm of the theoretical model to generate a group of ideal false requests that meet the privacy constraints for readers’ true requests. Finally, theoretical analysis and experimental evaluation demonstrate the effectiveness of the proposed method, i.e., it can effectively improve the security of readers’ mobile book preference privacy on the untrusted server side, without compromising the availability of a mobile book information service.</jats:p> |
|
dc.language |
en |
|
dc.publisher |
Association for Computing Machinery (ACM) |
|
dc.relation.ispartof |
Journal of Data and Information Quality |
|
dc.relation.isbasedon |
10.1145/3688395 |
|
dc.rights |
info:eu-repo/semantics/restrictedAccess |
|
dc.subject |
08 Information and Computing Sciences |
|
dc.subject.classification |
4605 Data management and data science |
|
dc.subject.classification |
4610 Library and information studies |
|
dc.title |
How to Protect of Reader Preference Privacy in Mobile Book Information Services: A Technical Method |
|
dc.type |
Journal Article |
|
utslib.for |
08 Information and Computing Sciences |
|
pubs.organisational-group |
University of Technology Sydney |
|
pubs.organisational-group |
University of Technology Sydney/Faculty of Engineering and Information Technology |
|
pubs.organisational-group |
University of Technology Sydney/Faculty of Engineering and Information Technology/School of Computer Science |
|
pubs.organisational-group |
University of Technology Sydney/UTS Groups |
|
pubs.organisational-group |
University of Technology Sydney/UTS Groups/Data Science Institute (DSI) |
|
pubs.organisational-group |
University of Technology Sydney/UTS Groups/Centre for Advanced Manufacturing (CAM) |
|
pubs.organisational-group |
University of Technology Sydney/UTS Groups/Centre for Advanced Manufacturing (CAM)/Centre for Advanced Manufacturing (CAM) Associate Members |
|
utslib.copyright.status |
in_progress |
* |
dc.date.updated |
2025-03-10T04:35:48Z |
|
pubs.publication-status |
Published online |
|