{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T11:24:10Z","timestamp":1777461850006,"version":"3.51.4"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Zhejiang Philosophy and Social Science Planning Project","award":["22ZJQN45YB"],"award-info":[{"award-number":["22ZJQN45YB"]}]},{"name":"Key project of Humanities and Social Sciences in Colleges and Universities of Zhejiang Province","award":["2021GH017"],"award-info":[{"award-number":["2021GH017"]}]},{"name":"Humanities and Social Sciences Project of the Ministry of Education of China","award":["21YJA870011"],"award-info":[{"award-number":["21YJA870011"]}]},{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["LR23F020001"],"award-info":[{"award-number":["LR23F020001"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Asian Low-Resour. Lang. Inf. Process."],"published-print":{"date-parts":[[2023,5,31]]},"abstract":"<jats:p>In this article, aiming at a Chinese keyword-based book search service, from a technological perspective, we propose to modify a user query sequence carefully to confuse the user query topics and thus protect the user topic privacy on the untrusted server, without compromising the accuracy of each book search service. First, we propose a client-based framework for the privacy protection of book search, and then a privacy model to formulate the constraints in terms of accuracy, efficiency, and security, which the cover queries generated based on a user query sequence should meet. Second, we present a modification algorithm for a user query sequence, based on some heuristic strategies, which can quickly generate a cover query sequence meeting the privacy model by replacing, deleting, and adding keywords for each user query. Finally, both theoretical analysis and experimental evaluation demonstrate the effectiveness of the proposed approach, i.e., which can improve the security of users\u2019 topic privacy on the untrusted server without compromising the efficiency, accuracy, and usability of an existing Chinese keyword book search service, so it has a positive impact for the construction of a privacy-preserving text retrieval platform under an untrusted network environment.<\/jats:p>","DOI":"10.1145\/3571731","type":"journal-article","created":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T11:55:26Z","timestamp":1673956526000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0102-945X","authenticated-orcid":false,"given":"Zongda","family":"Wu","sequence":"first","affiliation":[{"name":"Shaoxing University, Shaoxing, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4075-9439","authenticated-orcid":false,"given":"Jian","family":"Xie","sequence":"additional","affiliation":[{"name":"Shaoxing University, Shaoxing, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7558-5379","authenticated-orcid":false,"given":"Shigen","family":"Shen","sequence":"additional","affiliation":[{"name":"Shaoxing University, Shaoxing, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7705-964X","authenticated-orcid":false,"given":"Chongze","family":"Lin","sequence":"additional","affiliation":[{"name":"Zhejiang Economic Information Centre, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4493-6663","authenticated-orcid":false,"given":"Guandong","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4835-4102","authenticated-orcid":false,"given":"Enhong","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, Anhui, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,9]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450965"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-015-9256-0"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2935440"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01233-z"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3158550"},{"key":"e_1_3_2_7_1","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/978-3-319-73676-1_11","volume-title":"Cloud Computing for Optimization: Foundations, Applications, and Challenges","author":"Cook Allan","year":"2018","unstructured":"Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, and Helge Janicke. 2018. Internet of cloud: Security and privacy issues. In Cloud Computing for Optimization: Foundations, Applications, and Challenges. Springer, 271\u2013301."},{"key":"e_1_3_2_8_1","article-title":"MSEva: A musculoskeletal rehabilitation evaluation system based on EMG signals","author":"Dai Yuanchao","year":"2022","unstructured":"Yuanchao Dai, Jing Wu, Yuanzhao Fan, Jin Wang, Jianwei Niu, Fei Gu, and Shigen Shen. 2022. MSEva: A musculoskeletal rehabilitation evaluation system based on EMG signals. ACM Trans. Sensor Netw. 19, 1 (2022), 1\u201323.","journal-title":"ACM Trans. Sensor Netw."},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2515050"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2936712"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2829898"},{"issue":"1","key":"e_1_3_2_12_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3423165","article-title":"Location privacy-preserving mechanisms in location-based services: A comprehensive survey","volume":"54","author":"Jiang Hongbo","year":"2021","unstructured":"Hongbo Jiang, Jie Li, Ping Zhao, Fanzi Zeng, Zhu Xiao, and Arun Iyengar. 2021. Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Comput. Surv. 54, 1 (2021), 1\u201336.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1383-z"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.009"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.100629"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.07.076"},{"key":"e_1_3_2_17_1","article-title":"Secure, efficient and weighted access control for cloud-assisted industrial IoT","author":"Li Qi","year":"2022","unstructured":"Qi Li, Qianqian Zhang, Haiping Huang, Wei Zhang, Wei Chen, and Huaqun Wang. 2022c. Secure, efficient and weighted access control for cloud-assisted industrial IoT. IEEE Internet Things J. 9, 18 (2022), 16917\u201316927.","journal-title":"IEEE Internet Things J."},{"key":"e_1_3_2_18_1","article-title":"Blockchain-based privacy-preserving and rewarding private data sharing for IoT","author":"Li Tian","year":"2022","unstructured":"Tian Li, Huaqun Wang, Debiao He, and Jia Yu. 2022a. Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet Things J. 9, 16 (2022), 15138\u201315149.","journal-title":"IEEE Internet Things J."},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3144869"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-016-1304-1"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.085"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2756344"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1300\/J104v35n01_09"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3099368"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2018.12.004"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00369"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/0340035218773786"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11104471"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045700"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883034"},{"key":"e_1_3_2_31_1","article-title":"UCoin: An efficient privacy preserving scheme for cryptocurrencies","author":"Nosouhi Mohammad Reza","year":"2021","unstructured":"Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler, Raja Jurdak, Ali Dorri, and Shigen Shen. 2021. UCoin: An efficient privacy preserving scheme for cryptocurrencies. IEEE Trans. Depend. Secure Comput. 20, 1 (2021), 242\u2013255.","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3074544"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aav5133"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3093905"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2955053"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.05.004"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103140"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.201"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3136583"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108146"},{"key":"e_1_3_2_41_1","article-title":"Safeguarding cross-silo federated learning with local differential privacy","author":"Wang Chen","year":"2022","unstructured":"Chen Wang, Xinkui Wu, Gaoyang Liu, Tianping Deng, Kai Peng, and Shaohua Wan. 2022. Safeguarding cross-silo federated learning with local differential privacy. Digit. Commun. Netw. 8, 4 (2022), 446\u2013454.","journal-title":"Digit. Commun. Netw."},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951687"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24232"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105679"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106952"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2981633"},{"issue":"2","key":"e_1_3_2_47_1","first-page":"113","article-title":"The evolving path of Chinese and foreign information security systems","volume":"44","author":"Xiang Liling","year":"2018","unstructured":"Liling Xiang and M. Cheng. 2018. The evolving path of Chinese and foreign information security systems. J. Libr. Sci. China 44, 2 (2018), 113\u2013131.","journal-title":"J. Libr. Sci. China"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833050"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06199-x"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720972944"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401446"},{"key":"e_1_3_2_52_1","article-title":"Semantic-aware dehazing network with adaptive feature fusion","author":"Zhang Shengdong","year":"2023","unstructured":"Shengdong Zhang, Wenqi Ren, Xin Tan, Zhi-Jie Wang, Yong Liu, Jingang Zhang, Xiaoqin Zhang, and Xiaochun Cao. 2023. Semantic-aware dehazing network with adaptive feature fusion. IEEE Trans. Cyber. 53, 1 (2023), 454\u2013467.","journal-title":"IEEE Trans. Cyber."},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2931414"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3006363"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102672"}],"container-title":["ACM Transactions on Asian and Low-Resource Language Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:33Z","timestamp":1750182573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,9]]},"references-count":54,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,5,31]]}},"alternative-id":["10.1145\/3571731"],"URL":"https:\/\/doi.org\/10.1145\/3571731","relation":{},"ISSN":["2375-4699","2375-4702"],"issn-type":[{"value":"2375-4699","type":"print"},{"value":"2375-4702","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,9]]},"assertion":[{"value":"2022-04-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-12","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}