{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T15:25:08Z","timestamp":1769009108089,"version":"3.49.0"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"name":"Zhejiang Philosophy and Social Science Planning","award":["24QNYC21ZD and 22ZJQN45YB"],"award-info":[{"award-number":["24QNYC21ZD and 22ZJQN45YB"]}]},{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["LR23F020001"],"award-info":[{"award-number":["LR23F020001"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Humanities and Social Sciences Project of the Ministry of Education of China"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Data and Information Quality"],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>Along with the wide popularization of mobile terminal devices such as smart phones, mobile libraries, which provide mobile book information services as the core business, have become an important part of people\u2019s daily life. However, with the rapid development of emerging network technologies such as cloud computing, the server side of a mobile library has become more and more untrusted, and the problem of reader preference privacy associated with mobile book information services has become increasingly prominent. To this end, this article proposes to construct a group of false requests of mobile book information service at a trusted client of a mobile library, which are then submitted to the untrusted server side together with a true request, so as to confuse the reader book preference privacy. Firstly, we define a theoretical model for the protection of reader preference privacy. It measures the confusion effect of false requests on a true request by introducing the concepts of book information entropy, location information entropy, and book location joint entropy. It measures the concealment effect of false requests on readers\u2019 mobile book preferences by introducing the concepts of book category distance and location region distance. Secondly, we present a specific implementation algorithm of the theoretical model to generate a group of ideal false requests that meet the privacy constraints for readers\u2019 true requests. Finally, theoretical analysis and experimental evaluation demonstrate the effectiveness of the proposed method, i.e., it can effectively improve the security of readers\u2019 mobile book preference privacy on the untrusted server side, without compromising the availability of a mobile book information service.<\/jats:p>","DOI":"10.1145\/3688395","type":"journal-article","created":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T06:22:24Z","timestamp":1723702944000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["How to Protect of Reader Preference Privacy in Mobile Book Information Services: A Technical Method"],"prefix":"10.1145","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4292-3730","authenticated-orcid":false,"given":"Zongda","family":"Wu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Shaoxing University","place":["Shaoxing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1912-1932","authenticated-orcid":false,"given":"Guoqi","family":"Lin","sequence":"additional","affiliation":[{"name":"Shaoxing University","place":["Shaoxing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2042-1673","authenticated-orcid":false,"given":"Huawen","family":"Liu","sequence":"additional","affiliation":[{"name":"Shaoxing University","place":["Shaoxing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4075-9439","authenticated-orcid":false,"given":"Jian","family":"Xie","sequence":"additional","affiliation":[{"name":"Shaoxing University","place":["Shaoxing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4493-6663","authenticated-orcid":false,"given":"Guandong","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney","place":["Sydney, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4835-4102","authenticated-orcid":false,"given":"Enhong","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China","place":["Hefei, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5573-6400","authenticated-orcid":false,"given":"Gang","family":"Li","sequence":"additional","affiliation":[{"name":"Wuhan University","place":["Wuhan, China"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,23]]},"reference":[{"key":"e_1_3_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01233-z"},{"key":"e_1_3_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3158550"},{"key":"e_1_3_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3522739"},{"key":"e_1_3_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4747-5"},{"key":"e_1_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2936712"},{"key":"e_1_3_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3181609"},{"key":"e_1_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.009"},{"key":"e_1_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.100629"},{"key":"e_1_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3146197"},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3144869"},{"issue":"3","key":"e_1_3_1_12_1","first-page":"1","article-title":"Privacy, security and resilience in mobile healthcare applications","volume":"17","author":"Lin Wenjun","year":"2021","unstructured":"Wenjun Lin, Ming Xu, Jingyi He, and Wenjun Zhang. 2021. Privacy, security and resilience in mobile healthcare applications. Enterprise Information Systems 17, 3 (2021), 1\u201315.","journal-title":"Enterprise Information Systems"},{"key":"e_1_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3109898"},{"key":"e_1_3_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2756344"},{"key":"e_1_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2024.102343"},{"key":"e_1_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883034"},{"key":"e_1_3_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3130952"},{"key":"e_1_3_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3093905"},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2955053"},{"key":"e_1_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.05.004"},{"key":"e_1_3_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103140"},{"key":"e_1_3_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208039"},{"key":"e_1_3_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3372518"},{"key":"e_1_3_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.11.006"},{"key":"e_1_3_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951687"},{"key":"e_1_3_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24227"},{"key":"e_1_3_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-023-01208-5"},{"key":"e_1_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106952"},{"key":"e_1_3_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2981633"},{"key":"e_1_3_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3571731"},{"key":"e_1_3_1_31_1","article-title":"Method of cumulative anomaly identification for security database based on discrete Markov chain","volume":"2022","author":"Xu Zhiying","year":"2022","unstructured":"Zhiying Xu, Ting Yang, and Moslem Lari Najafi. 2022. Method of cumulative anomaly identification for security database based on discrete Markov chain. Security and Communication Networks 2022 (2022).","journal-title":"Security and Communication Networks"},{"key":"e_1_3_1_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720972944"},{"issue":"1","key":"e_1_3_1_33_1","first-page":"4743605","article-title":"Steady-state availability evaluation for heterogeneous edge computing-enabled WSNs with malware infections","volume":"2022","author":"Zhang Hong","year":"2022","unstructured":"Hong Zhang, Shumin Yang, Guowen Wu, Shigen Shen, and Qiying Cao. 2022. Steady-state availability evaluation for heterogeneous edge computing-enabled WSNs with malware infections. Mobile Information Systems 2022, 1 (2022), 4743605.","journal-title":"Mobile Information Systems"},{"key":"e_1_3_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3124231"},{"key":"e_1_3_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2931414"}],"container-title":["Journal of Data and Information Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3688395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T11:44:00Z","timestamp":1758627840000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688395"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,23]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3688395"],"URL":"https:\/\/doi.org\/10.1145\/3688395","relation":{},"ISSN":["1936-1955","1936-1963"],"issn-type":[{"value":"1936-1955","type":"print"},{"value":"1936-1963","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,23]]},"assertion":[{"value":"2023-12-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}