Abstract
PurposeFirst, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the characteristics of all kinds of existing approaches to privacy protection and their application limitations in the protection of readers' data privacy and behavior privacy. Lastly, the authors compare the advantages and disadvantages of each kind of existing approaches in terms of security, efficiency, accuracy and practicality and analyze the challenges faced by the protection of digital library reader privacy.Design/methodology/approachIn this paper, the authors review a number of research achievements relevant to privacy protection and analyze and evaluate the application limitations of them in the reader privacy protection of a digital library, consequently, establishing the constraints that an ideal approach to library reader privacy protection should meet, so as to provide references for the follow-up research of the problem.FindingsAs a result, the authors conclude that an ideal approach to reader privacy protection should be able to comprehensively improve the security of all kinds of readers' privacy information on the untrusted server-side as a whole, under the premise of not changing the architecture, efficiency, accuracy and practicality of a digital library system.Originality/valueAlong with the rapid development of new network technologies, such as cloud computing, the server-side of a digital library is becoming more and more untrustworthy, thereby, posing a serious threat to the privacy of library readers. In fact, the problem of reader privacy has become one of the important obstacles to the further development and application of digital libraries.
Subject
Library and Information Sciences,Information Systems
Reference104 articles.
1. User-side adaptive protection of location privacy in participatory sensing;GeoInformatica,2014
2. Order-preserving encryption revisited: improved security analysis and alternative solutions,2011
3. From civic place to digital space: the design of public libraries in Britain from past to present;Library Trends,2012
4. Privacy preserving dynamic pseudonym-based multiple mix-zones authentication;Wireless Personal Communications,2016
5. Provably-secure time-bound hierarchical key assignment schemes;Journal of Cryptology,2012
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献