{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:25:36Z","timestamp":1757543136670,"version":"3.41.2"},"reference-count":33,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2020,12,28]],"date-time":"2020-12-28T00:00:00Z","timestamp":1609113600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["LHT"],"published-print":{"date-parts":[[2022,12,8]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>In this paper, the authors propose an effective mechanism for the protection of digital library readers' lending privacy under a cloud environment.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The basic idea of the method is that for each literature circulation record, before being submitted to the untrusted cloud database of a digital library for storage, its reader number has to be encrypted strictly at a client, so as to make it unable for an attacker at the cloud to know the specific reader associated with each circulation record and thus protect readers' lending privacy. Moreover, the authors design an effective method for querying the encrypted literature circulation records, so as to ensure the accuracy and efficiency of each kind of database queries related to the encrypted reader number field of literature circulation records.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Finally, both theoretical analysis and experimental evaluation demonstrate the effectiveness of the proposed methods.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This paper presents the first study attempt to the privacy protection of readers' literature circulations, which can improve the security of readers' lending privacy in the untrusted cloud, without compromising the accuracy and efficiency of each kind of database queries in the digital library. It is of positive significance to construct a privacy-preserving digital library platform.<\/jats:p><\/jats:sec>","DOI":"10.1108\/lht-07-2020-0178","type":"journal-article","created":{"date-parts":[[2020,12,27]],"date-time":"2020-12-27T22:55:23Z","timestamp":1609109723000},"page":"1746-1765","source":"Crossref","is-referenced-by-count":18,"title":["How to protect reader lending privacy under a cloud environment: a technical method"],"prefix":"10.1108","volume":"40","author":[{"given":"Zongda","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7558-5379","authenticated-orcid":false,"given":"Shigen","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Chenglang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Huxiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xinning","family":"Su","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,12,28]]},"reference":[{"key":"key2022120611174914900_ref001","first-page":"505","article-title":"Privacy preserving dynamic pseudonym-based multiple mix-zones authentication","volume":"95","year":"2016","journal-title":"Wireless Personal Communications"},{"key":"key2022120611174914900_ref002","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.dss.2013.09.005","article-title":"Range query estimation with data skewness for top-k retrieval","volume":"57","year":"2014","journal-title":"Decision Support Systems"},{"issue":"4","key":"key2022120611174914900_ref003","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/TSMCC.2010.2045755","article-title":"Multifactor identity verification using aggregated proof of knowledge","volume":"40","year":"2010","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part C"},{"key":"key2022120611174914900_ref004","first-page":"36","article-title":"Large age-gap face verification by feature injection in deep networks","volume":"90","year":"2016","journal-title":"Pattern Recognition Letters"},{"volume-title":"Privacy-Preserving Record Linkage for Big Datapp. Current Approaches and Research Challenges","year":"2017","key":"key2022120611174914900_ref005"},{"issue":"2","key":"key2022120611174914900_ref006","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3197384","article-title":"Finite-state map-reduce computation and relational algebra queries","volume":"19","year":"2018","journal-title":"ACM Transactions on Computational Logic"},{"issue":"1","key":"key2022120611174914900_ref007","first-page":"175","article-title":"Library privacy in practicepp. System change and challenges","volume":"13","year":"2017","journal-title":"A Journal of Law and Policy for the Information Society"},{"issue":"3","key":"key2022120611174914900_ref008","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1108\/EL-09-2014-0158","article-title":"Risk assessment of digital library information securitypp. A case study","volume":"34","year":"2016","journal-title":"The Electronic Library"},{"issue":"3","key":"key2022120611174914900_ref009","doi-asserted-by":"crossref","first-page":"1175","DOI":"10.1007\/s11280-018-0593-y","article-title":"Statistical study of characteristics of online reading behavior networks in university digital library","volume":"22","year":"2019","journal-title":"World Wide Web"},{"issue":"9","key":"key2022120611174914900_ref010","first-page":"3253","article-title":"Fingerprint verification system based on curvelet transform and possibility theory","volume":"74","year":"2013","journal-title":"Multimedia Tools and Applications"},{"unstructured":"Hayawardh, V., Guruprasad, J., Sandra, R., Schiffman, J. and Jaeger, T. (2012), \u201cIntegrity wallspp. finding attack surfaces from mandatory access control policies\u201d, ACM Symposium on Information, Computer and Communications Security.","key":"key2022120611174914900_ref011"},{"unstructured":"Julien, V. and Lahiri, S. (2013), \u201cTowards practical reactive security audit using extended static checkers\u201d, IEEE Symposium on Security and Privacy.","key":"key2022120611174914900_ref013"},{"issue":"1","key":"key2022120611174914900_ref014","first-page":"199","article-title":"Reader privacy in digital library collaborationspp. signs of commitment, opportunities for improvement","volume":"13","year":"2016","journal-title":"A Journal of Law and Policy for the Information Society"},{"issue":"6","key":"key2022120611174914900_ref015","first-page":"4","article-title":"The historical contributions of the public library law of the People's Republic of China","volume":"43","year":"2017","journal-title":"Journal of Library Science in China"},{"issue":"4","key":"key2022120611174914900_ref016","first-page":"12","article-title":"The reflection on the enforcement of public culture law in Chinapp. Centered on the security legislation of public cultural service and the public library law","volume":"45","year":"2019","journal-title":"Journal of Library Science in China"},{"key":"key2022120611174914900_ref017","first-page":"31","article-title":"On the legal protection of personal data in big data environment","volume":"5","year":"2018","journal-title":"Library Journal"},{"key":"key2022120611174914900_ref018","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.ins.2017.11.065","article-title":"Executing multidimensional range query efficiently and flexibly over outsourced ciphertext in the cloud","volume":"432","year":"2018","journal-title":"Information Sciences"},{"issue":"4","key":"key2022120611174914900_ref019","first-page":"882","article-title":"Analyzing the relationship between information-seeking and help-seeking behaviours in a digital library","volume":"35","year":"2017","journal-title":"The Electronic Library"},{"year":"2015","article-title":"Extending mandatory access control policies in android","key":"key2022120611174914900_ref020"},{"issue":"6","key":"key2022120611174914900_ref021","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1007\/s12083-014-0269-z","article-title":"Mix-zones \u2018optimal deployment for protecting location privacy in VANET\u2019","volume":"8","year":"2015","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"13","key":"key2022120611174914900_ref022","doi-asserted-by":"crossref","first-page":"5352","DOI":"10.1016\/j.eswa.2013.03.042","article-title":"A new spontaneous pupillary oscillation-based verification system","volume":"40","year":"2013","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"key2022120611174914900_ref023","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1108\/LHT-06-2016-0074","article-title":"Metadata and universal access in digital library environments","volume":"35","year":"2017","journal-title":"Library Hi Tech"},{"issue":"3","key":"key2022120611174914900_ref024","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/2730906","article-title":"Fully homomorphic encryption: cryptography's holy grail","volume":"21","year":"2015","journal-title":"ACM Crossroads"},{"year":"2010","article-title":"Obligation constraints in access control","key":"key2022120611174914900_ref025"},{"key":"key2022120611174914900_ref026","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.knosys.2012.05.009","article-title":"Executing SQL queries over encrypted character strings in the database-as-service model","volume":"35","year":"2012","journal-title":"Knowledge-Based Systems"},{"issue":"6","key":"key2022120611174914900_ref027","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1108\/EL-07-2017-0162","article-title":"An approach for the protection of users' book browsing preference privacy in a digital library","volume":"36","year":"2018","journal-title":"The Electronic Library"},{"issue":"4","key":"key2022120611174914900_ref028","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1007\/s11280-017-0491-8","article-title":"An effective approach for the protection of privacy text data in the CloudDB","volume":"21","year":"2018","journal-title":"World Wide Web"},{"issue":"4","key":"key2022120611174914900_ref029","first-page":"315","article-title":"An effective approach for the protection of user privacy in a digital library","volume":"69","year":"2019","journal-title":"International Journal of Libraries and Information Studies - LIBRI"},{"issue":"2","key":"key2022120611174914900_ref030","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1002\/asi.24227","article-title":"A user sensitive subject protection approach for book search service","volume":"71","year":"2020","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"2","key":"key2022120611174914900_ref031","first-page":"113","article-title":"The evolving path of Chinese and foreign information security systems","volume":"44","year":"2018","journal-title":"Journal of Library Science in China"},{"key":"key2022120611174914900_ref032","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.ins.2016.12.025","article-title":"Semi-order preserving encryption","volume":"387","year":"2017","journal-title":"Information Sciences"},{"key":"key2022120611174914900_ref033","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1016\/j.protcy.2013.12.128","article-title":"Group-based discretionary access control for epidemio-logical resources","volume":"9","year":"2013","journal-title":"Procedia Technology"},{"issue":"5","key":"key2022120611174914900_ref034","first-page":"25","article-title":"Password memorability and security: empirical results","volume":"2","year":"2014","journal-title":"IEEE Security and Privacy"}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-07-2020-0178\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-07-2020-0178\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:14:51Z","timestamp":1753395291000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/lht\/article\/40\/6\/1746-1765\/264966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,28]]},"references-count":33,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2020,12,28]]},"published-print":{"date-parts":[[2022,12,8]]}},"alternative-id":["10.1108\/LHT-07-2020-0178"],"URL":"https:\/\/doi.org\/10.1108\/lht-07-2020-0178","relation":{},"ISSN":["0737-8831"],"issn-type":[{"type":"print","value":"0737-8831"}],"subject":[],"published":{"date-parts":[[2020,12,28]]}}}