Abstract
In recent years, the problem of data leakage often appears in our lives. As of today, a number of enterprises have been fined heavily for the leakage of user data, including Facebook, Uber and Equifax. This paper makes deep research on the privacy protection of the text. We proposed a three-layer privacy protection mechanism for carrying out privacy-preserving text perturbation. This approach allows different levels of privacy protection for different parts of the text, thereby increasing the level of privacy protection without reducing utility. Extensive experiments prove that the proposed method not only provides fine-grained control over the level of privacy in that data but also improves performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Pazii, A.: Invited paper: Local differential privacy on metric spaces: Optimizing the trade-off with utility. In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9–12, 2018. pp. 262–267. IEEE Computer Society (2018). https://doi.org/10.1109/CSF.2018.00026
Bambauer, D.E.: Privacy versus security. J. Criminal Law & Criminol. 103, 667 (2013)
Cumby, C., Ghani, R.: Inference control to protect sensitive information in text documents. In: ACM SIGKDD Workshop on Intelligence & Security Informatics. pp. 1–7 (2010)
Dwork, C.: Dierential privacy. In: Proceedings of the 33rd International Conference on Automata, Languages and Programming - Volume Part II (2006)
Feyisetan, O., Balle, B., Drake, T., Diethe, T.: Privacy- and utility-preserving textual analysis via calibrated multivariate perturbations (2019)
Feyisetan, O., Balle, B., Drake, T., Diethe, T.: Privacy- and utility-preserving textual analysis via calibrated multivariate perturbations. In: WSDM 2020: The Thirteenth ACM International Conference on Web Search and Data Mining (2020)
Pang, H.H., Ding, X., Xiao, X.: Embellishing text search queries to protect user privacy. Proc. VLDB Endowment 3(1), 598–607 (2010)
Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: Mendelzon, A.O., Paredaens, J. (eds.) Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 1–3, 1998, Seattle, Washington, USA. p. 188. ACM Press (1998). https://doi.org/10.1145/275487.275508
Sanchez, D., Batet, M.: C-sanitized: a privacy model for document redaction and sanitization. J. Assoc. Inf. Sci. Technol. 67(1), 148–163 (2016)
Sanchez, D., Castella-Roca, J., Viejo, A.: Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines. Inf. Sci. 218(1), 17–30 (2013)
Wu, X., Li, F., Kumar, A., Chaudhuri, K., Jha, S., Naughton, J.F.: Bolt-on differential privacy for scalable stochastic gradient descent-based analytics (2016)
Xiang, Z., Ding, B., He, X., Zhou, J.: Linear and range counting under metric-based local differential privacy (2019)
Zhu, T., Li, G., Zhou, W., Yu, P.S.: Differentially private data publishing and analysis: a survey. IEEE Trans. Knowl. Data Eng. 29(8), 1619–1638 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Tang, J., Zhu, T., Xiong, P., Wang, Y., Ren, W. (2020). Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations. In: Kutyłowski, M., Zhang, J., Chen, C. (eds) Network and System Security. NSS 2020. Lecture Notes in Computer Science(), vol 12570. Springer, Cham. https://doi.org/10.1007/978-3-030-65745-1_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-65745-1_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-65744-4
Online ISBN: 978-3-030-65745-1
eBook Packages: Computer ScienceComputer Science (R0)