Skip to main content

Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations

  • Conference paper
  • First Online:
Network and System Security (NSS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12570))

Included in the following conference series:

Abstract

In recent years, the problem of data leakage often appears in our lives. As of today, a number of enterprises have been fined heavily for the leakage of user data, including Facebook, Uber and Equifax. This paper makes deep research on the privacy protection of the text. We proposed a three-layer privacy protection mechanism for carrying out privacy-preserving text perturbation. This approach allows different levels of privacy protection for different parts of the text, thereby increasing the level of privacy protection without reducing utility. Extensive experiments prove that the proposed method not only provides fine-grained control over the level of privacy in that data but also improves performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Pazii, A.: Invited paper: Local differential privacy on metric spaces: Optimizing the trade-off with utility. In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9–12, 2018. pp. 262–267. IEEE Computer Society (2018). https://doi.org/10.1109/CSF.2018.00026

  2. Bambauer, D.E.: Privacy versus security. J. Criminal Law & Criminol. 103, 667 (2013)

    Google Scholar 

  3. Cumby, C., Ghani, R.: Inference control to protect sensitive information in text documents. In: ACM SIGKDD Workshop on Intelligence & Security Informatics. pp. 1–7 (2010)

    Google Scholar 

  4. Dwork, C.: Dierential privacy. In: Proceedings of the 33rd International Conference on Automata, Languages and Programming - Volume Part II (2006)

    Google Scholar 

  5. Feyisetan, O., Balle, B., Drake, T., Diethe, T.: Privacy- and utility-preserving textual analysis via calibrated multivariate perturbations (2019)

    Google Scholar 

  6. Feyisetan, O., Balle, B., Drake, T., Diethe, T.: Privacy- and utility-preserving textual analysis via calibrated multivariate perturbations. In: WSDM 2020: The Thirteenth ACM International Conference on Web Search and Data Mining (2020)

    Google Scholar 

  7. Pang, H.H., Ding, X., Xiao, X.: Embellishing text search queries to protect user privacy. Proc. VLDB Endowment 3(1), 598–607 (2010)

    Article  Google Scholar 

  8. Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: Mendelzon, A.O., Paredaens, J. (eds.) Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 1–3, 1998, Seattle, Washington, USA. p. 188. ACM Press (1998). https://doi.org/10.1145/275487.275508

  9. Sanchez, D., Batet, M.: C-sanitized: a privacy model for document redaction and sanitization. J. Assoc. Inf. Sci. Technol. 67(1), 148–163 (2016)

    Article  Google Scholar 

  10. Sanchez, D., Castella-Roca, J., Viejo, A.: Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines. Inf. Sci. 218(1), 17–30 (2013)

    Article  Google Scholar 

  11. Wu, X., Li, F., Kumar, A., Chaudhuri, K., Jha, S., Naughton, J.F.: Bolt-on differential privacy for scalable stochastic gradient descent-based analytics (2016)

    Google Scholar 

  12. Xiang, Z., Ding, B., He, X., Zhou, J.: Linear and range counting under metric-based local differential privacy (2019)

    Google Scholar 

  13. Zhu, T., Li, G., Zhou, W., Yu, P.S.: Differentially private data publishing and analysis: a survey. IEEE Trans. Knowl. Data Eng. 29(8), 1619–1638 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tianqing Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tang, J., Zhu, T., Xiong, P., Wang, Y., Ren, W. (2020). Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations. In: Kutyłowski, M., Zhang, J., Chen, C. (eds) Network and System Security. NSS 2020. Lecture Notes in Computer Science(), vol 12570. Springer, Cham. https://doi.org/10.1007/978-3-030-65745-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-65745-1_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-65744-4

  • Online ISBN: 978-3-030-65745-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics