Abstract
In a survey, a lot of questions and answers are listed and participators will select one of the answers for each question. Sometimes, participators may not be willing to select the preferred one item in the answers because the item may damage the privacy of themselves. If this question is not answered, then it reveals that the question or the answers are sensitive, which also damages the privacy. Besides, each participator may have distinct privacy concerns even for the same questions and answers, thus the privacy-aware questions and answers cannot be determined and be removed in advance. Thus, the dilemma is how to select the answers for privacy-aware questions yet maintain the utility of the answering results in the survey. In this paper, we propose a general method to protect the various privacy in the investigation without the knowledge of privacy to be protected in advance. The main idea is that participators can randomly select answers if the privacy is the concern for themselves in the answers for this question. Our method is lightweight so as to be convenient in practices. We extensively analyze the accuracy of survey results to justify that our method can protect the privacy yet maintain the utility of the investigation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rigaki, M., Garcia, S.: A survey of privacy attacks in machine learning. ACM Comput. Surv. 56(4), 1–34 (2023)
Rodríguez, E., Otero, B., Canal, R.: A survey of machine and deep learning methods for privacy protection in the internet of things. Sensors 23(3), 1252 (2023)
Zhang, B., Sundar, S.S.: Proactive vs. reactive personalization: can customization of privacy enhance user experience? Int. J. Hum Comput Stud. 128, 86–99 (2019)
Dimitrov, W.: GDPR entrapments. Proactive and reactive (re) design thinking. Electrotechnica Electronica (E+ E) 52 (2017)
Winkler, T., Rinner, B.: Security and privacy protection in visual sensor networks: a survey. ACM Comput. Surv. (CSUR) 47(1), 1–42 (2014)
Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data 3, 25 (2016)
Chen, P., et al.: The formal analysis on negative information selections for privacy protection in data publishing. J. Electr. Comput. Eng. (2024)
Sun, Y., et al.: An IoT data sharing privacy preserving scheme. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE (2020)
Beg, S., et al.: A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS). J. Netw. Comput. Appl. 174, 102874 (2021)
Huang, X., et al.: Randomization is all you need: a privacy-preserving federated learning framework for news recommendation. Inf. Sci. 637, 118943 (2023)
Zhu, X., et al.: Privacy-preserving realization of fuzzy clustering and fuzzy modeling through vertical federated learning. IEEE Trans. Syst. Man Cybern. Syst. (2023)
Zhang, Y., Ying, Z., Philip Chen, C.L.: Achieving privacy-preserving multitask allocation for mobile crowdsensing. IEEE Internet Things J. 9(18), 16795–16806 (2022)
Gao, W., et al.: Privacy-preserving auction for big data trading using homomorphic encryption. IEEE Trans. Netw. Sci. Eng. 7(2), 776–791 (2018)
Liu, F., et al.: Privacy-preserving synthetic data generation for recommendation system. In: Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval (2022)
Xu, L., et al.: Privacy or utility in data collection? A contract theoretic approach. IEEE J. Sel. Top. Sig. Process. 9(7), 1256–1269 (2015)
Esmeel, T.K., et al.: Balancing data utility versus information loss in data-privacy protection using k-anonymity. In: 2020 IEEE 8th Conference on Systems, Process and Control (ICSPC). IEEE (2020)
Vural, Y., Aydos, M.: A new approach to utility-based privacy preserving in data publishing. In: 2017 IEEE International Conference on Computer and Information Technology (CIT). IEEE (2017)
Amighi, A., et al.: On protecting microdata in open data settings from a data utility perspective. In: Proceedings of the 14th International Conference on Digital Society (ICDS), Special Track Protecting Privacy in Open ( & Big) Data Settings (PPODS), Valencia, Spain, November 2020
Mohammed, K., Ayesh, A., Boiten, E.: Utility promises of self-organising maps in privacy preserving data mining. In: Garcia-Alfaro, J., Navarro-Arribas, G., Herrera-Joancomarti, J. (eds.) DPM/CBT -2020. LNCS, vol. 12484, pp. 55–72. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-66172-4_4
Sugawara, Y., et al.: Method for creating privacy-preserving information using probabilistic latent semantic analysis. In: 2023 IEEE International Conference on Big Data (BigData). IEEE (2023)
Pardo, R., Rafnsson, W., Probst, C.W., Wąsowski, A.: Privug: using probabilistic programming for quantifying leakage in privacy risk analysis. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12973, pp. 417–438. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-88428-4_21
Tesfay, W.B., Serna-Olvera, J., Towards user-centered privacy risk detection and quantification framework. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE (2016)
Zhang, S., et al.: Probabilistic matrix factorization with personalized differential privacy. Knowl.-Based Syst. 183, 104864 (2019)
Hamza, R., et al.: A privacy-preserving cryptosystem for IoT E-healthcare. Inf. Sci. 527, 493–510 (2020)
Acknowledgement
The research was financially supported by the State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR, CASM (No. 2023-04-04), the Key Laboratory of Data Protection and Intelligent Management, Ministry of Education, Sichuan University and also the Fundamental Research Funds for the Central Universities (No. SCU2023D008), and Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province (No. MEDC202305).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, Y., Di, X., Liu, N., Zhang, X., Ren, W. (2025). A Lightweight Method to Survey with Protecting Privacy yet Maintaining Accuracy. In: Cai, Z., Takabi, D., Guo, S., Zou, Y. (eds) Wireless Artificial Intelligent Computing Systems and Applications. WASA 2024. Lecture Notes in Computer Science, vol 14998. Springer, Cham. https://doi.org/10.1007/978-3-031-71467-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-71467-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-71466-5
Online ISBN: 978-3-031-71467-2
eBook Packages: Computer ScienceComputer Science (R0)