Processing Text for Privacy: An Information Flow Perspective

被引:6
作者
Fernandes, Natasha [1 ]
Dras, Mark [1 ]
McIver, Annabelle [1 ]
机构
[1] Macquarie Univ, Dept Comp, N Ryde, NSW, Australia
来源
FORMAL METHODS | 2018年 / 10951卷
基金
澳大利亚研究理事会;
关键词
Refinement; Information flow; Privacy; Probabilistic semantics; Text processing; Author anonymity; Author obfuscation; AUTHORSHIP; MODEL; RISK;
D O I
10.1007/978-3-319-95582-7_1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The problem of text document obfuscation is to provide an automated mechanism which is able to make accessible the content of a text document without revealing the identity of its writer. This is more challenging than it seems, because an adversary equipped with powerful machine learning mechanisms is able to identify authorship (with good accuracy) where, for example, the name of the author has been redacted. Current obfuscation methods are ad hoc and have been shown to provide weak protection against such adversaries. Differential privacy, which is able to provide strong guarantees of privacy in some domains, has been thought not to be applicable to text processing. In this paper we will review obfuscation as a quantitative information flow problem and explain how generalised differential privacy can be applied to this problem to provide strong anonymisation guarantees in a standard model for text processing.
引用
收藏
页码:3 / 21
页数:19
相关论文
共 50 条
  • [31] TEXT PROCESSING IN INFORMATION RETRIEVAL SYSTEM USING VECTOR SPACE MODEL
    Premalatha, R.
    Srinivasan, S.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [32] Information privacy?
    Camenisch, Jan
    COMPUTER NETWORKS, 2012, 56 (18) : 3834 - 3848
  • [33] Intention to disclose personal information via mobile applications: A privacy calculus perspective
    Wang, Tien
    Trong Danh Duong
    Chen, Charlie C.
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (04) : 531 - 542
  • [34] IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems
    Rannenberg, Kai
    von Solms, S. H.
    Strous, Leon
    FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 317 - +
  • [35] Does Information Sensitivity Make A Difference? Mobile Applications' Privacy Statements: A Text Mining Approach
    Koohikamali, Mehrdad
    Kim, Dan J.
    AMCIS 2015 PROCEEDINGS, 2015,
  • [36] Unpacking the privacy paradox of consumers: A psychological perspective
    Massara, Francesco
    Raggiotto, Francesco
    Voss, W. Gregory
    PSYCHOLOGY & MARKETING, 2021, 38 (10) : 1814 - 1827
  • [37] Program algebra for quantitative information flow
    McIver, A. K.
    Morgan, C. C.
    Rabehaja, T.
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2019, 106 : 55 - 77
  • [38] A Mechanism for Dependability Processing of Information Flow in Cloud Computing
    Liu, Hao
    Huang, Linpeng
    Li, Chen
    Chen, Luxi
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 23 - 27
  • [39] 'DON'T FOOL ME, AS IT IS YOUR LOSS' - IMPACT OF DECEPTION ON INFORMATION PRIVACY
    Jha, Abhishek Kumar
    Kumar, Saurabh
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2023, 33 (3-4) : 117 - 132
  • [40] Investigating gaze behavior during processing of inconsistent text picture information: Evidence for text-picture integration
    Schueler, Anne
    LEARNING AND INSTRUCTION, 2017, 49 : 218 - 231