Advertisement

Reconstructing Positive Surveys from Negative Surveys with Background Knowledge

  • Dongdong Zhao
  • Wenjian LuoEmail author
  • Lihua Yue
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9714)

Abstract

Negative Survey is a promising technique for collecting sensitive data. Using the negative survey, useful aggregate information could be estimated, while protecting personal privacy. Previous work mainly focuses on improving the general model of the negative survey without considering background knowledge. However, in real-world applications, data analysts usually have some background knowledge on the surveys. Therefore, in this paper, for the first time, we study the usage of background knowledge in negative surveys, and propose a method for accurately reconstructing positive surveys with background knowledge. Moreover, we propose a method for evaluating the dependable level of the positive survey reconstructed with background knowledge. Experimental results show that more reasonable and accurate positive surveys could be obtained using our methods.

Keywords

Privacy protection Sensitive data collection Negative survey Background knowledge 

Notes

Acknowledgements

This work is partly supported by National Natural Science Foundation of China (No. 61175045).

References

  1. 1.
    Esponda, F., Ackley, E.S., Helman, P., Jia, H., Forrest, S.: Protecting data privacy through hard-to-reverse negative databases. Int. J. Inf. Secur. 6, 403–415 (2007)CrossRefzbMATHGoogle Scholar
  2. 2.
    Esponda, F.: Everything that is not important: negative databases. IEEE Comput. Intell. Mag. 3, 60–63 (2008)CrossRefGoogle Scholar
  3. 3.
    Esponda, F.: Negative surveys (2006). arXiv:math/0608176
  4. 4.
    Esponda, F., Guerrero, V.M.: Surveys with negative questions for sensitive items. Stat. Probab. Lett. 79, 2456–2461 (2009)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Xie, H., Kulik, L., Tanin, E.: Privacy-aware collection of aggregate spatial data. Data Knowl. Eng. 70, 576–595 (2011)CrossRefGoogle Scholar
  6. 6.
    Horey, J., Groat, M., Forrest, S., Esponda, F.: Anonymous data collection in sensor networks. In: The Fourth Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, USA, pp. 1–8 (2007)Google Scholar
  7. 7.
    Groat, M.M., Edwards, B., Horey, J., Wenbo, H., Forrest, S.: Enhancing privacy in participatory sensing applications with multidimensional data. In: The 2012 IEEE International Conference on Pervasive Computing and Communications (PerCom 2012), Lugano, pp. 144–152 (2012)Google Scholar
  8. 8.
    Groat, M.M., Edwards, B., Horey, J., He, W., Forrest, S.: Application and analysis of multidimensional negative surveys in participatory sensing applications. Pervasive Mob. Comput. 9, 372–391 (2013)CrossRefGoogle Scholar
  9. 9.
    Horey, J., Forrest, S., Groat, M.M.: Reconstructing spatial distributions from anonymized locations. In: The 2012 IEEE 28th International Conference on Data Engineering Workshops (ICDEW), Arlington, VA, pp. 243–250 (2012)Google Scholar
  10. 10.
    Bao, Y., Luo, W., Zhang, X.: Estimating positive surveys from negative surveys. Stat. Probab. Lett. 83, 551–558 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Bao, Y., Luo, W., Lu, Y.: On the dependable level of the negative survey. Stat. Probab. Lett. 89, 31–40 (2014)MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Du, X., Luo, W., Zhao, D.: Negative publication of data. Int. J. Immune Comput. 2, 1–14 (2014)CrossRefGoogle Scholar
  13. 13.
    Lu, Y., Luo, W., Zhao, D.: Fast searching optimal negative surveys. In: Proceedings of the 2014 International Conference of Information and Network Security (ICINS 2014), Beijing, China, pp. 172–180 (2014)Google Scholar
  14. 14.
    Bao, Y.: Research on some problems of negative survey. Master’s thesis, Department of Computer Science and Technology, University of Science and Technology of China (2013) (in Chinese)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyUniversity of Science and Technology of ChinaHefeiChina
  2. 2.Anhui Province Key Laboratory of Software Engineering in Computing and CommunicationUniversity of Science and Technology of ChinaHefeiChina

Personalised recommendations