30 lines
2.4 KiB
TeX
30 lines
2.4 KiB
TeX
|
\chapter{Related work}
|
||
|
\label{ch:related}
|
||
|
|
||
|
Depending on the intended use, owners may share their data either as a whole (Microdata -- Section~\ref{sec:microdata}), or as computed statistics thereof (Statistical Data -- Section~\ref{sec:statistical}).
|
||
|
This is the basic division line that we set in this section.
|
||
|
Table~\ref{tab:related} summarizes all the works reviewed in this thesis, and provides a guide for the interested reader on some of the listed variables.
|
||
|
We proceed by identifying some common variables in the works of both categories, which are listed in Table~\ref{tab:related}.
|
||
|
There are three main columns, concerning the:
|
||
|
|
||
|
\begin{itemize}
|
||
|
\item \textbf{Data} --- The first part of Table~\ref{tab:related} considers the nature of the input/output data of the algorithms in its first column.
|
||
|
We identify here the considered kind of data from the set of categories defined in Section~\ref{subsec:data-categories}, i.e.,~stream, sequential, or time series.
|
||
|
Particularly, we outline the cases where spatial data are explicitly considered; nevertheless, all other algorithms could be equally applied on location data as well.
|
||
|
The second column of the Data part is about the model (batch or stream) of the privacy preserving process and the aggregation process, where applicable.
|
||
|
The third column displays the publishing scheme, as one of the defined schemes in Section~\ref{subsec:data-publishing} one shot, continuous, sequential, or incremental.
|
||
|
\item \textbf{Protection} --- The second part of Table~\ref{tab:related} contains four columns, namely the attack scenario, the base protection method, the acquired protection level, and the distortion applied.
|
||
|
The different attack scenarios are described in Section~\ref{subsec:privacy-attacks}, whereas the base protection methods along with the applied distortion method are in Section~\ref{subsec:privacy-seminal}.
|
||
|
The possible protection levels are: event, user, and w-event (see Section~\ref{subsec:privacy-levels}).
|
||
|
\item \textbf{Correlations} --- The final part of Table~\ref{tab:related} is dedicated to correlations, which is an attack model not taken into consideration by all the works.
|
||
|
Still, the continuous publication of data inevitably creates correlations even when they are not evident in a standalone data set.
|
||
|
The different kinds of correlations can be found in Section~\ref{subsec:privacy-attacks}.
|
||
|
\end{itemize}
|
||
|
|
||
|
\input{graphics/table-related}
|
||
|
|
||
|
\input{microdata}
|
||
|
|
||
|
\input{statistical}
|
||
|
|
||
|
\input{discussion}
|