From 0a7269df65b8c9b78891c65b379acb3b32b27c1d Mon Sep 17 00:00:00 2001 From: Manos Katsomallos Date: Tue, 3 Aug 2021 01:52:46 +0300 Subject: [PATCH] preliminaries: Intro --- text/preliminaries/main.tex | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/text/preliminaries/main.tex b/text/preliminaries/main.tex index e835b0a..a54aa06 100644 --- a/text/preliminaries/main.tex +++ b/text/preliminaries/main.tex @@ -1,10 +1,10 @@ \chapter{Preliminaries} \label{ch:prel} -In this chapter, we introduce some relevant terminology and background knowledge around the problem of continuous publishing of sensitive data sets. -First, in Section~\ref{sec:data}, we categorize data and the process of their publishing in the context of continuous data publishing. -Second, in Section~\ref{sec:privacy}, we define information disclosure in data privacy, we list the kinds of attacks identified in the literature, the desired privacy levels that can be achieved, the fundamental privacy operations that are applied to achieve data privacy, and finally we provide a brief overview of the seminal works on privacy-preserving data publishing. -Third, in Section~\ref{sec:correlation}, we list the different types of correlation, we document ways to extract data dependence from continuous data, and we investigate the privacy risks that data correlation entails with special focus on the privacy loss under temporal correlation. +In this chapter, we introduce some relevant terminology and information around the problem of continuous publishing of privacy-sensitive data sets. +First, in Section~\ref{sec:data}, we categorize the user-generated data sets and discuss the process of data processing in the context of continuous data publishing. +Second, in Section~\ref{sec:privacy}, we define information disclosure in data privacy, thereafter, we list the categories of attacks identified in the literature, the possible privacy protection levels, the fundamental privacy operations that are applied to achieve data privacy, and finally we provide a brief overview of the seminal works on privacy-preserving data publishing. +Third, in Section~\ref{sec:correlation}, we mention the different types of correlation, we document ways to extract data dependence from continuous data, and we investigate the privacy risks that data correlation entails with special focus on the privacy loss under temporal correlation. \input{preliminaries/data} \input{preliminaries/privacy}