introduction: Minor corrections in contribution
This commit is contained in:
parent
9db493026b
commit
368e09a6ae
@ -12,8 +12,8 @@ The first contribution of this thesis is the survey~\cite{katsomallos2019privacy
|
|||||||
% \kat{cite it here}
|
% \kat{cite it here}
|
||||||
of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in
|
of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in
|
||||||
% \kat{name the journal and the special issue}
|
% \kat{name the journal and the special issue}
|
||||||
the special feature on Geospatial Privacy and Security in the $19$th journal of Spatial Information Science.
|
the special feature on Geospatial Privacy and Security in the $19$th Journal of Spatial Information Science.
|
||||||
We study works that were published over the past two decades and provide a guide that will navigate its users through the available methodology and help them select the algorithm(s) that fit(s) best their needs.
|
We study works that were published over the past two decades and provide a guide that will navigate its users through the available methodology and help them select the algorithms that are fitting best their needs.
|
||||||
|
|
||||||
We categorize the works that we review depending on if they deal with \emph{microdata} or \emph{statistical data}.
|
We categorize the works that we review depending on if they deal with \emph{microdata} or \emph{statistical data}.
|
||||||
Then, we group them based on the duration of the processing/publishing that they aim for.
|
Then, we group them based on the duration of the processing/publishing that they aim for.
|
||||||
@ -26,24 +26,24 @@ Contrary to the existing privacy protection levels, our notion differentiates ev
|
|||||||
The introduction of {\thethings}, allows for a configurable privacy protection.
|
The introduction of {\thethings}, allows for a configurable privacy protection.
|
||||||
|
|
||||||
First, we design and implement three {\thething} privacy schemes, accounting for {\thethings} spanning a finite time series.
|
First, we design and implement three {\thething} privacy schemes, accounting for {\thethings} spanning a finite time series.
|
||||||
Thereafter, we investigate {\thething} privacy under temporal correlation, which is inherent in time series publishing, and discuss how {\thethings} can affect the propagation of temporal privacy loss.
|
Thereafter, we investigate {\thething} privacy under temporal correlation, which is inherent in time series publishing, and study how {\thethings} can affect the propagation of temporal privacy loss.
|
||||||
|
|
||||||
|
|
||||||
\paragraph{Dummy {\thething} selection}
|
\paragraph{Dummy {\thething} selection}
|
||||||
The third contribution of this thesis is the design of a module that extends our {\thething} privacy schemes and provides additional protection to {\thethings}.
|
The third contribution of this thesis is the design of a module that extends our {\thething} privacy schemes and provides additional protection to {\thethings}.
|
||||||
In other words, we answer the question \emph{`How can we protect the fact that we care more about certain events?'}.
|
In other words, we answer the question \emph{`How can we protect the fact that we care more about certain events?'}.
|
||||||
|
|
||||||
We design an additional differential privacy mechanism, based on the exponential mechanism, that we can easily plug-in the proposed existing {\thething} privacy schemes.
|
We design an additional differential privacy mechanism, based on the exponential mechanism, that we can easily plug in to the proposed {\thething} privacy schemes.
|
||||||
We provide an optimal solution to this problem, which we improve by adopting a heuristic approach, and then implement a more efficient module that relies in partitioning.
|
We provide an optimal solution to this problem, which we improve by adopting a heuristic approach, and then implement a more efficient module that relies on partitioning.
|
||||||
|
|
||||||
|
|
||||||
\bigskip
|
\bigskip
|
||||||
We extensively evaluate the methods that we propose by conducting experiments on real and synthetic data sets.
|
We extensively evaluate the methods that we propose by conducting experiments on real and synthetic data sets.
|
||||||
We compare {\thething} privacy with event- and user-level privacy protection, and investigates the behavior of the overall privacy loss under temporal correlation for different distributions of {\thethings}.
|
We compare {\thething} privacy with event- and user-level privacy protection, and investigate the behavior of the overall privacy loss under temporal correlation for different distributions of {\thethings}.
|
||||||
Furthermore, we estimate the impact of the privacy-preserving dummy {\thething} selection module on the utility of our privacy scheme.
|
Furthermore, we estimate the impact of the privacy-preserving dummy {\thething} selection module on the utility of our privacy scheme.
|
||||||
|
|
||||||
The second and the third contributions are described in the article~\cite{katsomallos2022landmark},
|
The second and the third contributions are described in the article~\cite{katsomallos2022landmark},
|
||||||
% \kat{cite the technical report}
|
% \kat{cite the technical report}
|
||||||
which is submitted at the research papers track
|
which is submitted at the research papers track
|
||||||
% \kat{name the conference}
|
% \kat{name the conference}
|
||||||
of the $12$th ACM conference on Data and Application Security and Privacy.
|
of the $12$th ACM Conference on Data and Application Security and Privacy.
|
||||||
|
Loading…
Reference in New Issue
Block a user