introduction: Minor corrections in contribution

This commit is contained in:
Manos Katsomallos 2021-11-26 01:41:52 +01:00
parent 9db493026b
commit 368e09a6ae

View File

@ -12,8 +12,8 @@ The first contribution of this thesis is the survey~\cite{katsomallos2019privacy
% \kat{cite it here} % \kat{cite it here}
of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in
% \kat{name the journal and the special issue} % \kat{name the journal and the special issue}
the special feature on Geospatial Privacy and Security in the $19$th journal of Spatial Information Science. the special feature on Geospatial Privacy and Security in the $19$th Journal of Spatial Information Science.
We study works that were published over the past two decades and provide a guide that will navigate its users through the available methodology and help them select the algorithm(s) that fit(s) best their needs. We study works that were published over the past two decades and provide a guide that will navigate its users through the available methodology and help them select the algorithms that are fitting best their needs.
We categorize the works that we review depending on if they deal with \emph{microdata} or \emph{statistical data}. We categorize the works that we review depending on if they deal with \emph{microdata} or \emph{statistical data}.
Then, we group them based on the duration of the processing/publishing that they aim for. Then, we group them based on the duration of the processing/publishing that they aim for.
@ -26,24 +26,24 @@ Contrary to the existing privacy protection levels, our notion differentiates ev
The introduction of {\thethings}, allows for a configurable privacy protection. The introduction of {\thethings}, allows for a configurable privacy protection.
First, we design and implement three {\thething} privacy schemes, accounting for {\thethings} spanning a finite time series. First, we design and implement three {\thething} privacy schemes, accounting for {\thethings} spanning a finite time series.
Thereafter, we investigate {\thething} privacy under temporal correlation, which is inherent in time series publishing, and discuss how {\thethings} can affect the propagation of temporal privacy loss. Thereafter, we investigate {\thething} privacy under temporal correlation, which is inherent in time series publishing, and study how {\thethings} can affect the propagation of temporal privacy loss.
\paragraph{Dummy {\thething} selection} \paragraph{Dummy {\thething} selection}
The third contribution of this thesis is the design of a module that extends our {\thething} privacy schemes and provides additional protection to {\thethings}. The third contribution of this thesis is the design of a module that extends our {\thething} privacy schemes and provides additional protection to {\thethings}.
In other words, we answer the question \emph{`How can we protect the fact that we care more about certain events?'}. In other words, we answer the question \emph{`How can we protect the fact that we care more about certain events?'}.
We design an additional differential privacy mechanism, based on the exponential mechanism, that we can easily plug-in the proposed existing {\thething} privacy schemes. We design an additional differential privacy mechanism, based on the exponential mechanism, that we can easily plug in to the proposed {\thething} privacy schemes.
We provide an optimal solution to this problem, which we improve by adopting a heuristic approach, and then implement a more efficient module that relies in partitioning. We provide an optimal solution to this problem, which we improve by adopting a heuristic approach, and then implement a more efficient module that relies on partitioning.
\bigskip \bigskip
We extensively evaluate the methods that we propose by conducting experiments on real and synthetic data sets. We extensively evaluate the methods that we propose by conducting experiments on real and synthetic data sets.
We compare {\thething} privacy with event- and user-level privacy protection, and investigates the behavior of the overall privacy loss under temporal correlation for different distributions of {\thethings}. We compare {\thething} privacy with event- and user-level privacy protection, and investigate the behavior of the overall privacy loss under temporal correlation for different distributions of {\thethings}.
Furthermore, we estimate the impact of the privacy-preserving dummy {\thething} selection module on the utility of our privacy scheme. Furthermore, we estimate the impact of the privacy-preserving dummy {\thething} selection module on the utility of our privacy scheme.
The second and the third contributions are described in the article~\cite{katsomallos2022landmark}, The second and the third contributions are described in the article~\cite{katsomallos2022landmark},
% \kat{cite the technical report} % \kat{cite the technical report}
which is submitted at the research papers track which is submitted at the research papers track
% \kat{name the conference} % \kat{name the conference}
of the $12$th ACM conference on Data and Application Security and Privacy. of the $12$th ACM Conference on Data and Application Security and Privacy.