diff --git a/related.tex b/related.tex index 8b8fe21..4aa2aef 100644 --- a/related.tex +++ b/related.tex @@ -1,30 +1,10 @@ \chapter{Related work} -\label{ch:related} +\label{ch:rel} -Depending on the intended use, owners may share their data either as a whole (Microdata -- Section~\ref{sec:microdata}), or as computed statistics thereof (Statistical Data -- Section~\ref{sec:statistical}). -This is the basic division line that we set in this section. -Table~\ref{tab:related} summarizes all the works reviewed in this thesis, and provides a guide for the interested reader on some of the listed variables. -We proceed by identifying some common variables in the works of both categories, which are listed in Table~\ref{tab:related}. -There are three main columns, concerning the: +This is the related work. -\begin{itemize} - \item \textbf{Data} --- The first part of Table~\ref{tab:related} considers the nature of the input/output data of the algorithms in its first column. - We identify here the considered kind of data from the set of categories defined in Section~\ref{subsec:data-categories}, i.e.,~stream, sequential, or time series. - Particularly, we outline the cases where spatial data are explicitly considered; nevertheless, all other algorithms could be equally applied on location data as well. - The second column of the Data part is about the model (batch or stream) of the privacy preserving process and the aggregation process, where applicable. - The third column displays the publishing scheme, as one of the defined schemes in Section~\ref{subsec:data-publishing} one shot, continuous, sequential, or incremental. - \item \textbf{Protection} --- The second part of Table~\ref{tab:related} contains four columns, namely the attack scenario, the base protection method, the acquired protection level, and the distortion applied. - The different attack scenarios are described in Section~\ref{subsec:privacy-attacks}, whereas the base protection methods along with the applied distortion method are in Section~\ref{subsec:privacy-seminal}. - The possible protection levels are: event, user, and w-event (see Section~\ref{subsec:privacy-levels}). - \item \textbf{Correlations} --- The final part of Table~\ref{tab:related} is dedicated to correlations, which is an attack model not taken into consideration by all the works. - Still, the continuous publication of data inevitably creates correlations even when they are not evident in a standalone data set. - The different kinds of correlations can be found in Section~\ref{subsec:privacy-attacks}. -\end{itemize} -\input{graphics/table-related} +\section{Summary} +\label{sec:sum-rel} -\input{microdata} - -\input{statistical} - -\input{discussion} \ No newline at end of file +This is the summary of this chapter.