From 4cf5e29f5b7d79fdf58c897d6bcc1f4d45b37adf Mon Sep 17 00:00:00 2001 From: Manos Katsomallos Date: Tue, 2 Nov 2021 18:34:33 +0100 Subject: [PATCH] summary: Reviewed --- text/conclusion/summary.tex | 18 +++++++++++++----- 1 file changed, 13 insertions(+), 5 deletions(-) diff --git a/text/conclusion/summary.tex b/text/conclusion/summary.tex index c08a6bc..5e1f48b 100644 --- a/text/conclusion/summary.tex +++ b/text/conclusion/summary.tex @@ -10,8 +10,9 @@ We reviewed the existing literature regarding methods on privacy-preserving cont \item We identified the privacy protection algorithms and techniques that each work is using, focusing on feature like the privacy method, operation, attack, and protection level. \item We organized the reviewed literature in a tabular form to allow for a more efficient indexation of the related works, using a number of relevant features. \end{itemize} - -\kat{mention here again that the work appears in the article... in the journal...} +% \kat{mention here again that the work appears in the article... in the journal...} +This work appeared in the special feature on Geospatial Privacy and Security of the $19$th +journal of Spatial Information Science~\cite{katsomallos2019privacy}. \paragraph{Configurable privacy protection for time series} We presented ($\varepsilon$, $L$)-\emph{{\thething} privacy}, a novel privacy notion that is based on differential privacy allowing for better data utility in the presence of important events. Our contributions are: @@ -20,7 +21,14 @@ We presented ($\varepsilon$, $L$)-\emph{{\thething} privacy}, a novel privacy no % \item We proposed and formally defined a novel privacy notion, ($\varepsilon$, $L$)-\emph{{\thething} privacy}. \item We designed and implemented three {\thething} privacy schemes for {\thethings} spanning a finite time series. \item We investigated {\thething} privacy under temporal correlation, which is inherent in time series, and studied the effect of {\thethings} on the temporal privacy loss propagation. - \item We designed an additional differential privacy mechanism, based on the exponential mechanism, for providing additional protection to the temporal position of the {\thethings}. \kat{what is the name of the mechanism? how do you quantify 'additional' ?} - \item We experimentally evaluated our proposal on real and synthetic data sets, and compared {\thething} privacy schemes with event- and user-level privacy protection, for different {\thething} percentages. \kat{what are the conclusions that show the quality/benefits of the proposed solution?} + \item We designed an additional differential privacy mechanism, based on the exponential mechanism, for providing + % additional + protection to the temporal position of the {\thethings} + % \kat{what is the name of the mechanism? how do you quantify 'additional' ?} + by generating dummy {\thething} set options. + \item We experimentally evaluated our proposal on real and synthetic data sets, and compared {\thething} privacy schemes with event- and user-level privacy protection, for different {\thething} percentages. + % \kat{what are the conclusions that show the quality/benefits of the proposed solution?} + We showed that our methodology can provide adequate differential privacy guarantees while achieving better data utility than the user-level scheme. \end{itemize} -\kat{mention here again that the work appears in the article... submitted at...} \ No newline at end of file +% \kat{mention here again that the work appears in the article... submitted at...} +This work is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.