summary: Reviewed
This commit is contained in:
		@ -10,8 +10,9 @@ We reviewed the existing literature regarding methods on privacy-preserving cont
 | 
			
		||||
  \item We identified the privacy protection algorithms and techniques that each work is using, focusing on feature like the privacy method, operation, attack, and protection level.
 | 
			
		||||
  \item We organized the reviewed literature in a tabular form to allow for a more efficient indexation of the related works, using a number of relevant features. 
 | 
			
		||||
\end{itemize}
 | 
			
		||||
 | 
			
		||||
\kat{mention here again that the work appears in the article... in the journal...}
 | 
			
		||||
% \kat{mention here again that the work appears in the article... in the journal...}
 | 
			
		||||
This work appeared in the special feature on Geospatial Privacy and Security of the $19$th
 | 
			
		||||
journal of Spatial Information Science~\cite{katsomallos2019privacy}.
 | 
			
		||||
 | 
			
		||||
\paragraph{Configurable privacy protection for time series}
 | 
			
		||||
We presented ($\varepsilon$, $L$)-\emph{{\thething} privacy}, a novel privacy notion that is based on differential privacy allowing for better data utility in the presence of important events. Our contributions are:
 | 
			
		||||
@ -20,7 +21,14 @@ We presented ($\varepsilon$, $L$)-\emph{{\thething} privacy}, a novel privacy no
 | 
			
		||||
  % \item We proposed and formally defined a novel privacy notion, ($\varepsilon$, $L$)-\emph{{\thething} privacy}.
 | 
			
		||||
  \item We designed and implemented three {\thething} privacy schemes for {\thethings} spanning a finite time series.
 | 
			
		||||
  \item We investigated {\thething} privacy under temporal correlation, which is inherent in time series, and studied the effect of {\thethings} on the temporal privacy loss propagation.
 | 
			
		||||
  \item We designed an additional differential privacy mechanism, based on the exponential mechanism, for providing additional protection to the temporal position of the {\thethings}. \kat{what is the name of the mechanism? how do you quantify 'additional' ?}
 | 
			
		||||
  \item We experimentally evaluated our proposal on real and synthetic data sets, and compared {\thething} privacy schemes with event- and user-level privacy protection, for different {\thething} percentages. \kat{what are the conclusions that show the quality/benefits of the proposed solution?}
 | 
			
		||||
  \item We designed an additional differential privacy mechanism, based on the exponential mechanism, for providing
 | 
			
		||||
  % additional
 | 
			
		||||
  protection to the temporal position of the {\thethings}
 | 
			
		||||
  % \kat{what is the name of the mechanism? how do you quantify 'additional' ?}
 | 
			
		||||
  by generating dummy {\thething} set options.
 | 
			
		||||
  \item We experimentally evaluated our proposal on real and synthetic data sets, and compared {\thething} privacy schemes with event- and user-level privacy protection, for different {\thething} percentages.
 | 
			
		||||
  % \kat{what are the conclusions that show the quality/benefits of the proposed solution?}
 | 
			
		||||
  We showed that our methodology can provide adequate differential privacy guarantees while achieving better data utility than the user-level scheme.
 | 
			
		||||
\end{itemize}
 | 
			
		||||
\kat{mention here again that the work appears in the article... submitted at...}
 | 
			
		||||
% \kat{mention here again that the work appears in the article... submitted at...}
 | 
			
		||||
This work is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.
 | 
			
		||||
 | 
			
		||||
		Reference in New Issue
	
	Block a user