summary: Reviewed
This commit is contained in:
parent
627845e995
commit
4cf5e29f5b
@ -10,8 +10,9 @@ We reviewed the existing literature regarding methods on privacy-preserving cont
|
|||||||
\item We identified the privacy protection algorithms and techniques that each work is using, focusing on feature like the privacy method, operation, attack, and protection level.
|
\item We identified the privacy protection algorithms and techniques that each work is using, focusing on feature like the privacy method, operation, attack, and protection level.
|
||||||
\item We organized the reviewed literature in a tabular form to allow for a more efficient indexation of the related works, using a number of relevant features.
|
\item We organized the reviewed literature in a tabular form to allow for a more efficient indexation of the related works, using a number of relevant features.
|
||||||
\end{itemize}
|
\end{itemize}
|
||||||
|
% \kat{mention here again that the work appears in the article... in the journal...}
|
||||||
\kat{mention here again that the work appears in the article... in the journal...}
|
This work appeared in the special feature on Geospatial Privacy and Security of the $19$th
|
||||||
|
journal of Spatial Information Science~\cite{katsomallos2019privacy}.
|
||||||
|
|
||||||
\paragraph{Configurable privacy protection for time series}
|
\paragraph{Configurable privacy protection for time series}
|
||||||
We presented ($\varepsilon$, $L$)-\emph{{\thething} privacy}, a novel privacy notion that is based on differential privacy allowing for better data utility in the presence of important events. Our contributions are:
|
We presented ($\varepsilon$, $L$)-\emph{{\thething} privacy}, a novel privacy notion that is based on differential privacy allowing for better data utility in the presence of important events. Our contributions are:
|
||||||
@ -20,7 +21,14 @@ We presented ($\varepsilon$, $L$)-\emph{{\thething} privacy}, a novel privacy no
|
|||||||
% \item We proposed and formally defined a novel privacy notion, ($\varepsilon$, $L$)-\emph{{\thething} privacy}.
|
% \item We proposed and formally defined a novel privacy notion, ($\varepsilon$, $L$)-\emph{{\thething} privacy}.
|
||||||
\item We designed and implemented three {\thething} privacy schemes for {\thethings} spanning a finite time series.
|
\item We designed and implemented three {\thething} privacy schemes for {\thethings} spanning a finite time series.
|
||||||
\item We investigated {\thething} privacy under temporal correlation, which is inherent in time series, and studied the effect of {\thethings} on the temporal privacy loss propagation.
|
\item We investigated {\thething} privacy under temporal correlation, which is inherent in time series, and studied the effect of {\thethings} on the temporal privacy loss propagation.
|
||||||
\item We designed an additional differential privacy mechanism, based on the exponential mechanism, for providing additional protection to the temporal position of the {\thethings}. \kat{what is the name of the mechanism? how do you quantify 'additional' ?}
|
\item We designed an additional differential privacy mechanism, based on the exponential mechanism, for providing
|
||||||
\item We experimentally evaluated our proposal on real and synthetic data sets, and compared {\thething} privacy schemes with event- and user-level privacy protection, for different {\thething} percentages. \kat{what are the conclusions that show the quality/benefits of the proposed solution?}
|
% additional
|
||||||
|
protection to the temporal position of the {\thethings}
|
||||||
|
% \kat{what is the name of the mechanism? how do you quantify 'additional' ?}
|
||||||
|
by generating dummy {\thething} set options.
|
||||||
|
\item We experimentally evaluated our proposal on real and synthetic data sets, and compared {\thething} privacy schemes with event- and user-level privacy protection, for different {\thething} percentages.
|
||||||
|
% \kat{what are the conclusions that show the quality/benefits of the proposed solution?}
|
||||||
|
We showed that our methodology can provide adequate differential privacy guarantees while achieving better data utility than the user-level scheme.
|
||||||
\end{itemize}
|
\end{itemize}
|
||||||
\kat{mention here again that the work appears in the article... submitted at...}
|
% \kat{mention here again that the work appears in the article... submitted at...}
|
||||||
|
This work is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.
|
||||||
|
Loading…
Reference in New Issue
Block a user