Update abstract.tex
This commit is contained in:
parent
a486e61f9b
commit
92795631f8
@ -8,8 +8,9 @@ generate massive amounts of user-related, and usually geo-tagged, data on a dail
|
|||||||
The manipulation of such data is useful in numerous application domains including traffic monitoring, intelligent building, and healthcare.
|
The manipulation of such data is useful in numerous application domains including traffic monitoring, intelligent building, and healthcare.
|
||||||
A high percentage of these data carry information of user activities and other personal details, and thus their manipulation and sharing raise concerns about the privacy of the individuals involved.
|
A high percentage of these data carry information of user activities and other personal details, and thus their manipulation and sharing raise concerns about the privacy of the individuals involved.
|
||||||
To enable the secure---from the user privacy perspective---data sharing, researchers have already proposed various seminal techniques for the protection of user privacy while accounting for data utility and quality.
|
To enable the secure---from the user privacy perspective---data sharing, researchers have already proposed various seminal techniques for the protection of user privacy while accounting for data utility and quality.
|
||||||
However, the continuous fashion in which data are generated nowadays, and the high availability of external sources of information, pose more threats and add extra challenges to the problem.
|
However, the continuous fashion in which data are generated nowadays, and the high availability of external sources of information, pose more threats and add extra challenges to the problem, due to inevitable correlations that arise.
|
||||||
% \kat{Mention here the extra challenges posed by the specific problem that you address : the Landmark privacy}
|
% \kat{Mention here the extra challenges posed by the specific problem that you address : the Landmark privacy}
|
||||||
|
\kat{I still do not see the motivation/challenges for landmark privacy. Saying about configurability is not enough.. We should see sth about overperturbing the data when not necessary by the context..}
|
||||||
It is therefore essential to design solutions that not only guarantee a balance between user privacy protection and data utility, but also provide configurability and consider the preferences of the users.
|
It is therefore essential to design solutions that not only guarantee a balance between user privacy protection and data utility, but also provide configurability and consider the preferences of the users.
|
||||||
|
|
||||||
% Survey
|
% Survey
|
||||||
@ -24,14 +25,16 @@ We observe that in continuous data publishing, events are not equally significan
|
|||||||
Differential privacy is a well-established paradigm in privacy-preserving time series publishing.
|
Differential privacy is a well-established paradigm in privacy-preserving time series publishing.
|
||||||
The existing differential privacy protection levels protect either a single timestamp, or all the data per user or per window in the time series; however, considering all timestamps as equally significant.
|
The existing differential privacy protection levels protect either a single timestamp, or all the data per user or per window in the time series; however, considering all timestamps as equally significant.
|
||||||
The novel notion that we propose, {\thething} privacy, is based on differential privacy and allocates the available privacy budget while taking into account significant events (\emph{\thethings}) in the time series.
|
The novel notion that we propose, {\thething} privacy, is based on differential privacy and allocates the available privacy budget while taking into account significant events (\emph{\thethings}) in the time series.
|
||||||
|
\kat{Again, a reader does not understand what this really mean..give some concrete indices}
|
||||||
We design three privacy schemes that guarantee {\thething} privacy and further extend them by providing more robust privacy protection to the {\thething} set with the design of a dummy {\thething} selection module.
|
We design three privacy schemes that guarantee {\thething} privacy and further extend them by providing more robust privacy protection to the {\thething} set with the design of a dummy {\thething} selection module.
|
||||||
|
\kat{give some idea also what the dummy module does}
|
||||||
|
|
||||||
% Evaluation
|
% Evaluation
|
||||||
Finally, we evaluate the {\thething} privacy schemes and dummy {\thething} selection module, that we proposed, on real and synthetic data sets.
|
Finally, we evaluate the proposed {\thething} privacy schemes and dummy {\thething} selection module on real and synthetic data sets.
|
||||||
We assess the impact on data utility for several possible {\thething} distributions, with emphasis on situations under the presence of temporal correlation.
|
We assess the impact on data utility for several possible {\thething} distributions, with emphasis on situations under the presence of temporal correlation.
|
||||||
% \kat{add selection, and a small comment on the conclusions driven by the experiments.}
|
% \kat{add selection, and a small comment on the conclusions driven by the experiments.}
|
||||||
Overall, the results of the experimental evaluation and comparative analysis of {\thething} privacy validate its applicability to several use case scenarios and showcase the improvement, in terms of data utility, over the existing privacy protection levels.
|
Overall, the results of the experimental evaluation and comparative analysis of {\thething} privacy validate its applicability to several use case scenarios and showcase the improvement, in terms of data utility, over the existing privacy protection levels.
|
||||||
Particularly, the dummy {\thething} selection module introduces a reasonable data utility decline to all of the {\thething} privacy schemes.
|
Particularly, the dummy {\thething} selection module achieves better {\thething} protection, provoking only a reasonable data utility decline. \kat{what is reasonable?}
|
||||||
In terms of temporal correlation, we observe that under moderate and strong correlation, greater average regular–{\thething} event distance causes greater overall privacy loss.
|
In terms of temporal correlation, we observe that under moderate and strong correlation, greater average regular–{\thething} event distance causes greater overall privacy loss.
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user