From e923ac364f7691780d8b45ca4fa6b61a99eda241 Mon Sep 17 00:00:00 2001 From: katerinatzo Date: Thu, 5 Aug 2021 12:03:03 +0300 Subject: [PATCH] introductory text --- text/acknowledgements.tex | 2 ++ text/preliminaries/main.tex | 10 ++++++---- 2 files changed, 8 insertions(+), 4 deletions(-) diff --git a/text/acknowledgements.tex b/text/acknowledgements.tex index bab6e21..b1a9fc4 100644 --- a/text/acknowledgements.tex +++ b/text/acknowledgements.tex @@ -4,6 +4,8 @@ Upon the completion of my thesis, I would like to express my deep gratitude to my research supervisors for their patient guidance, enthusiastic encouragement and useful critiques of this research work. Besides my advisors, I would like to thank the reporters as well as the rest of the jury for their invaluable contribution. +\kat{the jury and the reporters do not contribute; thank them for their feedback, comments and time} + A special thanks to my department’s faculty, staff and fellow researchers for their valuable assistance whenever needed and for creating a pleasant and creative environment during my studies. Last but not least, I wish to thank my family and friends for their unconditional support and encouragement all these years. diff --git a/text/preliminaries/main.tex b/text/preliminaries/main.tex index 192f65a..160b966 100644 --- a/text/preliminaries/main.tex +++ b/text/preliminaries/main.tex @@ -1,10 +1,12 @@ \chapter{Preliminaries} \label{ch:prel} -In this chapter, we introduce some relevant terminology and information around the problem of continuous publishing of privacy-sensitive data sets. -First, in Section~\ref{sec:data}, we categorize the user-generated data sets and review data processing in the context of continuous data publishing. -Second, in Section~\ref{sec:privacy}, we define information disclosure in data privacy, thereafter, we list the categories of attacks identified in the literature, the possible privacy protection levels, the fundamental privacy operations that are applied to achieve data privacy, and finally we provide a brief overview of the seminal works on privacy-preserving data publishing. -Third, in Section~\ref{sec:correlation}, we mention the different types of correlation, we document ways to extract data dependence from continuous data, and we investigate the privacy risks that data correlation entails with special focus on the privacy loss under temporal correlation. +In this chapter, we introduce some relevant terminology and information around the problem of continuous publishing of privacy-sensitive data sets \kat{the title of the thesis is '..in user generated big data' not in 'continuous publishing'. Consider rephrase here, and if needed position the user generated big data w.r.t. the continuous publishing so that you continue later on discussing for the continuous publishing setting. }. +First, in Section~\ref{sec:data}, we categorize user-generated data sets and review data processing in the context of continuous data publishing. +Second, in Section~\ref{sec:privacy}, we define information disclosure in data privacy. Thereafter, we list the categories of privacy attacks, %identified in the literature, +the possible privacy protection levels, the fundamental privacy operations that are applied to achieve data privacy, and finally we provide a brief overview of the \kat{also here reconsider the term seminal, so as it does not read like we are in the related work section} seminal works on privacy-preserving data publishing. +\kat{The correlations are not intuitively connected to privacy, so put here a linking sentence to data privacy.} +Third, in Section~\ref{sec:correlation}, we discuss the different types of correlation, we document ways to extract data dependence from continuous data, and we investigate the privacy risks that data correlation entails with special focus on the privacy loss under temporal correlation. \input{preliminaries/data} \input{preliminaries/privacy}