diff --git a/graphics/preliminaries/model-global.pdf b/graphics/preliminaries/scheme-global.pdf similarity index 100% rename from graphics/preliminaries/model-global.pdf rename to graphics/preliminaries/scheme-global.pdf diff --git a/graphics/preliminaries/model-local.pdf b/graphics/preliminaries/scheme-local.pdf similarity index 100% rename from graphics/preliminaries/model-local.pdf rename to graphics/preliminaries/scheme-local.pdf diff --git a/graphics/related/rel-atk.pdf b/graphics/related/rel-atk.pdf index 24731b8..d51f7f3 100644 Binary files a/graphics/related/rel-atk.pdf and b/graphics/related/rel-atk.pdf differ diff --git a/graphics/related/rel-dep.pdf b/graphics/related/rel-dep.pdf index 61d06b6..988734f 100644 Binary files a/graphics/related/rel-dep.pdf and b/graphics/related/rel-dep.pdf differ diff --git a/graphics/related/rel-meth.pdf b/graphics/related/rel-meth.pdf index b3d8b1b..0a12a37 100644 Binary files a/graphics/related/rel-meth.pdf and b/graphics/related/rel-meth.pdf differ diff --git a/graphics/related/rel-prot.pdf b/graphics/related/rel-prot.pdf index ff982c5..792dab6 100644 Binary files a/graphics/related/rel-prot.pdf and b/graphics/related/rel-prot.pdf differ diff --git a/graphics/related/rel-yrs.pdf b/graphics/related/rel-yrs.pdf index 90874ce..ca1f7af 100644 Binary files a/graphics/related/rel-yrs.pdf and b/graphics/related/rel-yrs.pdf differ diff --git a/text/related/main.tex b/text/related/main.tex index a8f2fb7..e8bd062 100644 --- a/text/related/main.tex +++ b/text/related/main.tex @@ -1,47 +1,24 @@ \chapter{Related work} \label{ch:rel} - -\kat{Change the way you introduce the related work chapter; do not list a series of surveys. You should speak about the several directions for privacy-preserving methods (and then citing the surveys if you want). Then, you should focus on the particular configuration that you are interested in (continual observation). Summarize what we will see in the next sections by giving also the general structure of the chapter.} - -Since the domain of data privacy is vast, several surveys have already been published with different scopes. -A group of surveys focuses on specific different families of privacy-preserving algorithms and techniques. -For instance, Simi et al.~\cite{simi2017extensive} provide an extensive study of works on $k$-anonymity and Dwork~\cite{dwork2008differential} focuses on differential privacy. -Another group of surveys focuses on techniques that allow the execution of data mining or machine learning tasks with some privacy guarantees, e.g.,~Wang et al.~\cite{wang2009survey}, and Ji et al.~\cite{ji2014differential}. -In a more general scope, Wang et al.~\cite{wang2010privacy} analyze the challenges of privacy-preserving data publishing, and offer a summary and evaluation of relevant techniques. -Additional surveys look into issues around Big Data and user privacy. -Indicatively, Jain et al.~\cite{jain2016big}, and Soria-Comas and Domingo-Ferrer~\cite{soria2016big} examine how Big Data conflict with pre-existing concepts of privacy-preserving data management, and how efficiently $k$-anonymity and $\varepsilon$-differential privacy deal with the characteristics of Big Data. -Others narrow down their research to location privacy issues. -To name a few, Chow and Mokbel~\cite{chow2011trajectory} investigate privacy protection in continuous LBSs and trajectory data publishing, Chatzikokolakis et al.~\cite{chatzikokolakis2017methods} review privacy issues around the usage of LBSs and relevant protection mechanisms and metrics, Primault et al.~\cite{primault2018long} summarize location privacy threats and privacy-preserving mechanisms, and Fiore et al.~\cite{fiore2019privacy} focus only on privacy-preserving publishing of trajectory microdata. -Finally, there are some surveys on application-specific privacy challenges. -For example, Zhou et al.~\cite{zhou2008brief} have a focus on social networks, and Christin et al.~\cite{christin2011survey} give an outline of how privacy aspects are addressed in crowdsensing applications. - -In this chapter, we document works that deal with privacy under continuous data publishing covering diverse use cases. -We present the works in the literature based on two levels of categorization. -First, we group works with respect to whether they deal with microdata or statistical data (see Section~\ref{subsec:data-categories} for the definitions) as input. -Then, we further group them into two subcategories, whether they are designed for the finite or infinite (see Section.~\ref{subsec:data-publishing}) observation setting. \kat{continue.. say also in which category you place your work} - -%Such a documentation becomes very useful nowadays, due to the abundance of continuously user-generated data sets that could be analyzed and/or published in a privacy-preserving way, and the quick progress made in this research field. - -\kat{The related work section of your thesis, should make a connection/comparison to your work. This means that you should position the works presented wrt your problem and your solution if the problems are the same. Put a small (or big) paragraph in the end of each of the two sections (microdata and statistical data) and name the similarities/differences } +% \kat{Change the way you introduce the related work chapter; do not list a series of surveys. You should speak about the several directions for privacy-preserving methods (and then citing the surveys if you want). Then, you should focus on the particular configuration that you are interested in (continual observation). Summarize what we will see in the next sections by giving also the general structure of the chapter.} +% \mk{Moved to summary} +In this chapter, we survey works that deal with privacy under continuous data publishing covering diverse use cases. +We present $48$ published articles spanning $16$ years of research from $2006$ to $2021$, with $2015$ being the median, based on two levels of categorization (Figure~\ref{fig:rel-yrs}). +% \kat{The related work section of your thesis, should make a connection/comparison to your work. This means that you should position the works presented wrt your problem and your solution if the problems are the same. Put a small (or big) paragraph in the end of each of the two sections (microdata and statistical data) and name the similarities/differences } +% \mk{OK} \begin{figure}[htp] \centering - \includegraphics[width=1.\linewidth]{related/rel-yrs}% - \caption{.} + \includegraphics[width=.75\linewidth]{related/rel-yrs}% + \caption{Number of reviewed published articles on continuous data publishing of microdata and statistical data per year.} \label{fig:rel-yrs} \end{figure} -\mk{WIP} - -$48$ articles in total -spanning $15$ years of research from $2006$ to $2021$ -median year $2015$ -$50$\% microdata - -$55$\% geo-tagged data -$59$\% finite data observation -$57$\% streaming publishing mode -$77$\% global publishing scheme +First, we group works with respect to whether they deal with microdata or statistical data (see Section~\ref{subsec:data-categories} for the definitions) as input. +The works are equally divided between the two data categories, while $55$\% of them propose location-specific techniques. +Then, we further group them into two subcategories, whether they are designed for the finite or infinite (see Section.~\ref{subsec:data-publishing}) observation setting. +$59$\% of the reviewed literature deals with finite data observation, $57$\% implements the streaming publishing mode, while $77$\% applies the global publishing scheme. +Finally, we identify the privacy-related aspects of each work in terms of the method and protection level that they apply, as well as the privacy attacks that they are considering with emphasis on the underlying data dependence (see Figure~\ref{fig:rel-stats} for the detailed cumulative statistics). \begin{figure}[htp] \centering @@ -52,16 +29,23 @@ $77$\% global publishing scheme \includegraphics[width=.5\linewidth]{related/rel-prot}% }% \hfill + \\ \bigskip \subcaptionbox{Privacy attack\label{fig:rel-atk}}{% \includegraphics[width=.5\linewidth]{related/rel-atk}% }% \subcaptionbox{Data dependence\label{fig:rel-dep}}{% \includegraphics[width=.5\linewidth]{related/rel-dep}% }% - \caption{.} + \caption{The privacy-related aspects of the reviewed literature in terms of (a)~the privacy method utilized, (b)~the protection level provided, (c)~the privacy attack considered, and (d)~data dependence therein.} \label{fig:rel-stats} \end{figure} +% \kat{continue.. say also in which category you place your work} +Our work, which we present subsequently in Section~\ref{ch:lmdk-prv}, focuses primarily on microdata for its use case. +However, it is possible to deal with statistical data in specific scenarios. +For simplicity, we limit the conversation in microdata and plan to investigate more diverse settings in our future work. + + \input{related/micro} \input{related/statistical} \input{related/summary}