\chapter{Evaluation} \label{ch:eval} \nnfootnote{This chapter is under review for being published in the proceedings of the $12$th ACM Conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.\bigskip} In this chapter, we present the experiments that we performed in order to evaluate {\thething} privacy (Chapter~\ref{ch:lmdk-prv}) on real and synthetic data sets. Section~\ref{sec:eval-dtl} contains all the details regarding the data sets the we used for our experiments along with the system configurations. Section~\ref{sec:eval-lmdk} evaluates the data utility of the {\thething} privacy schemes that we designed in Section~\ref{sec:thething} in comparison to user and event level, and investigates the behavior of the privacy loss under temporal correlation for different distributions of {\thethings}. Section~\ref{sec:eval-lmdk-sel} justifies our decisions while designing the privacy-preserving dummy {\thething} selection module in Section~\ref{sec:theotherthing} and the data utility impact of the latter. Finally, Section~\ref{sec:eval-sum} concludes this chapter by summarizing the main results derived from the experiments. \input{evaluation/details} \input{evaluation/thething} \input{evaluation/theotherthing} \input{evaluation/summary}