15 lines
1.3 KiB
TeX
15 lines
1.3 KiB
TeX
\chapter{Evaluation}
|
|
\label{ch:eval}
|
|
\nnfootnote{This chapter is under review for being published in the proceedings of the $12$th ACM Conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.\bigskip}
|
|
|
|
In this chapter, we present the experiments that we performed in order to evaluate {\thething} privacy (Chapter~\ref{ch:lmdk-prv}) on real and synthetic data sets.
|
|
Section~\ref{sec:eval-dtl} contains all the details regarding the data sets the we used for our experiments along with the system configurations.
|
|
Section~\ref{sec:eval-lmdk} evaluates the data utility of the {\thething} privacy schemes that we designed in Section~\ref{sec:thething} in comparison to user and event level, and investigates the behavior of the privacy loss under temporal correlation for different distributions of {\thethings}.
|
|
Section~\ref{sec:eval-lmdk-sel} justifies our decisions while designing the privacy-preserving dummy {\thething} selection module in Section~\ref{sec:theotherthing} and the data utility impact of the latter.
|
|
Finally, Section~\ref{sec:eval-sum} concludes this chapter by summarizing the main results derived from the experiments.
|
|
|
|
\input{evaluation/details}
|
|
\input{evaluation/thething}
|
|
\input{evaluation/theotherthing}
|
|
\input{evaluation/summary}
|