2018
DOI: 10.1016/j.ins.2018.05.046
|View full text |Cite
|
Sign up to set email alerts
|

A semantic-preserving differentially private method for releasing query logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 44 publications
0
5
0
Order By: Relevance
“…In this approach, the idea was to preserve the semantics of the query logs through the differential privacy-based method by preserving the cardinality and granularity as the original query logs. Differential privacy is a better method than the k-anonymity method to protect privacy [45]. However, in this paper, we are improving the MDAV approach and, in the future, we will study the differential privacy aspect in the same model.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In this approach, the idea was to preserve the semantics of the query logs through the differential privacy-based method by preserving the cardinality and granularity as the original query logs. Differential privacy is a better method than the k-anonymity method to protect privacy [45]. However, in this paper, we are improving the MDAV approach and, in the future, we will study the differential privacy aspect in the same model.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, several algorithms are proposed that microaggregate a complete record or a specific group of attributes within a record to preserve privacy. Sánchez et al [45] proposed another differential privacy-based method to preserve the privacy of the query logs. In this approach, the idea was to preserve the semantics of the query logs through the differential privacy-based method by preserving the cardinality and granularity as the original query logs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The differential privacy approach can also be applied to anonymize data-streams [66]. In this case, there is no release of the original query, but a synthetic one, obtained using semantic similarity.…”
Section: B: Differential Privacymentioning
confidence: 99%
“…This framework was able to achieve a good balance between retrieval utility and privacy; however, the framework was only empirically evaluated against multiple search algorithms on their retrieval utility. Sánchez et al [53] proposed a privacy-preserving method of query logs that joined the flexibility and convenience of privacy-preserving data releasing with the strong privacy guarantees of differential privacy. Although this method produced query logs with differential privacy that was useful for data analysis, the major challenge was that the microaggregation algorithm did adapt to the lack of structure of query logs.…”
Section: Related Workmentioning
confidence: 99%