Computer Science in Cars Symposium 2021
DOI: 10.1145/3488904.3493380
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…It has also been shown that if users are aware that a tool should protect their privacy, they are getting biased and tend toward being more concerned about potential privacy issues of the tool than for non-privacy tools [4,5]. Further problems of integrating PETs into existing services are that, on the one hand, it is hard to decide which of the many PETs is the best choice [43,62] and that, on the other hand, it is hardly possible to ask the users about their preferences since in most cases the users do not notice the main achievement of the PET to protect their privacy, but rather things such as increased latency, more complex processes, or similar side effects.…”
Section: Discussionmentioning
confidence: 99%
“…It has also been shown that if users are aware that a tool should protect their privacy, they are getting biased and tend toward being more concerned about potential privacy issues of the tool than for non-privacy tools [4,5]. Further problems of integrating PETs into existing services are that, on the one hand, it is hard to decide which of the many PETs is the best choice [43,62] and that, on the other hand, it is hardly possible to ask the users about their preferences since in most cases the users do not notice the main achievement of the PET to protect their privacy, but rather things such as increased latency, more complex processes, or similar side effects.…”
Section: Discussionmentioning
confidence: 99%
“…The most detailed analysis attempting to raise re-identification risks were proposed in [29][30][31]. Brasher [29] discussed the limitation of anonymization and encouraged its conjunction with pseudonymization to reduce the re-identification risks.…”
Section: Data Privacy-preserving Methodsmentioning
confidence: 99%
“…Li et al discussed the inference and de-anonymization risks within the driverless environment [30]. Löbner et al [31] evaluated the re-identification risks and impact within the vehicular context through a real test bed scenario, though the efforts remain limited to some of the privacypreserving techniques without reviewing them thoroughly.…”
Section: Data Privacy-preserving Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Inferences can be seen as "new" data, created through the combination of (personal) data of different types and sources. Inferences can also be targeted at de-identified data [49,73] when combining the existing data set with another set to re-identify users. The ethical issue is now how these inferences should be treated under consideration of all circumstances, that is the different entities, creator, data subjects, involved, the type of data as well as its purpose and processing.…”
Section: The Value Of Data -Inferencesmentioning
confidence: 99%