Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy 2022
DOI: 10.1145/3508398.3511501
|View full text |Cite
|
Sign up to set email alerts
|

Landmark Privacy: Configurable Differential Privacy Protection for Time Series

Abstract: Several application domains, including healthcare, smart building, and traffic monitoring, require the continuous publishing of data, also known as time series. In many cases, time series are geotagged data containing sensitive personal details, and thus their processing entails privacy concerns. Several definitions have been proposed that allow for privacy preservation while processing and publishing such data, with differential privacy being the most prominent one. Most existing differential privacy schemes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…Other privacy-preserving methods proposed for data stream mining use different techniques such as fuzzy logic and PCA (Rajesh et al 2012), differential privacy (Chamikara et al 2019;Katsomallos et al 2022;Gondara et al 2022), sliding window (Lin et al 2016), and hashing (Nyati et al 2018). These methods try to overcome the challenges in data stream mining by using different techniques.…”
Section: Ppdm Methods For Data Stream Miningmentioning
confidence: 99%
“…Other privacy-preserving methods proposed for data stream mining use different techniques such as fuzzy logic and PCA (Rajesh et al 2012), differential privacy (Chamikara et al 2019;Katsomallos et al 2022;Gondara et al 2022), sliding window (Lin et al 2016), and hashing (Nyati et al 2018). These methods try to overcome the challenges in data stream mining by using different techniques.…”
Section: Ppdm Methods For Data Stream Miningmentioning
confidence: 99%
“…In the context of the Taxi example, these approaches provide similar privacy protections to a passenger regardless of the proximity to sensitive locations. Landmark privacy [11] makes a move in the direction of utilizing the different characteristics of data streams. It claims that, in reality, not all timestamps and data should be treated equally because some of them may contain significantly more private information or valuable information.…”
Section: Related Workmentioning
confidence: 99%
“…From the related work, we select two typical algorithms of w-event DP, i.e., budget division (BD) and budget absorption (BA), as baseline [9]. Furthermore, since landmark privacy offers a similar privacy guarantee to our proposed PPM, we also compare its performance by evaluating its proposed adaptive algorithm [3]. The privacy budgets of BD, BA, and landmark privacy are converted from their original definitions to the one defined by pattern-level DP.…”
Section: A Experiments Setup 1) Datasetmentioning
confidence: 99%
“…Continuous data statistics under centralized differential privacy has been extensively studied, [14][15][16][17][18] while analysing such stream data under local differential privacy protection is still at infancy. There are few methods 8,9,[19][20][21] have been proposed to deal with the stream data but with different settings.…”
Section: Stream Data Aggregation With Ldpmentioning
confidence: 99%