2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) 2014
DOI: 10.1109/camad.2014.7033231
|View full text |Cite
|
Sign up to set email alerts
|

Aggregation and perturbation in practice: Case-study of privacy, accuracy & performance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…As a case study on real-life energy consumption data notes: "simple presence detection is still feasible on the processed data set, more detailed inferences requiring higher temporal or energy-level details are clearly aggravated." [73]. Thus, a loss of data quality occurring could be a privacy gain whenever it does not harm the intended functionality in the back-end.…”
Section: Minimizing Data Collectionmentioning
confidence: 99%
“…As a case study on real-life energy consumption data notes: "simple presence detection is still feasible on the processed data set, more detailed inferences requiring higher temporal or energy-level details are clearly aggravated." [73]. Thus, a loss of data quality occurring could be a privacy gain whenever it does not harm the intended functionality in the back-end.…”
Section: Minimizing Data Collectionmentioning
confidence: 99%
“…The algorithms done grouping of likely smart meters that are likely to communicate so that the CRLs will be kept local to that group. Pohls et al (2014) analysed accuracy, privacy, compression-ratio and computational overhead of selected aggregation and perturbation methods in the Internet of Things (IoT) so as to detect possibility of predictions and intelligent reactions with lower quality data. In Lei et al (2007), it was shown that it was possible to effectively and efficiently track the correlation and autocorrelation structure of multi-variant streams and use it to perturb the stream data to preserve privacy.…”
Section: Related Workmentioning
confidence: 99%