Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks 2017
DOI: 10.1145/3055031.3055090
|View full text |Cite
|
Sign up to set email alerts
|

Coresets for differentially private k-means clustering and applications to privacy in mobile sensor networks

Abstract: Mobile sensor networks are a great source of data. By collecting data with mobile sensor nodes from individuals in a user community, e.g. using their smartphones, we can learn global information such as traffic congestion patterns in the city, location of key community facilities, and locations of gathering places. Can we publish and run queries on mobile sensor network databases without disclosing information about individual nodes?Differential privacy is a strong notion of privacy which guarantees that very … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 37 publications
(48 citation statements)
references
References 31 publications
0
42
0
Order By: Relevance
“…These solutions are usually tailored to specific use cases and are incapable of preventing the leak of private information while maintaining the utility of data. The latter category includes federated learning frameworks [28], differential privacy algorithms [7,31], cryptographic solutions based on homomorphic encryption and compressive sensing [1,34], and privacy-preserving techniques that transform data to a subspace where private attributes can be easily identified and altered [8,11,24]. Federated learning addresses the problem of training a model given data from many users without transferring them to a server.…”
Section: Related Workmentioning
confidence: 99%
“…These solutions are usually tailored to specific use cases and are incapable of preventing the leak of private information while maintaining the utility of data. The latter category includes federated learning frameworks [28], differential privacy algorithms [7,31], cryptographic solutions based on homomorphic encryption and compressive sensing [1,34], and privacy-preserving techniques that transform data to a subspace where private attributes can be easily identified and altered [8,11,24]. Federated learning addresses the problem of training a model given data from many users without transferring them to a server.…”
Section: Related Workmentioning
confidence: 99%
“…Releasing a private synopsis of the data (similarly to our sketch) rather than directly a noisy solution has already been studied as well. EUGkM [43,48] suggests for instance to use noisy histograms for clustering (but this method is by nature limited to small dimensions), and private coresets have been investigated by Feldman et al [24,25]. For PCA, noise can be added directly on the covariance matrix [22].…”
Section: Related Workmentioning
confidence: 99%
“…The problem of clustering was studied under centralized DP [ 127 , 128 , 129 ]. With LDP model, Nissim and Stemmer [ 130 ] conducted 1-clustering by finding a minimum enclosing ball.…”
Section: Machine Learning With Ldpmentioning
confidence: 99%