2017
DOI: 10.1007/s10115-017-1113-6
|View full text |Cite
|
Sign up to set email alerts
|

Differentially private counting of users’ spatial regions

Abstract: Mining of spatial data is an enabling technology for mobile services, Internetconnected cars, and the Internet of Things. But the very distinctiveness of spatial data that drives utility, can cost user privacy. Past work has focused upon points and trajectories for differentially-private release. In this work, we continue the tradition of privacy-preserving spatial analytics, focusing not on point or path data, but on planar spatial regions. Such data represents the area of a user's most frequent visitation-su… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 45 publications
0
5
0
Order By: Relevance
“…In that research, however, the whole histogram is known to the protection algorithm and it is processed/obfuscated in one go, not on the fly as in our approach. We refer the interested reader to Fanaeepour and Rubinstein [24] for a very recent effort on protecting a histogram in one go.…”
Section: Related Workmentioning
confidence: 99%
“…In that research, however, the whole histogram is known to the protection algorithm and it is processed/obfuscated in one go, not on the fly as in our approach. We refer the interested reader to Fanaeepour and Rubinstein [24] for a very recent effort on protecting a histogram in one go.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, the privacy preserving of data releasing has received considerable attention. Researchers have proposed some influential release methods based on differential privacy [9][10][11][12][13][14]16,[19][20][21][22][23]. We briefly review the relevant work here and discuss the differences between our work and existing work.…”
Section: Related Workmentioning
confidence: 99%
“…The rest of the researchers [14,19,20] have studied hybrid partitions or other conditions. The DPCube [14] algorithm proposed by Xiao has two steps.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There are a large number of works adopting differential privacy to location privacy preservation. 1,10 Most of them, for example, Al-Hussaeni et al, 11 Qardaji et al, 12 and Fanaeepour and Rubinstein, 13 have applied the traditional differential privacy (or centralized differential privacy, CDP) 9 on location or trace data for data publishing or aggregation with a trusted server. As privacy matters are raised frequently, local differential privacy (LDP) 14 has been considered in many application fields due to its more stringent and practical privacy.…”
Section: Introductionmentioning
confidence: 99%