2017
DOI: 10.1109/tkde.2017.2697856
|View full text |Cite
|
Sign up to set email alerts
|

Differentially Private Data Publishing and Analysis: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
126
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 264 publications
(126 citation statements)
references
References 89 publications
0
126
0
Order By: Relevance
“…Besides adding noise prior to computing PCA, we also add noise to the output of PCA. According to differential privacy parallel composition [20], the whole dataset is private as long as each record is private; a simple idea is adding noise to each record to protect private information. However, if this privacy preservation method is directly applied to big data, the introduced noise will significantly increase so that data utility dramatically drops.…”
Section: Algorithm Descriptionmentioning
confidence: 99%
“…Besides adding noise prior to computing PCA, we also add noise to the output of PCA. According to differential privacy parallel composition [20], the whole dataset is private as long as each record is private; a simple idea is adding noise to each record to protect private information. However, if this privacy preservation method is directly applied to big data, the introduced noise will significantly increase so that data utility dramatically drops.…”
Section: Algorithm Descriptionmentioning
confidence: 99%
“…The last equation uses the fact that p 1· + p 2· = 1. Note that the plus-minus sign of ρ 12 is equivalent to the sign of Cov(x 1 , x 2 ), 15 then we prove the left half of Eq. (28) by setting x 1,2 > x 1,1 as usual.…”
Section: Appendix a Proof Of Theoremmentioning
confidence: 53%
“…Perturbation based methods include link modification strategy and randomization strategy, in which the former proposes link addition and deletion mechanism to meet the desired constrains, such as kdegree anonymity [40], and k-automorphism anonymity [41]; the latter attempts to change network structure by randomly adding and removing links. In addition, differential privacy methods [42], [43] are also proposed for network data anonymization.…”
Section: Related Work a Network Privacy Preservationmentioning
confidence: 99%