2020
DOI: 10.1007/978-3-030-41568-6_5
|View full text |Cite
|
Sign up to set email alerts
|

Inference Control in Distributed Environment: A Comparison Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…A few solutions are proposed to detect inference attacks in a MC context as described by Jebali et al 16 To detect attacks at query-time, Chang et al 6 propose a solution to model probabilistic dependencies between distributed personal databases in the same system. Similarly to Chen et al's solution, Chang et al work does not consider TA B L E 1 Comparison of the existing solutions w.r.t the requirements (i)-(iv) described in Section 1.…”
Section: Solutions Targeting Several Databasesmentioning
confidence: 99%
“…A few solutions are proposed to detect inference attacks in a MC context as described by Jebali et al 16 To detect attacks at query-time, Chang et al 6 propose a solution to model probabilistic dependencies between distributed personal databases in the same system. Similarly to Chen et al's solution, Chang et al work does not consider TA B L E 1 Comparison of the existing solutions w.r.t the requirements (i)-(iv) described in Section 1.…”
Section: Solutions Targeting Several Databasesmentioning
confidence: 99%
“…The problem of inference in data has attracted the attention of several researchers for decades, who have proposed various solutions to address this problem. Several studies have been conducted on the detection of inference attack that do not require automated learning algorithms [4,[17][18][19][20][21][22][23][24]. Each approach addresses a specific need and concerns different types of inference attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In this article, we focus on protecting a single sensor database with an InfDS. Yet, a few InfDSs are proposed to detect inference attacks in a multi-database context, as described by Jebali et al [ 23 ]. For the shakes of completeness we present, briefly, the limitations that also exist in those works with regard to our requirements.…”
Section: Related Workmentioning
confidence: 99%