2015 IEEE Global Communications Conference (GLOBECOM) 2014
DOI: 10.1109/glocom.2014.7417364
|View full text |Cite
|
Sign up to set email alerts
|

Personalized Privacy-Preserving Data Aggregation for Histogram Estimation

Abstract: Histogram estimation is one of the fundamental tasks in crowdsourcing data aggregation. Since contributing data reveal more or less information about individuals' identifications and activities, participants need to preserve privacy of data according to their own levels of privacy concern. However, most of the existing work only aggregates data with an identical privacy level. In this paper, we propose an aggregation scheme for histogram estimation, wherein participants can publish their data at personalized d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…It can easily achieve personalized/granular privacy protection. Some existing work [ 57 , 203 ] aimed to propose personalized LDP-based frameworks for private histogram estimation. Gu et al [ 59 ] presented Input-Discriminative LDP (ID-LDP) that is a fine-grained privacy notion and reflects the distinct privacy requirements of different inputs.…”
Section: Discussion and Future Directionsmentioning
confidence: 99%
“…It can easily achieve personalized/granular privacy protection. Some existing work [ 57 , 203 ] aimed to propose personalized LDP-based frameworks for private histogram estimation. Gu et al [ 59 ] presented Input-Discriminative LDP (ID-LDP) that is a fine-grained privacy notion and reflects the distinct privacy requirements of different inputs.…”
Section: Discussion and Future Directionsmentioning
confidence: 99%
“…An inputdiscriminative unary encoding is designed to perturb the attribute value with the specified budgets. In [17,18], the server provides several privacy budgets and owner can choose one budget for himself to perturb his data. en, both the perturbed data and the selected budget are reported to the server.…”
Section: Related Workmentioning
confidence: 99%
“…In [19], it is the data owner who decides the privacy budget for his own data; however, it still needs to report the privacy budget to the server for frequency estimation. e schemes [17][18][19] have tried to consider the personal privacy requirement, but all of them are designed for one-dimensional data. In addition, the server needs to know the privacy budgets that are applied to the disturbed data to estimate the data distribution, which would also expose privacy to the server.…”
Section: Related Workmentioning
confidence: 99%
“…The algorithm of privacy protection is not performed on local clients. Wang et al [5] introduced a data aggregation scheme that provides personalized privacy preservation for participants. However, the scheme can't satisfy the need for real-time and multiple times data collection, and it also introduces too much noise.…”
Section: Personalized Privacymentioning
confidence: 99%
“…For instance, smart homes can analyze the preferential temperature distribution utilizing the collected data, further ascertain the most commonplace temperature; in order to deliver appropriate services, it needs to discover the age structure of the residents. Nevertheless, dwellers' privacy requirement has been a vast obstacle to the widespread participation of contributing data to the collector [5]. Users would not like to share their sensitive information unless their privacy issues have been resolved appropriately.…”
Section: Introductionmentioning
confidence: 99%