2018
DOI: 10.1093/idpl/ipx027
|View full text |Cite
|
Sign up to set email alerts
|

Practical approaches to big data privacy over time

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(24 citation statements)
references
References 0 publications
0
18
0
1
Order By: Relevance
“…Aside from being a generally useful approach for fitting hierarchical models recursively, the Proposal-RB procedure is useful in data privacy situations where the original data cannot be released due to proprietary reasons, public safety, or legal restrictions (Altman, 2018) because the data do not appear in the second stage analysis. Proposal-RB is also trivial to implement and is naturally adapted for parallel computing environments because we can sample from each of the transient posterior distributions [β j |y j ] in parallel at the first stage.…”
Section: Proposal-recursive Bayesian Inferencementioning
confidence: 99%
“…Aside from being a generally useful approach for fitting hierarchical models recursively, the Proposal-RB procedure is useful in data privacy situations where the original data cannot be released due to proprietary reasons, public safety, or legal restrictions (Altman, 2018) because the data do not appear in the second stage analysis. Proposal-RB is also trivial to implement and is naturally adapted for parallel computing environments because we can sample from each of the transient posterior distributions [β j |y j ] in parallel at the first stage.…”
Section: Proposal-recursive Bayesian Inferencementioning
confidence: 99%
“…In their words, the availability of Smart Grids, automated building systems, unmanned aerial vehicles and sensors that are enabled by IoT and cloud platforms are all geared towards rendering a more comfortable urban life. Nevertheless, the heterogeneity of the platforms and protocols that allows for a smooth application of all these systems exposes security threats, especially to hackers, terrorists, scammers and other ill-minded groups [78]. The challenges are even more pronounced in regard to the Big Data generated by these diverse components.…”
Section: An Agenda For Urban Comfortmentioning
confidence: 99%
“…They proposed privacy preserving approach for data lake scenario. The privacy challenges associated with big data are discussed in [16] while different solutions for the same are found in [17].…”
Section: Related Workmentioning
confidence: 99%