scholarly journals A Comprehensive Survey on Local Differential Privacy

2020 ◽  
Vol 2020 ◽  
pp. 1-29 ◽  
Author(s):  
Xingxing Xiong ◽  
Shubo Liu ◽  
Dan Li ◽  
Zhaohui Cai ◽  
Xiaoguang Niu

With the advent of the era of big data, privacy issues have been becoming a hot topic in public. Local differential privacy (LDP) is a state-of-the-art privacy preservation technique that allows to perform big data analysis (e.g., statistical estimation, statistical learning, and data mining) while guaranteeing each individual participant’s privacy. In this paper, we present a comprehensive survey of LDP. We first give an overview on the fundamental knowledge of LDP and its frameworks. We then introduce the mainstream privatization mechanisms and methods in detail from the perspective of frequency oracle and give insights into recent studied on private basic statistical estimation (e.g., frequency estimation and mean estimation) and complex statistical estimation (e.g., multivariate distribution estimation and private estimation over complex data) under LDP. Furthermore, we present current research circumstances on LDP including the private statistical learning/inferencing, private statistical data analysis, privacy amplification techniques for LDP, and some application fields under LDP. Finally, we identify future research directions and open challenges for LDP. This survey can serve as a good reference source for the research of LDP to deal with various privacy-related scenarios to be encountered in practice.

2021 ◽  
Vol 36 ◽  
pp. 04005
Author(s):  
Kah Meng Chong

Electronic Health Record (EHR) is the key to an efficient healthcare service delivery system. The publication of healthcare data is highly beneficial to healthcare industries and government institutions to support a variety of medical and census research. However, healthcare data contains sensitive information of patients and the publication of such data could lead to unintended privacy disclosures. In this paper, we present a comprehensive survey of the state-of-the-art privacy-enhancing methods that ensure a secure healthcare data sharing environment. We focus on the recently proposed schemes based on data anonymization and differential privacy approaches in the protection of healthcare data privacy. We highlight the strengths and limitations of the two approaches and discussed some promising future research directions in this area.


Author(s):  
Trupti Vishwambhar Kenekar ◽  
Ajay R. Dani

As Big Data is group of structured, unstructured and semi-structure data collected from various sources, it is important to mine and provide privacy to individual data. Differential Privacy is one the best measure which provides strong privacy guarantee. The chapter proposed differentially private frequent item set mining using map reduce requires less time for privately mining large dataset. The chapter discussed problem of preserving data privacy, different challenges to preserving data privacy in big data environment, Data privacy techniques and their applications to unstructured data. The analyses of experimental results on structured and unstructured data set are also presented.


2017 ◽  
pp. 1281-1302 ◽  
Author(s):  
Shrinivas D. Desai ◽  
Linganagouda Kulkarni

Over the past few years, medical imaging technology has significantly advanced. Today, medical imaging modalities have been designed with state-of-the-art technology to provide much better in-depth resolution, reduced artifacts, and improved contrast –to – noise ratio. However in many practical situations complete projection data is not acquired leading to incomplete data problem. When the data is incomplete, tomograms may blur, resolution degrades, noise increases and forms artifacts which is the most important factor in degrading the tomography image quality and eventually hinders diagnostic accuracy. Efficient strategies to address this problem and to improve the diagnostic acceptability of CT images are thus invaluable. This review work, presents comprehensive survey of techniques for minimization of streaking artifact due to metallic implant in CT images. Problematic issues and outlook for the future research are discussed too. The major goal of the paper is to provide a comprehensive reference source for the researchers involved in metal artifact reduction methods.


Author(s):  
David Chan

Studies of team-level constructs can produce new insights when researchers explicitly take into account several critical conceptual and methodological issues. This article explicates the conceptual bases for multilevel research on team constructs and discusses specific issues relating to conceptual frameworks, measurement, and data analysis. To advance programmatic research involving team-level constructs, several future research directions concerning issues of substantive content (i.e., changes in the nature of work and teams, member-team fit, linking team-level constructs to higher-level constructs) and strategic approaches (i.e., the construct's theoretical roles, dimensionality and specificity, malleability and changes over time, relationships with Big Data) are proposed.


Author(s):  
D. R. Kolisnyk ◽  
◽  
K. S. Misevych ◽  
S. V. Kovalenko

The article considers the issues of system architecture IoT-Fog-Cloud, considers the interaction between the three levels of IoT, Fog and Cloud for the effective implementation of programs for big data analysis and cybersecurity. The article also discusses security issues, solutions and directions for future research in the field of the Internet of Things and nebulous computing.


Author(s):  
Marmar Moussa ◽  
Steven A. Demurjian

This chapter presents a survey of the most important security and privacy issues related to large-scale data sharing and mining in big data with focus on differential privacy as a promising approach for achieving privacy especially in statistical databases often used in healthcare. A case study is presented utilizing differential privacy in healthcare domain, the chapter analyzes and compares the major differentially private data release strategies and noise mechanisms such as the Laplace and the exponential mechanisms. The background section discusses several security and privacy approaches in big data including authentication and encryption protocols, and privacy preserving techniques such as k-anonymity. Next, the chapter introduces the differential privacy concepts used in the interactive and non-interactive data sharing models and the various noise mechanisms used. An instrumental case study is then presented to examine the effect of applying differential privacy in analytics. The chapter then explores the future trends and finally, provides a conclusion.


Author(s):  
Miguel Figueres-Esteban ◽  
Peter Hughes ◽  
Coen van Gulijk

In the big data era, large and complex data sets will exceed scientists’ capacity to make sense of them in the traditional way. New approaches in data analysis, supported by computer science, will be necessary to address the problems that emerge with the rise of big data. The analysis of the Close Call database, which is a text-based database for near-miss reporting on the GB railways, provides a test case. The traditional analysis of Close Calls is time consuming and prone to differences in interpretation. This paper investigates the use of visual analytics techniques, based on network text analysis, to conduct data analysis and extract safety knowledge from 500 randomly selected Close Call records relating to worker slips, trips and falls. The results demonstrate a straightforward, yet effective, way to identify hazardous conditions without having to read each report individually. This opens up new ways to perform data analysis in safety science.


2014 ◽  
Vol 28 (2) ◽  
pp. 75-98 ◽  
Author(s):  
Ori Heffetz ◽  
Katrina Ligett

What can we, as users of microdata, formally guarantee to the individuals (or firms) in our dataset, regarding their privacy? We retell a few stories, well-known in data-privacy circles, of failed anonymization attempts in publicly released datasets. We then provide a mostly informal introduction to several ideas from the literature on differential privacy, an active literature in computer science that studies formal approaches to preserving the privacy of individuals in statistical databases. We apply some of its insights to situations routinely faced by applied economists, emphasizing big-data contexts.


2020 ◽  
Vol 12 (20) ◽  
pp. 8744
Author(s):  
Diana Florea ◽  
Silvia Florea

Despite the claimed worth and huge interest regarding the increasing volumes of complex data sets and the rewarding promise to improve research, there is, however, a growing concern regarding data privacy that affects both qualitative and quantitative higher education research. Within the contemporary debates on the impact of Big Data on the nature of higher education research and the effective ways to harmonize Big Data practice with privacy restrictions and regulations, this study sets out to qualitatively examine current issues regarding data privacy, anonymity, informed consent and confidentiality in data-centric higher education research, with a focus on the data collector, data subject and data user. We argue that within current regulations, data protection of research subjects concerns more data collection and disclosure and insufficiently describes use, having procedural implications for both the complex nature of higher education (HE) research and the type of research data being collected. We work our argument through an examination of several factors that call for a reconsideration of data privacy and access to private information in HE research. The conclusions indicate that Big Data-centric HE research is increasingly becoming a mainstream research paradigm which needs to address critical data privacy issues before being widely embraced.


Sign in / Sign up

Export Citation Format

Share Document