bounded distortion
Recently Published Documents


TOTAL DOCUMENTS

69
(FIVE YEARS 8)

H-INDEX

13
(FIVE YEARS 0)

2021 ◽  
Vol 40 (6) ◽  
pp. 1-9
Author(s):  
Qing Fang ◽  
Wenqing Ouyang ◽  
Mo Li ◽  
Ligang Liu ◽  
Xiao-Ming Fu
Keyword(s):  

2021 ◽  
Vol 10 (2) ◽  
pp. 78
Author(s):  
Songyuan Li ◽  
Hui Tian ◽  
Hong Shen ◽  
Yingpeng Sang

Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it also provides security holes for privacy breaches as exposing individual’s privacy information to public may results in attacks threatening individual’s safety. Therefore, increased attention has been made recently on the privacy protection of trajectory data publishing. However, existing methods, such as generalization via anonymization and suppression via randomization, achieve protection by modifying the original trajectory to form a publishable trajectory, which results in significant data distortion and hence a low data utility. In this work, we propose a trajectory privacy-preserving method called dynamic anonymization with bounded distortion. In our method, individual trajectories in the original trajectory set are mixed in a localized manner to form synthetic trajectory data set with a bounded distortion for publishing, which can protect the privacy of location information associated with individuals in the trajectory data set and ensure a guaranteed utility of the published data both individually and collectively. Through experiments conducted on real trajectory data of Guangzhou City Taxi statistics, we evaluate the performance of our proposed method and compare it with the existing mainstream methods in terms of privacy preservation against attacks and trajectory data utilization. The results show that our proposed method achieves better performance on data utilization than the existing methods using globally static anonymization, without trading off the data security against attacks.


2020 ◽  
Vol 2020 (3) ◽  
pp. 284-303
Author(s):  
Patrick Ah-Fat ◽  
Michael Huth

AbstractComputing a function of some private inputs while maintaining the confidentiality of those inputs is an important problem, to which Differential Privacy and Secure Multi-party Computation can offer solutions under specific assumptions. Research in randomised algorithms aims at improving the privacy of such inputs by randomising the output of a computation while ensuring that large distortions of outputs occur with low probability. But use cases such as e-voting or auctions will not tolerate large distortions at all. Thus, we develop a framework for randomising the output of a privacypreserving computation, while guaranteeing that output distortions stay within a specified bound. We analyse the privacy gains of our approach and characterise them more precisely for our notion of sparse functions. We build randomisation algorithms, running in linearithmic time in the number of possible input values, for this class of functions and we prove that the computed randomisations maximise the inputs’ privacy. Experimental work demonstrates significant privacy gains when compared with existing approaches that guarantee distortion bounds, also for non-sparse functions.


2019 ◽  
Vol 38 (6) ◽  
pp. 1-17
Author(s):  
Ido Aharon ◽  
Renjie Chen ◽  
Denis Zorin ◽  
Ofir Weber
Keyword(s):  

2019 ◽  
Vol 484 (2) ◽  
pp. 142-146
Author(s):  
S. K. Vodopyanov

We define a scale of mappings that depends on two real parameters p and q,  and a weight function θ. In the case of q = p = n, θ ≡ 1, we obtain the well known mappingswith bounded distortion. Mappings of a two-index scale inherit many properties of mappings with bounded distortion. They are used for solving a few problems of global analysis and applied problems.


2016 ◽  
Vol 35 (6) ◽  
pp. 1-16 ◽  
Author(s):  
Edward Chien ◽  
Zohar Levi ◽  
Ofir Weber
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document