Differentially private applications: Where to start?

6Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A lot of differentially private applications have been proposed nowadays. The various steps that can be followed when solving a privacy preservation problem for a particular application are shown in the first figure of this chapter. The dark boxes in the flowchart show the steps, and the orange boxes illustrate the possible choices. First, it is necessary to identify the scenarios: data publishing or data analysis. Data publishing aims to release answers to queries or entire datasets to public users; whereas, data analysis normally releases a private version of a model. Because private learning frameworks solve privacy preservation problems using optimization, an optimization objective normally has to be determined. The second step is identifying challenges in the application. Although differential privacy is considered to be a promising solution for privacy preservation issues, implementation in some applications still presents a number of challenges. These challenges, and their possible solutions, are introduced in the next subsection.

Cite

CITATION STYLE

APA

Zhu, T., Li, G., Zhou, W., & Yu, P. S. (2017). Differentially private applications: Where to start? In Advances in Information Security (Vol. 69, pp. 83–90). Springer New York LLC. https://doi.org/10.1007/978-3-319-62004-6_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free