Abstract
AbstractIn view of the various methodological developments regarding the protection of sensitive data, especially with respect to privacy-preserving computation and federated learning, a conceptual categorization and comparison between various methods stemming from different fields is often desired. More concretely, it is important to provide guidance for the practice, which lacks an overview over suitable approaches for certain scenarios, whether it is differential privacy for interactive queries, k-anonymity methods and synthetic data generation for data publishing, or secure federated analysis for multiparty computation without sharing the data itself. Here, we provide an overview based on central criteria describing a context for privacy-preserving data handling, which allows informed decisions in view of the many alternatives. Besides guiding the practice, this categorization of concepts and methods is destined as a step towards a comprehensive ontology for anonymization. We emphasize throughout the paper that there is no panacea and that context matters.
Funder
ZHAW Zurich University of Applied Sciences
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference89 articles.
1. Abadi, M., Erlingsson, U., Goodfellow,I., McMahan,H.B., Mironov,I., Papernot,N., Talwar,K., Zhang,L.: On the protection of private information in machine learning systems: Two recent approches. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pages 1–6, (2017)
2. Alfons, A., Kraft, S., Templ, M., Filzmoser, P.: Simulation of close-to-reality population data for household surveys with application to EU-SILC. Stat. Methods Appl. 20(3), 383–407 (2011)
3. Arguedas, V.F., Izquierdo, E. and Chandramouli, K.,: Surveillance ontology for legal, ethical and privacy protection based on SKOS. In 2013 18th International Conference on Digital Signal Processing (DSP), pages 1 –5, (2013)
4. Arp, R., Smith, B. and Spear, A.D.: Building ontologies with basic formal ontology. The MIT Press, (2015)
5. Bambauer, J., Muralidhar, K., Sarathy, R.: Fool’s gold: An illustrated critique of differential privacy. Vanderbilt J. Entertain. Technol. Law 16(4), 701–755 (2014)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献