A Novel Study of Different Privacy Frameworks Metrics and Patterns

Learnability has impacted data privacy and security exposing two sides of a coin. A breach in security eventually leads to loss of privacy and vice versa. Evolution of technologies has put forth new platforms simplifying data derivation and assimilation providing information on the go. Even though different policies and metrics are in place, the objective varies along with the factors determined by technological advancement. This paper describes existing privacy metrics and patterns while providing an overall view of different mathematical framework privacy preserving. Furthermore, maintaining trust and utility becomes a challenge in preserving privacy and security as different techniques and technologies for assimilation of information are readily available without any restraints.

[1]  Ohad Shamir,et al.  Learnability, Stability and Uniform Convergence , 2010, J. Mach. Learn. Res..

[2]  Aaron Roth,et al.  A learning theory approach to non-interactive database privacy , 2008, STOC.

[3]  Ashwin Machanavajjhala,et al.  Pufferfish , 2014, ACM Trans. Database Syst..

[4]  Bing-Rong Lin,et al.  Towards a Systematic Analysis of Privacy Definitions , 2014, J. Priv. Confidentiality.

[5]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[6]  Hongxia Jin,et al.  Private spatial data aggregation in the local setting , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).

[7]  Aftab Ahmad,et al.  A Novel Information Privacy Metric , 2018 .

[8]  Benjamin Livshits,et al.  BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model , 2017, USENIX Security Symposium.

[9]  Ashwin Machanavajjhala,et al.  Blowfish privacy: tuning privacy-utility trade-offs using policies , 2013, SIGMOD Conference.

[10]  Wojciech Szpankowski,et al.  The Trade-Off Between Privacy and Fidelity via Ehrhart Theory , 2018, IEEE Transactions on Information Theory.

[11]  Bjorn Bebensee,et al.  Local Differential Privacy: a tutorial , 2019, ArXiv.

[12]  Houbing Song,et al.  ESOT: a new privacy model for preserving location privacy in Internet of Things , 2018, Telecommun. Syst..

[13]  Jaap-Henk Hoepman,et al.  Privacy Design Strategies (The Little Blue Book) , 2018 .

[14]  Ram Rajagopal,et al.  Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy , 2018, 2018 52nd Asilomar Conference on Signals, Systems, and Computers.

[15]  Wojciech Szpankowski,et al.  Preserving Privacy and Fidelity via Ehrhart Theory , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[16]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[17]  Asadullah Shah,et al.  Security and privacy for IoT and fog computing paradigm , 2018, 2018 15th Learning and Technology Conference (L&T).

[18]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[19]  Ram Rajagopal,et al.  Context-Aware Generative Adversarial Privacy , 2017, Entropy.