Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy.
Jairo GiraldoAlvaro A. CárdenasMurat KantarciogluPublished in: ACC (2017)
Keyphrases
- differential privacy
- preserving privacy
- differentially private
- privacy preserving
- data privacy
- privacy guarantees
- security threats
- private data
- security mechanisms
- individual privacy
- security measures
- security protocols
- security risks
- security issues
- privacy preservation
- secure multiparty computation
- privacy preserving data mining algorithms
- sensitive data
- cryptographic protocols
- personal information
- data integrity
- tabular data
- information security
- biometric template
- data sharing
- anonymized data
- data publishing
- security requirements
- data security
- data protection
- personal data
- private information
- sensitive information
- privacy preserving data mining
- statistical databases
- cloud computing
- access control
- privacy protection
- intrusion detection
- data mining
- search logs
- privacy concerns
- peer to peer