An Introduction to Various Privacy Models

Research output: Chapter in book / Conference proceedingChapter in an edited book (as author)Academic researchpeer-review

1 Citation (Scopus)

Abstract

While the growing popularity of mobile devices has brought great convenience to the general public, it also put the privacy of the individuals at risk. Mobile users' data are being collected by mobile devices every day for business and research purposes. The use of data mining tools has become increasingly popular. As such, great care must be taken, as the data collected may contain sensitive personal information. While the data may not contain explicit identifiers, they include information about location, physical attributes, or even payment history of an individual. When combined with some publicly available information, these data could be linked to the individual. This chapter introduces k-anonymity and differential privacy, two models that are commonly used to capture privacy requirements. We also discuss the various mechanisms with respect to these two models.
Original languageEnglish
Title of host publicationMobile Security and Privacy
Subtitle of host publicationAdvances, Challenges and Future Research Directions
PublisherElsevier Inc.
Pages235-245
Number of pages11
ISBN (Electronic)9780128047460
ISBN (Print)9780128046296
DOIs
Publication statusPublished - 13 Sept 2016

Keywords

  • Data anonymity
  • Data privacy
  • Data sharing
  • Differential privacy
  • K-anonymity
  • Privacy model

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'An Introduction to Various Privacy Models'. Together they form a unique fingerprint.

Cite this