<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>PhD Workshop, September</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Rigorous and Flexible Privacy Models for Utilizing Personal Spatiotemporal Data</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Yang Cao Supervised by Masatoshi Yoshikawa Kyoto University</institution>
          ,
          <country country="JP">Japan</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <volume>9</volume>
      <issue>2016</issue>
      <abstract>
        <p>Personal data are the new oil. Vast amounts of spatiotemporal data generated by individuals have been collected and analyzed, such as check-in data, trajectories, web browsing data and timestamped medical records. These personal data are a valuable resource for businesses and also have the potential to provide significant social benefits through sharing and reuse. However, privacy concerns hinder the wider use of these personal data. To this end, dozens of privacy protection models have been proposed for privacy-preserving data publishing (PPDP). -differential privacy has emerged as a de facto privacy model for PPDP because of its rigorous theoretical guarantees, but it has also been criticized as impractical in many scenarios. We attempt to design rigorous and flexible privacy models that able to bridge the gap between theoretical limitations and practical needs. In this article, we first motivate the importance of rigorousness and flexibility for privacy models and then present two privacy models that extend differential privacy in a practical manner.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>New opportunities are arising to enrich our
understanding of the physical world by utilizing personal big data.
Such data generated by individuals that possess spatial and
temporal properties are called personal spatiotemporal data
and include information such as people’s movements, search
logs, shopping records, social activities and medical
histories. Companies such as Google, Amazon and Facebook
have created enormous wealth by using such personal data.
These data also have the potential to support significant
initiatives for the public good, such as innovative services,
traffic monitoring, disease surveillance and health
promotion. Therefore, it is important to enable the sharing and
reuse of personal spatiotemporal data.</p>
      <p>However, several well-known cases of privacy leakage have
arisen in attempts to provide privacy-preserving data
publishing (PPDP) [1]. One of the most famous privacy leakage
cases occurred with regard to the Massachusetts Group
Insurance Commission (GIC) medical dataset, which contains
anonymized medical records and was first made available
in 1996 for medical research and public health purposes.
Latanya Sweeney [2] linked the anonymized GIC database
(which retained the birthday, sex, and ZIP code of each
patient) with voter registration records to identify the medical
records of the governor of Massachusetts. In 2006, AOL Inc.
released more than 650 thousand users’ anonymized search
logs for research purposes, but researchers [3] found it is
possible to de-anonymize some users by mining these
timestamped records. A recent privacy leakage case was related
to the datasets released for the Netflix Prize competition for
recommender algorithms. Researchers [4] verified that the
datasets could be de-anonymized by linking them with the
IMDB dataset; as a result, Netflix became the target of a
lawsuit and was obliged to terminate this well-known
competition in 2010. In Japan, the East Japan Railway
Company (JR) faced a scandal in 2013 because of the selling of
customer data collected through the use of SUICA cards.
These privacy leakage cases illustrate the conflict between
increasing public concerns about data privacy and the need
for personal data publishing. Therefore, privacy issues have
become a critical problem in the big data era.</p>
      <p>Personal spatiotemporal data are highly sensitive even if
they are anonymized. Studies [5] [6] have shown that only
four spatiotemporal data points from anonymized mobile
datasets and credit card records (with purchase times and
locations) are sufficient to uniquely identify 90% of
individuals. Another study [7] has demonstrated that it is possible
to track smart phone locations simply by monitoring
battery consumption data (timestamps and remaining battery
life), which do not require the users’ permission to be shared.
Therefore, because of the unique and rich patterns that are
present in personal spatiotemporal data, a rigorous privacy
model is needed to utilize personal spatiotemporal data in
a privacy-preserving manner.</p>
      <p>At the same time, privacy models should be flexible for the
following two reasons. First, because privacy protection
implies the hiding or perturbing of sensitive information1, the
privacy level should be tunable (to an appropriate level) for
different applications to achieve a suitable trade-off between
privacy and utility. Second, privacy as a complex social
concept should be modifiable in accordance with different social
contexts. For example, different users might have different
1Although some cryptographic approaches (e.g.,
homomorphic encryption) can be used for PPDP, because they
limit the possible data recipients, we here discuss primarily
perturbation-based approaches that enable a wider sharing
of data.
preferences regarding privacy; for a single user, the desired
protection levels might also be different at different times
and places.</p>
      <p>In the following, we briefly review the background for this
research in Section 2 and then present two proposed privacy
models in Section 3 and Section 4.
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>BACKGROUND</title>
    </sec>
    <sec id="sec-3">
      <title>Previous Privacy Models</title>
      <p>Previous studies have considered two major families of
privacy models: k-anonymity [2] and -differential privacy [8].
k-anonymity [2] was proposed in 2002 and was the first
privacy model to be widely accepted by practitioners. However,
Machanavajjhala [9] identified a serious flaw of k -anonymity
by demonstrating the possibility of homogeneity attacks and
background knowledge attacks and, to resolve this flaw,
proposed an improved privacy model based on k -anonymity
named `-diversity. However, `-diversity had its own
shortcomings, which motivated further improvement to yield
subsequent new privacy models, such as t-closeness [10] and M
invariance [11]. Researchers have realized that the essential
defect of the k-anonymity family is that the privacy
guarantee depends on the background knowledge possessed by
adversaries. In 2006, Dwork et al. proposed -differential
privacy [8], which has received increasing attention because
it is guaranteed to be rigorous and mathematically provable.
Differential privacy ensures protection against adversaries
with arbitrary background knowledge.
2.2</p>
    </sec>
    <sec id="sec-4">
      <title>Differential Privacy</title>
      <p>Intuitively, differential privacy guarantees that any single
user’s data in the database have only a “slight” (bounded
by ) impact on changes to the outputs. The parameter
that is used to control the privacy level is defined as a real
positive number. A lower value of corresponds to a lower
likelihood of privacy leakage. In the case of a suitably small
, an adversary cannot associate any piece of information
with a specific individual by mining the answers to queries.
Definition 1 (Neighboring Database [8]). If D is a database
and D0 is nearly identical to D but differs by one record, then
we say that D and D0 are two neighboring databases.
Definition 2 ( -Differential Privacy, -DP [8]). Let be a
randomized algorithm, and let R represent all possible
outputs of . The algorithm satisfies -DP if the following
holds for any r 2 R and any two neighboring databases D
and D0.</p>
      <p>
        P r[ (D) = r] exp( ) P r[ (D0) = r]
(
        <xref ref-type="bibr" rid="ref1 ref11">1</xref>
        )
      </p>
      <p>
        In the inequality expressed in (
        <xref ref-type="bibr" rid="ref1 ref11">1</xref>
        ), a positive parameter
, called the privacy budget, is given in advance. It is used
to control the level of privacy protection. A lower values of
corresponds to higher privacy and more randomness, and
vice versa. The global sensitivity (or sensitivity for short)
GS(Q) of query Q is the maximum distance L1 between the
query results for any two neighboring databases.
      </p>
      <p>Two widely used methods of achieving differential privacy
are the Laplace mechanism [12], which adds random noise to
the real data to prevent the disclosure of sensitive
information, and the Exponential mechanism [13], which randomly
returns the desired item with some calibrated probability.
(b) Trajectory data.</p>
      <p>(c) Aggregate data.</p>
      <p>Below, we summarize two crucial weaknesses of
differential privacy that hinder its extensive use in data publishing.</p>
      <p>One size fits all. -differential privacy uses a single
parameter to represent the protection level for all
users in a database rather than providing a
personalized privacy protection level.</p>
      <p>Data independence assumption. Differential
privacy assumes that the tuples in a database are
independent; however, real-world data tend to be
temporally or spatially correlated.
2.3</p>
    </sec>
    <sec id="sec-5">
      <title>Problem setting</title>
      <p>Here, we describe a scenario of the publishing of
aggregate spatiotemporal data. We consider a scenario in which
a trusted server collects spatiotemporal data points from
users and continuously stores them in database Di at each
timestamp i 2 [1; t]. Let t denote the current timestamp.
Each data point huID; time; loci is a row in Di (Fig. 1(a)).
Suppose that locs is the set of all locations in which we
are interested (POIs); then, the server wishes to publish a
vector ri at each timestamp i that consists of the counts
of loc 2 locs that appear in Di (Fig.1(c)), i.e., the answer
to the count query Qc : Di ! Rjlocsj. Without loss of
generality, we assume that each user appears at only one
location at most at each timestamp. We need to transform
the aggregate data depicted in Figure 1(c) into a secure form
for publishing because they are computed directly from the
sensitive raw data. The most straightforward method is to
employ the Laplace mechanism [12] (add random Laplace
noise) to achieve DP. In accordance with the limitations of
DP discussed above, two problems are encountered when
applying DP in practice, as follows:</p>
      <p>How can personalized differential privacy be achieved?
How can differential privacy be guaranteed even if the
data are temporally or spatially correlated?</p>
      <p>We present two privacy models, `-trajectory privacy
(Section 3) and spatiotemporal privacy (Section 4), to solve the
above problems.</p>
    </sec>
    <sec id="sec-6">
      <title>3. `-TRAJECTORY PRIVACY</title>
      <p>In a previous work [14], we defined a new privacy model
that we called `-trajectory privacy to guarantee that any
`length trajectories for each user are protected under
differential privacy. We formalized our privacy definition, proved
its feasibility, and designed efficient mechanisms to
implement it. This privacy model is personalized, i.e., different
users can specify different lengths of `-trajectories (`
successive data points) depending on their privacy requirements,
as illustrated in Figure 2(b). A closely related privacy model
called w-event privacy [15] protects the data within sliding
windows (all data points in w with successive timestamps),
as shown in Figure 2(a). In the following, we present the
definition of the `-trajectory privacy model and related
experimental results.</p>
      <p>We first define the neighboring databases in our setting.
Definition 3 (`-Trajectory Neighboring Stream Prefixes).
Let St0 be a near copy of the trajectory stream prefixes St
that differs in ` neighboring databases Di0. St and St0 are
neighboring `-trajectory stream prefixes if one can be
obtained from the other by modifying single or multiple locs
in any one `-trajectory `u;k (recall that an `-trajectory is a
set of ` spatiotemporal data points). We say that St and St0
are neighboring with respect to `u;k.</p>
      <p>Intuitively, `-trajectory privacy attempts to ensure that
any `-trajectory for any single user has a only “slight” (bounded
by ) impact on the outputs.</p>
      <p>Definition 4 (`-Trajectory -Differential Privacy). Let be
an algorithm that takes prefixes of trajectory streams St =
fD1; ; Dtg as inputs. Let Nt = fn1; ; ntg be a
possible perturbed output stream of . If the following holds for
any `-trajectory neighboring St and St0,</p>
      <p>P r [ (St) = Nt]
e</p>
      <p>P r
(St0) = Nt
(2)
then we say that satisfies `-trajectory -differential privacy
(or `-trajectory privacy for brevity).</p>
      <p>The following theorem provides insight regarding the
implementation of `-trajectory privacy.</p>
      <p>Theorem 1. Let be an integrated algorithm that takes
stream prefixes St = fDi; i 2 [1; t]g as inputs and produces
Nt = fni; i 2 [1; t]g as outputs. consists of a series of
sub-algorithms fAi; i 2 [1; t]g, each of which takes Di as its
input and outputs noisy data ni with independent
randomness. Presume that Ai ensures "i-DP, and let u;k be the
set of timestamps dominated by an arbitrary trajectory `u;k;
then, satisfies `-trajectory privacy if
8u; 8k; X "i
(3)
i2 u;k</p>
      <p>Based on the above theorem, we designed an algorithmic
framework for publishing differentially private aggregates
that satisfy `-trajectory privacy. The experimental results
show that our approach is effective and efficient compared
with previous works [16] and [15]. More details can be found
in our paper [14].</p>
      <p>ST -DIFFERENTIAL PRIVACY</p>
      <p>In existing studies, traditional DP mechanisms (e.g., the
Laplace mechanism) are employed as primitives. These
mechanisms assume that the data are independent or that
adversaries do not have knowledge of the data correlations.
However, data collected from the real world tend to be
temporally or spatially correlated, and such correlations could be
acquired by adversaries. In this study, we introduce a new
class of adversaries named realistic adversaries who have
t1 t2 t3 t4 t5 …</p>
      <p>t1 t2 t3 t4 t5 …
u1 mhoe
u2</p>
      <p>bar
u3 mhoe ocfefi gmy
bar …
mhoe …
bar …
u1 mhoe
u2</p>
      <p>bar
u3 mhoe ocfefi gmy
bar …
mhoe …
bar …
(a) w-event privacy (w=3).</p>
      <p>(b) l-trajectory privacy (l=3).
 loc4
(a) Road Network
colleague u2</p>
      <p>couple
u1</p>
      <p>u3
(b) Social Ties
tempfoorrsainlgcloerurseelartion  spatfoiarlucseorr-ruesleartion </p>
      <p>D1 D2 D3 … r1 r2 r3 …
uuuu4321 7lllloooo:0cccc04223 llll8oooo:0cccc05411 llll9oooo:0cccc03511 …………… llllloooooccccc54321 7:1012000 8:1100200 9:1010200 ............</p>
      <p>(c) Spatiotemporal Data (d) Raw Aggregates
Figure 3: The vulnerability of differential privacy to
correlated spatiotemporal data.
a varying degree of knowledge of the spatiotemporal
correlations of the data of interest. We demonstrate that the
risk of a DP mechanism may increase over time given the
existence of such adversaries. To prevent such privacy
leakage, we propose a new privacy definition, ST -differential
privacy, and present novel mechanisms to satisfy this
privacy definition. In the following, we first demonstrate the
problem by means of a motivating example, present the
definition of realistic adversaries, and briefly describe measures
for protecting against such adversaries. This work has been
submitted to an international conference.
4.1</p>
    </sec>
    <sec id="sec-7">
      <title>A Motivating Example</title>
      <p>The following example (illustrated in Figure 3) shows that
the existence of adversaries with knowledge of the
spatiotemporal correlations of the data may degrade the expected
privacy guarantee of DP.</p>
      <p>
        Example 1. Consider the scenario of spatiotemporal data
publishing illustrated in Figure 3. A trusted server
continuously collects users’ locations at each time point. Our goal is
to publish the aggregates shown in Table (d) while protecting
against adversaries who may have some knowledge regarding
membership in the database. We assume that each user
appears at only one location at most at each time point. Then,
according to the Laplace mechanism [12], adding Lap(1= )
noise2 to perturb the data can achieve -DP. However, from
auxiliary information such as road network constraints, an
attacker may know the mobility patterns of a targeted
victim; for example, the adversary may know that the victim
“always arrives at loc5 after visiting loc4,” as illustrated in
Figure 3(a), which leads to the patterns indicated by the solid
lines in Figure 3(c) and (d). Consequently, because of the
composability of DP, adding Lap(1= ) noise guarantees only
2 -DP against this attacker. We refer to the transition
pattern of a single user as temporal correlation. By contrast,
when an attacker has the following knowledge (illustrated in
Figure 3(b)), privacy leakage will also occur: (
        <xref ref-type="bibr" rid="ref1 ref11">1</xref>
        ) Users u1
and u2 are always at the same location during working hours
(e.g., they are colleagues). (2) Users u2 and u3 are always
at the same location during leisure time (e.g., they are
newlyweds). We refer to such geographical similarities between
users as spatial correlations. In Figure 3(c) and (d), it is
easy to see the resulting patterns, which are illustrated as
dashed lines. Therefore, because of the high sensitivity
induced by the highly correlated nature of the data, the addition
of Lap(1= ) noise achieves only 2 -DP.
2Lap(b) denotes a Laplace distribution with variance 2b2.
      </p>
    </sec>
    <sec id="sec-8">
      <title>4.2 Realistic Adversaries</title>
      <p>To formalize realistic adversaries (RAs) and their impact
on privacy leakage, we first study commonly used models
for describing temporal and spatial correlations as means of
expressing the prior knowledge of RAs. We then define a
new privacy model, ST -Differential Privacy ( ST -DP), to
account for RAs.</p>
      <p>Definition 5 (Temporal Correlations). The temporal
correlation of user i is described by a transition matrix Pi 2
Rjlocj jlocj, which represents Pr(lit 1jlit), where lit is the
location of user i at time t.</p>
      <p>Definition 6 (Spatial Correlations). Let xi denote
Gaussian random variables that represent the possible locations of
each user i 2 [1; n]. GMRF G, which we call the correlation
graph, describes the spatial correlations among x1; : : : ; xn.</p>
      <p>We define realistic adversaries in a comprehensive and
flexible manner such that various scenarios can be
represented.</p>
      <p>
        Definition 7 (Realistic Adversaries). The adversaries
targeting user i who possess various levels of prior knowledge,
denoted by Ri(Pi; Gi; m), are called the realistic adversaries
of that user. There are three basic types of realistic
adversaries: (
        <xref ref-type="bibr" rid="ref1 ref11">1</xref>
        ) Ri(Pi; ;; m), (2) Ri(;; Gi; m), and (3) Ri(Pi; Gi; m).
      </p>
      <p>Attack by realistic adversaries is Bayesian in nature [17].
Let DKt Dt represent the prior knowledge of such
adversaries, and let DUt be the unknown tuples, i.e., Dt =
DKt [ DUt [ flitg. The adversaries attempt to infer the
location of user i at time t. To this end, they first infer Dt
U
based on DKt and a guessed value of lit (or lit0, to represent
a different guess) and then attempt to distinguish the
difference between the two neighboring databases Dt and Dt0,
where Dt0 = DKt [ DUt [ flit0g.</p>
      <p>Definition 8 ( -DPST ). At each time t, a DP mechanism
Mt takes Dt as input and produces rt as output. The
privacy leakage of Mt against Ri(Pi; Gi; m) is defined as follows.</p>
      <p>P L(Ri; Mt) =de=f 8jDsKtupj=m log PPrr((rr11;;::::::;;rrttjjllitit0;;DDKtKt))</p>
      <p>PDt Pr(r1; : : : ; rtjDt) Pr(DUt jlit; Dt )
= 8jDsKtupj=m log PDUtUPr(r1; : : : ; rtjDt0) Pr(DUt jlit0; DKKt) (4)
Mt satisfies -DPST (i.e., DP under spatiotemporal
correlations) if, for all Ri; i 2 [1; n], it holds that P L(Ri; Mt) .</p>
    </sec>
    <sec id="sec-9">
      <title>4.3 Quantifying Privacy Leakage</title>
      <p>
        The primary challenge of protecting against realistic
adversaries is to finely quantify the privacy leakage, i.e.,
Equation (4). Because of space limitation, we briefly describe
a concept for how this can be achieved and present a
preliminary result. We analytically divide Equation (4) into
two parts, namely, the privacy leakages w.r.t. adversaries
of type (
        <xref ref-type="bibr" rid="ref1 ref11">1</xref>
        ) (in Definition 7) and those of type (2). The
corresponding problems of quantification can be translated
into inference on the GMRF (for type (
        <xref ref-type="bibr" rid="ref1 ref11">1</xref>
        )) and a
linearfactional programming problem (for type (2)). We then
analyze the combination of these problems, i.e., the privacy
leakage w.r.t. type (3).
      </p>
      <p>The result reveals that the privacy leakage of a DP
mechanism w.r.t. realistic adversaries may increase over time, as
shown in Example 2.</p>
      <p>Example 2. According to the Laplace mechanism,
traditionally, adding Lap(1=0:1) noise to published counts can
(a) Strong temporal corr.
(b) Moderate temporal corr.
(c) No temporal corr.
0.181 0.247 0.302 0.349 0.388 0.422 0.45 0.475 0.496</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>t=1</source>
          <volume>2 3 4 5 6 7 8 9 10 Figure 4</volume>
          :
          <article-title>Privacy leakage may increase over time. achieve 0:1-DP at each time point. However, in an extreme case, if a user's data at any two successive time points are correlated with probability 1, say</article-title>
          , Pa =
          <volume>10</volume>
          01 ,
          <article-title>then continual data publishing is equivalent to releasing the same data multiple times. Hence, the privacy leakage at each time point will accumulate with respect to previous time points, exhibiting a linear increase (Figure 4(a)). In another extreme case, if there is no temporal correlation, or a uniform correlation such as Pc = 00 11 , then the privacy leakage at each time point does not increase, as shown in Figure 4(c). Figure 4(b) depicts the privacy leakage induced by Pb = 00:8 01:2 , which can be finely calculated using our algorithm. 5. CONCLUSION</article-title>
          AND FUTURE WORK
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>In this research, we addressed two fundamental limitations of differential privacy by developing rigorous and flexible privacy models for the use of personal spatiotemporal data. An interesting future direction of research will be to extend our privacy models to other data types. Acknowledgments We appreciate the comments of the anonymous reviewers. This research is partially supported by the Center of Innovation Program of the Japan Science and Technology Agency, JST. 6</article-title>
          . REFERENCES [1]
          <string-name>
            <surname>Benjamin</surname>
            <given-names>C. M.</given-names>
          </string-name>
          <string-name>
            <surname>Fung</surname>
          </string-name>
          ,
          <string-name>
            <surname>Ke</surname>
            <given-names>Wang</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rui Chen</surname>
          </string-name>
          , and
          <string-name>
            <surname>Philip</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>ACM</given-names>
            <surname>Comput. Surv</surname>
          </string-name>
          .,
          <volume>42</volume>
          (
          <issue>4</issue>
          ):
          <volume>14</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          :
          <fpage>53</fpage>
          ,
          <year>2010</year>
          . [2]
          <string-name>
            <given-names>Latanya</given-names>
            <surname>Sweeney</surname>
          </string-name>
          .
          <article-title>K-anonymity: A model for protecting privacy</article-title>
          .
          <source>Int. J.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Uncertain. Fuzziness</given-names>
            <surname>Knowl</surname>
          </string-name>
          .
          <article-title>-Based Syst</article-title>
          .,
          <volume>10</volume>
          (
          <issue>5</issue>
          ):
          <fpage>557</fpage>
          -
          <lpage>570</lpage>
          ,
          <year>2002</year>
          . [3]
          <string-name>
            <given-names>Lars</given-names>
            <surname>Backstrom</surname>
          </string-name>
          , Cynthia Dwork, and
          <string-name>
            <given-names>Jon</given-names>
            <surname>Kleinberg</surname>
          </string-name>
          . Wherefore art thou
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>r3579x?: Anonymized social networks, hidden patterns, and structural</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>steganography. In WWW</surname>
          </string-name>
          , pages
          <fpage>181</fpage>
          -
          <lpage>190</lpage>
          ,
          <year>2007</year>
          . [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Narayanan</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Shmatikov. Robust</surname>
          </string-name>
          de-anonymization of large sparse
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>datasets. In S</surname>
          </string-name>
          &amp;P '08, pages
          <fpage>111</fpage>
          -
          <lpage>125</lpage>
          ,
          <year>2008</year>
          . [5]
          <string-name>
            <surname>Yves-Alexandre de Montjoye</surname>
          </string-name>
          ,
          <article-title>CÃľsar A</article-title>
          . Hidalgo, Michel Verleysen, and
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <source>mobility. Sci. Rep</source>
          .,
          <volume>3</volume>
          ,
          <year>2013</year>
          . [6]
          <string-name>
            <surname>Yves-Alexandre de Montjoye</surname>
          </string-name>
          , Laura Radaelli, Vivek Kumar Singh, and
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>reidentifiability of credit card metadata</article-title>
          .
          <source>Science</source>
          ,
          <volume>347</volume>
          (
          <issue>6221</issue>
          ):
          <fpage>536</fpage>
          -
          <lpage>539</lpage>
          ,
          <year>2015</year>
          . [7]
          <string-name>
            <given-names>Yan</given-names>
            <surname>Michalevsky</surname>
          </string-name>
          , Gabi Nakibly, Gunaa Arumugam Veerapandian, Dan
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <article-title>power analysis</article-title>
          .
          <source>In SEC</source>
          , pages
          <fpage>785</fpage>
          -
          <lpage>800</lpage>
          ,
          <year>2015</year>
          . [8]
          <string-name>
            <given-names>Cynthia</given-names>
            <surname>Dwork.</surname>
          </string-name>
          <article-title>Differential privacy</article-title>
          .
          <source>In ICALP</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          ,
          <year>2006</year>
          . [9]
          <string-name>
            <given-names>Ashwin</given-names>
            <surname>Machanavajjhala</surname>
          </string-name>
          , Daniel Kifer, Johannes Gehrke, and
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <fpage>3</fpage>
          -
          <lpage>es</lpage>
          ,
          <year>2007</year>
          . [10]
          <string-name>
            <given-names>Ninghui</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Tiancheng</given-names>
            <surname>Li</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Venkatasubramanian.</surname>
          </string-name>
          t-closeness:
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <article-title>Privacy beyond k-anonymity and l-diversity</article-title>
          .
          <source>In IEEE 23rd International</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>Conference on Data Engineering</source>
          ,
          <year>2007</year>
          .
          <source>ICDE</source>
          <year>2007</year>
          , pages
          <fpage>106</fpage>
          -
          <lpage>115</lpage>
          ,
          <year>2007</year>
          . [11]
          <string-name>
            <given-names>Xiaokui</given-names>
            <surname>Xiao</surname>
          </string-name>
          and
          <string-name>
            <given-names>Yufei</given-names>
            <surname>Tao</surname>
          </string-name>
          .
          <article-title>M-invariance: Towards privacy preserving</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <article-title>re-publication of dynamic datasets</article-title>
          .
          <source>In SIGMOD</source>
          , pages
          <fpage>689</fpage>
          -
          <lpage>700</lpage>
          ,
          <year>2007</year>
          . [12]
          <string-name>
            <surname>Cynthia</surname>
            <given-names>Dwork</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frank</surname>
            <given-names>McSherry</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Kobbi</given-names>
            <surname>Nissim</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Adam</given-names>
            <surname>Smith</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          265-
          <fpage>284</fpage>
          ,
          <year>2006</year>
          . [13]
          <string-name>
            <surname>Frank</surname>
            <given-names>McSherry</given-names>
          </string-name>
          and
          <string-name>
            <given-names>Kunal</given-names>
            <surname>Talwar</surname>
          </string-name>
          . Mechanism design via differential
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>privacy. In FOCS</surname>
          </string-name>
          , pages
          <fpage>94</fpage>
          -
          <lpage>103</lpage>
          ,
          <year>2007</year>
          . [14]
          <string-name>
            <given-names>Yang</given-names>
            <surname>Cao</surname>
          </string-name>
          and
          <string-name>
            <given-names>Masatoshi</given-names>
            <surname>Yoshikawa</surname>
          </string-name>
          .
          <article-title>Differentially private real-time data</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>E99-D(</surname>
          </string-name>
          1):
          <fpage>163</fpage>
          -
          <lpage>175</lpage>
          ,
          <year>2016</year>
          . [15]
          <string-name>
            <surname>Georgios</surname>
            <given-names>Kellaris</given-names>
          </string-name>
          , Stavros Papadopoulos, Xiaokui Xiao, and Dimitris
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>PVLDB</surname>
          </string-name>
          ,
          <volume>7</volume>
          (
          <issue>12</issue>
          ):
          <fpage>1155</fpage>
          -
          <lpage>1166</lpage>
          ,
          <year>2014</year>
          . [16]
          <string-name>
            <surname>Liyue</surname>
            <given-names>Fan</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Li</given-names>
            <surname>Xiong</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Vaidy</given-names>
            <surname>Sunderam</surname>
          </string-name>
          . FAST: differentially private
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>SIGMOD</surname>
          </string-name>
          , pages
          <fpage>1065</fpage>
          -
          <lpage>1068</lpage>
          ,
          <year>2013</year>
          . [17]
          <string-name>
            <given-names>Daniel</given-names>
            <surname>Kifer</surname>
          </string-name>
          and
          <string-name>
            <given-names>Ashwin</given-names>
            <surname>Machanavajjhala</surname>
          </string-name>
          .
          <article-title>Pufferfish: A framework for</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>