فهرست مطالب
Preface
Acknowledgments
Introduction
Privacy-Preserving Spatial Transformations
Two-Tier Spatial Transformations
Three-Tier Spatial Transformations
Discussion
Cryptographic Approaches
A Primer on Computational PIR
Spatial Queries with PIR
Protocols for Approximate and Exact NN with PIR
Comparison with Geometric Transformations
Hybrid Approaches
Privacy Model
System Overview
Private Evaluation of Point-Rectangle Enclosure
Private Evaluation of Point-Convex-Polygon Enclosure
Private Matching of Spatial Datasets
Problem Formulation
Dataset Mapping
Join Processing
Enhancing Privacy by Use of Chebyshev Distance
Trajectory Anonymization
Publishing Independent Location Samples
Publishing Individual Trajectories
Differentially Private Publication of Spatial Datasets
A Primer on Differential Privacy
Publication of Static Datasets of Locations
Data-Independent Decompositions: Quad-trees
Data-Dependent Decompositions: kd-trees
Publication of Trajectory Datasets
Conclusions
Bibliography
Author\'s Biography
Acknowledgments
Introduction
Privacy-Preserving Spatial Transformations
Two-Tier Spatial Transformations
Three-Tier Spatial Transformations
Discussion
Cryptographic Approaches
A Primer on Computational PIR
Spatial Queries with PIR
Protocols for Approximate and Exact NN with PIR
Comparison with Geometric Transformations
Hybrid Approaches
Privacy Model
System Overview
Private Evaluation of Point-Rectangle Enclosure
Private Evaluation of Point-Convex-Polygon Enclosure
Private Matching of Spatial Datasets
Problem Formulation
Dataset Mapping
Join Processing
Enhancing Privacy by Use of Chebyshev Distance
Trajectory Anonymization
Publishing Independent Location Samples
Publishing Individual Trajectories
Differentially Private Publication of Spatial Datasets
A Primer on Differential Privacy
Publication of Static Datasets of Locations
Data-Independent Decompositions: Quad-trees
Data-Dependent Decompositions: kd-trees
Publication of Trajectory Datasets
Conclusions
Bibliography
Author\'s Biography