Privacy by Fake Data: A Geometric Approach

نویسندگان

  • Victor Alvarez
  • Erin W. Chambers
  • László Kozma
چکیده

We study the following algorithmic problem: given n points within a finite d-dimensional box, what is the smallest number of extra points that need to be added, to ensure that every d-dimensional unit box is either empty, or contains at least k points. We motivate the problem through a possible application to data privacy. We show that minimizing the number of extra points to be added is strongly NP-complete, but admits a Polynomial Time Approximation Scheme (PTAS). In some sense, this is the best we can hope for, since a Fully Polynomial Time Approximation Scheme (FPTAS) is not possible, unless P=NP.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection of Fake Accounts in Social Networks Based on One Class Classification

Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ similarities considering the network communications of the users. In the first step, similarity ...

متن کامل

Privacy through Fake yet Semantically Real Traces

Camouflaging data by generating fake information is a wellknown obfuscation technique for protecting data privacy. The effectiveness of this technique in protecting users’ privacy highly depends on the resemblance of fake information to reality, such that an adversary cannot easily filter such fake information out. In this paper, we focus on a very sensitive and increasingly exposed type of dat...

متن کامل

Security for Source Node Privacy in Wireless Sensor Network

Source location privacy is one of the most challenging topics in security WSN. Wireless Sensor Networks have been widely used in many areas for various infrastructure monitoring, tracking and information collection. We are generated more fake node, fake packet and to create anonymity node for source location privacy. They are providing privacy to the event detecting, tracking sensor node and in...

متن کامل

Identifying Fake Profiles in LinkedIn

Social networks have become an everyday tool in our lives and different social networks have different target groups. Among them LinkedIn is greatly preferred by the people who are in the professional occupations. With the rapid growth of social networks, people tend to misuse them for unethical and illegal conducts. Creation of a fake profile becomes such adversary effect which is difficult to...

متن کامل

A Novel Query Obfuscation Scheme with User Controlled Privacy and Personalization

Web Search Engines are tools that help users find information. These search engines use the information provided by users, in terms of their search history to build their “user profiles”. Rich user profiles enable the search engines to provide better personalized search results. However, this puts the user’s privacy at risk. Apart from the risk of exposing one’s identity, there is the added dis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013