ABSTRACT
Physical distancing between individuals is key to preventing the spread of a disease such as COVID-19. On the one hand, having access to information about physical interactions is critical for decision makers; on the other, this information is sensitive and can be used to track individuals. In this work, we design Poirot, a system to collect aggregate statistics about physical interactions in a privacy-preserving manner. We show a preliminary evaluation of our system that demonstrates the scalability of our approach even while maintaining strong privacy guarantees.
- Kimon Drakopoulos. 2020. The Logic Around Contact Tracing Apps Is All Wrong. https://www.wired.com/story/opinion-the-logic-around-contact-tracing-apps-is-all-wrong/.Google Scholar
- Gabriel Kaptchuk, Daniel G. Goldstein, Eszter Hargittai, Jake M. Hofman, and Elissa M. Redmiles. 2020. How good is good enough for COVID19 apps? https://arxiv.org/pdf/2005.04343.pdf.Google Scholar
Index Terms
Poirot: private contact summary aggregation: poster abstract
Recommendations
A differentially private algorithm for location data release
The rise of mobile technologies in recent years has led to large volumes of location information, which are valuable resources for knowledge discovery such as travel patterns mining and traffic analysis. However, location dataset has been confronted ...
Evaluating differentially private decision tree model over model inversion attack
AbstractMachine learning techniques have been widely used and shown remarkable performance in various fields. Along with the widespread utilization of machine learning, concerns about privacy violations have been raised. Recently, as privacy invasion ...
A semantic-preserving differentially private method for releasing query logs
Highlights- We discuss the challenges and particularities of privacy-preserving releases of query logs.
AbstractQuery logs are of great interest for data analysis. They allow characterizing user profiles, user behaviors and search habits. However, since query logs usually contain personal information, data controllers should implement ...





Comments