Skip to main content

Showing 1–10 of 10 results for author: von Voigt, S N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.13153  [pdf, ps, other

    cs.DC cs.CR cs.SE

    Prink: $k_s$-Anonymization for Streaming Data in Apache Flink

    Authors: Philip Groneberg, Saskia Nuñez von Voigt, Thomas Janke, Louis Loechel, Karl Wolf, Elias Grünewald, Frank Pallas

    Abstract: In this paper, we present Prink, a novel and practically applicable concept and fully implemented prototype for ks-anonymizing data streams in real-world application architectures. Building upon the pre-existing, yet rudimentary CASTLE scheme, Prink for the first time introduces semantics-aware ks-anonymization of non-numerical (such as categorical or hierarchically generalizable) streaming data i… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

    Comments: accepted for ARES 2025

  2. arXiv:2407.04084  [pdf, other

    cs.CR

    An applied Perspective: Estimating the Differential Identifiability Risk of an Exemplary SOEP Data Set

    Authors: Jonas Allmann, Saskia Nuñez von Voigt, Florian Tschorsch

    Abstract: Using real-world study data usually requires contractual agreements where research results may only be published in anonymized form. Requiring formal privacy guarantees, such as differential privacy, could be helpful for data-driven projects to comply with data protection. However, deploying differential privacy in consumer use cases raises the need to explain its underlying mechanisms and the res… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: Accepted on IWPE 2024

  3. arXiv:2404.04006  [pdf, other

    cs.CR cs.HC

    From Theory to Comprehension: A Comparative Study of Differential Privacy and $k$-Anonymity

    Authors: Saskia Nuñez von Voigt, Luise Mehner, Florian Tschorsch

    Abstract: The notion of $\varepsilon$-differential privacy is a widely used concept of providing quantifiable privacy to individuals. However, it is unclear how to explain the level of privacy protection provided by a differential privacy mechanism with a set $\varepsilon$. In this study, we focus on users' comprehension of the privacy protection provided by a differential privacy mechanism. To do so, we st… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: Accepted to ACM CODASPY'24, 19-21 June 2024, Porto, Portugal

  4. Towards Standardized Mobility Reports with User-Level Privacy

    Authors: Alexandra Kapp, Saskia Nuñez von Voigt, Helena Mihaljević, Florian Tschorsch

    Abstract: The importance of human mobility analyses is growing in both research and practice, especially as applications for urban planning and mobility rely on them. Aggregate statistics and visualizations play an essential role as building blocks of data explorations and summary reports, the latter being increasingly released to third parties such as municipal administrations or in the context of citizen… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Journal ref: Journal of Location Based Services, 2022

  5. "Am I Private and If So, how Many?" - Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats

    Authors: Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn

    Abstract: Decisions about sharing personal information are not trivial, since there are many legitimate and important purposes for such data collection, but often the collected data can reveal sensitive information about individuals. Privacy-preserving technologies, such as differential privacy (DP), can be employed to protect the privacy of individuals and, furthermore, provide mathematically sound guarant… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: Accepted to ACM CCS 2022. arXiv admin note: substantial text overlap with arXiv:2204.04061

  6. arXiv:2204.04061   

    cs.HC cs.CY

    "Am I Private and If So, how Many?" -- Using Risk Communication Formats for Making Differential Privacy Understandable

    Authors: Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn

    Abstract: Mobility data is essential for cities and communities to identify areas for necessary improvement. Data collected by mobility providers already contains all the information necessary, but privacy of the individuals needs to be preserved. Differential privacy (DP) defines a mathematical property which guarantees that certain limits of privacy are preserved while sharing such data, but its functiona… ▽ More

    Submitted 22 June, 2023; v1 submitted 8 April, 2022; originally announced April 2022.

    Comments: A newer version of this article was submitted: arXiv.2208.10820

  7. Self-Determined Reciprocal Recommender System with Strong Privacy Guarantees

    Authors: S. Nuñez von Voigt, E. Daniel, F. Tschorsch

    Abstract: Recommender systems are widely used. Usually, recommender systems are based on a centralized client-server architecture. However, this approach implies drawbacks regarding the privacy of users. In this paper, we propose a distributed reciprocal recommender system with strong, self-determined privacy guarantees, i.e., local differential privacy. More precisely, users randomize their profiles locall… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

    Comments: Accepted at The 16th International Conference on Availability, Reliability and Security (ARES 2021)

  8. arXiv:2106.00388  [pdf, ps, other

    cs.CR cs.DB

    Privacy and Confidentiality in Process Mining -- Threats and Research Challenges

    Authors: Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Mohammadreza Fani Sani, Agnes Koschmider, Felix Mannhardt, Saskia Nuñez von Voigt, Majid Rafiei, Leopold von Waldthausen

    Abstract: Privacy and confidentiality are very important prerequisites for applying process mining in order to comply with regulations and keep company secrets. This paper provides a foundation for future research on privacy-preserving and confidential process mining techniques. Main threats are identified and related to an motivation application scenario in a hospital context as well as to the current body… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in ACM Transactions on Management Information Systems

  9. Every Query Counts: Analyzing the Privacy Loss of Exploratory Data Analyses

    Authors: Saskia Nuñez von Voigt, Mira Pauli, Johanna Reichert, Florian Tschorsch

    Abstract: An exploratory data analysis is an essential step for every data analyst to gain insights, evaluate data quality and (if required) select a machine learning model for further processing. While privacy-preserving machine learning is on the rise, more often than not this initial analysis is not counted towards the privacy budget. In this paper, we quantify the privacy loss for basic statistical func… ▽ More

    Submitted 27 August, 2020; originally announced August 2020.

    Comments: Accepted Paper for DPM 2020 co-located ESORICS 2020

  10. Quantifying the Re-identification Risk of Event Logs for Process Mining

    Authors: S. Nuñez von Voigt, S. A. Fahrenkrog-Petersen, D. Janssen, A. Koschmider, F. Tschorsch, F. Mannhardt, O. Landsiedel, M. Weidlich

    Abstract: Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through back… ▽ More

    Submitted 19 June, 2020; v1 submitted 24 March, 2020; originally announced March 2020.

    Comments: Accepted to CAiSE-2020

    Journal ref: CAiSE 2020: Advanced Information Systems Engineering pp 252-267