From: Differential privacy: its technological prescriptive using big data
Name | Approach | Protects from adversial | Focus |
---|---|---|---|
HybrEx [44] | Data separation | Cloud | Only does partitioning as a measure to handle privacy Does not deal with key generation in map phase Does not deal with adversarial users |
EPiC [45] | Homomorphic encryption | Cloud | User does not trust cloud infrastructure Supports counting operation only Purpose specific |
Secret sharing | User and cloud | Cost overhead | |
Airavat [22] | MAC + differential privacy | User | Full trust on cloud providers Cannot guarantee privacy for calculations which output keys created by untrusted mappers |