Skip to main content
. Author manuscript; available in PMC: 2017 Sep 5.
Published in final edited form as: Proc Int Conf Data Eng. 2017 May 18;2017:821–832. doi: 10.1109/ICDE.2017.132

TABLE I.

Summary of Notations.

U The set of users in the database
i The i-th user where i ∈ [1, |U|]
loc Value domain {loc1, …, locn} of all user’s data
lit,lit
The data of user i at time t, litloc, litlit
Dt The database at time t, Dt={l1t,,lnt}
t Differentially private mechanism over Dt
rt Differentially private output at time t
Ai The adversary who targets user i, considered in traditional DP
AiT
Adversary Ai with additional knowledge of temporal correlations
PiB
Transition matrix that represents Pr(lit1|lit), i.e., backward temporal correlation, known to AiT
PiF
Transition matrix that represents Pr(lit|lit1), i.e., forward temporal correlation, known to AiT
DKt
The subset of database Dt{lit}, known to AiT