{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:11:39Z","timestamp":1766733099607,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,27]]},"DOI":"10.1145\/3583678.3596889","type":"proceedings-article","created":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T20:21:36Z","timestamp":1687810896000},"page":"61-67","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["No One Size (PPM) Fits All: Towards Privacy in Stream Processing Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9697-0359","authenticated-orcid":false,"given":"Mikhail","family":"Fomichev","sequence":"first","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3788-6664","authenticated-orcid":false,"given":"Manisha","family":"Luthra","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"},{"name":"DFKI, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3541-8787","authenticated-orcid":false,"given":"Maik","family":"Benndorf","sequence":"additional","affiliation":[{"name":"University of Oslo, Oslo, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9944-926X","authenticated-orcid":false,"given":"Pratyush","family":"Agnihotri","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"PRIVIC: A Privacy-preserving Method for Incremental Collection of Location Data. arXiv preprint arXiv:2206.10525","author":"Biswas Sayan","year":"2022","unstructured":"Sayan Biswas and Catuscia Palamidessi . 2022 . PRIVIC: A Privacy-preserving Method for Incremental Collection of Location Data. arXiv preprint arXiv:2206.10525 (2022). Sayan Biswas and Catuscia Palamidessi. 2022. PRIVIC: A Privacy-preserving Method for Incremental Collection of Location Data. arXiv preprint arXiv:2206.10525 (2022)."},{"key":"e_1_3_2_1_2_1","unstructured":"Cara Bloom. 2022. Privacy Threat Modeling. https:\/\/www.usenix.org\/conference\/pepr22\/presentation\/bloom.  Cara Bloom. 2022. Privacy Threat Modeling. https:\/\/www.usenix.org\/conference\/pepr22\/presentation\/bloom."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation. 835--850","author":"Burkhalter Lukas","year":"2020","unstructured":"Lukas Burkhalter , Anwar Hithnawi , Alexander Viand , Hossein Shafagh , and Sylvia Ratnasamy . 2020 . TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control . In Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation. 835--850 . Lukas Burkhalter, Anwar Hithnawi, Alexander Viand, Hossein Shafagh, and Sylvia Ratnasamy. 2020. TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control. In Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation. 835--850."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TDSC.2009.47","article-title":"Castle: Continuously Anonymizing Data Streams","volume":"8","author":"Cao Jianneng","year":"2010","unstructured":"Jianneng Cao , Barbara Carminati , Elena Ferrari , and Kian-Lee Tan . 2010 . Castle: Continuously Anonymizing Data Streams . IEEE Transactions on Dependable and Secure Computing 8 , 3 (2010), 337 -- 352 . Jianneng Cao, Barbara Carminati, Elena Ferrari, and Kian-Lee Tan. 2010. Castle: Continuously Anonymizing Data Streams. IEEE Transactions on Dependable and Secure Computing 8, 3 (2010), 337--352.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134102"},{"key":"e_1_3_2_1_6_1","volume-title":"2017 18th IEEE International Conference on Mobile Data Management (MDM). 30--39","author":"Dwarakanath Rahul","year":"2017","unstructured":"Rahul Dwarakanath , Boris Koldehofe , Yashas Bharadwaj , The An Binh Nguyen , David Eyers , and Ralf Steinmetz . 2017 . TrustCEP: Adopting a Trust-based Approach for Distributed Complex Event Processing . In 2017 18th IEEE International Conference on Mobile Data Management (MDM). 30--39 . Rahul Dwarakanath, Boris Koldehofe, Yashas Bharadwaj, The An Binh Nguyen, David Eyers, and Ralf Steinmetz. 2017. TrustCEP: Adopting a Trust-based Approach for Distributed Complex Event Processing. In 2017 18th IEEE International Conference on Mobile Data Management (MDM). 30--39."},{"key":"e_1_3_2_1_7_1","volume-title":"Pier Luigi Dragotti, and Deniz Gunduz","author":"Erdemir Ecenaz","year":"2022","unstructured":"Ecenaz Erdemir , Pier Luigi Dragotti, and Deniz Gunduz . 2022 . Active Privacy-Utility Trade-off Against Inference in Time-Series Data Sharing . arXiv preprint arXiv:2202.05833 (2022). Ecenaz Erdemir, Pier Luigi Dragotti, and Deniz Gunduz. 2022. Active Privacy-Utility Trade-off Against Inference in Time-Series Data Sharing. arXiv preprint arXiv:2202.05833 (2022)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11583"},{"key":"e_1_3_2_1_9_1","volume-title":"Differential Privacy for Protecting Private Patterns in Data Streams. arXiv preprint arXiv:2305.06105","author":"Gu He","year":"2023","unstructured":"He Gu , Thomas Plagemann , Maik Benndorf , Vera Goebel , and Boris Koldehofe . 2023. Differential Privacy for Protecting Private Patterns in Data Streams. arXiv preprint arXiv:2305.06105 ( 2023 ). He Gu, Thomas Plagemann, Maik Benndorf, Vera Goebel, and Boris Koldehofe. 2023. Differential Privacy for Protecting Private Patterns in Data Streams. arXiv preprint arXiv:2305.06105 (2023)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.03.007"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the International Conference on Internet-of-Things Design and Implementation. 40--52","author":"Hajihassnai Omid","year":"2021","unstructured":"Omid Hajihassnai , Omid Ardakanian , and Hamzeh Khazaei . 2021 . ObscureNet: Learning Attribute-invariant Latent Representation for Anonymizing Sensor Data . In Proceedings of the International Conference on Internet-of-Things Design and Implementation. 40--52 . Omid Hajihassnai, Omid Ardakanian, and Hamzeh Khazaei. 2021. ObscureNet: Learning Attribute-invariant Latent Representation for Anonymizing Sensor Data. In Proceedings of the International Conference on Internet-of-Things Design and Implementation. 40--52."},{"key":"e_1_3_2_1_12_1","unstructured":"IBM Corporation. 2023. Query Rewrite. https:\/\/www.ibm.com\/docs\/en\/guardium\/11.2?topic=protect-query-rewrite.  IBM Corporation. 2023. Query Rewrite. https:\/\/www.ibm.com\/docs\/en\/guardium\/11.2?topic=protect-query-rewrite."},{"key":"e_1_3_2_1_13_1","volume-title":"Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes. In CHI Conference on Human Factors in Computing Systems. 1--19","author":"Jin Haojian","year":"2022","unstructured":"Haojian Jin , Boyuan Guo , Rituparna Roychoudhury , Yaxing Yao , Swarun Kumar , Yuvraj Agarwal , and Jason I Hong . 2022 . Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes. In CHI Conference on Human Factors in Computing Systems. 1--19 . Haojian Jin, Boyuan Guo, Rituparna Roychoudhury, Yaxing Yao, Swarun Kumar, Yuvraj Agarwal, and Jason I Hong. 2022. Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes. In CHI Conference on Human Factors in Computing Systems. 1--19."},{"key":"e_1_3_2_1_14_1","volume-title":"Chorus: A Programming Framework for Building Scalable Differential Privacy Mechanisms. In 2020 IEEE European Symposium on Security and Privacy (EuroS&P). 535--551","author":"Johnson Noah","year":"2020","unstructured":"Noah Johnson , Joseph P Near , Joseph M Hellerstein , and Dawn Song . 2020 . Chorus: A Programming Framework for Building Scalable Differential Privacy Mechanisms. In 2020 IEEE European Symposium on Security and Privacy (EuroS&P). 535--551 . Noah Johnson, Joseph P Near, Joseph M Hellerstein, and Dawn Song. 2020. Chorus: A Programming Framework for Building Scalable Differential Privacy Mechanisms. In 2020 IEEE European Symposium on Security and Privacy (EuroS&P). 535--551."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2021.05.003"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2896115"},{"key":"e_1_3_2_1_17_1","volume-title":"A Survey. ACM computing surveys (CSUR) 49, 2","author":"Onica Emanuel","year":"2016","unstructured":"Emanuel Onica , Pascal Felber , Hugues Mercier , and Etienne Rivi\u00e8re . 2016. Confidentiality-preserving Publish\/Subscribe : A Survey. ACM computing surveys (CSUR) 49, 2 ( 2016 ), 1--43. Emanuel Onica, Pascal Felber, Hugues Mercier, and Etienne Rivi\u00e8re. 2016. Confidentiality-preserving Publish\/Subscribe: A Survey. ACM computing surveys (CSUR) 49, 2 (2016), 1--43."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210284.3210296"},{"key":"e_1_3_2_1_19_1","volume-title":"Towards Privacy Engineering for Real-time Analytics in the Human-centered Internet of Things. arXiv preprint arXiv:2210.16352","author":"Plagemann Thomas","year":"2022","unstructured":"Thomas Plagemann , Vera Goebel , Matthias Hollick , and Boris Koldehofe . 2022. Towards Privacy Engineering for Real-time Analytics in the Human-centered Internet of Things. arXiv preprint arXiv:2210.16352 ( 2022 ). Thomas Plagemann, Vera Goebel, Matthias Hollick, and Boris Koldehofe. 2022. Towards Privacy Engineering for Real-time Analytics in the Human-centered Internet of Things. arXiv preprint arXiv:2210.16352 (2022)."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference. 659--672","author":"Quoc Do Le","year":"2017","unstructured":"Do Le Quoc , Martin Beck , Pramod Bhatotia , Ruichuan Chen , Christof Fetzer , and Thorsten Strufe . 2017 . PrivApprox: Privacy-Preserving Stream Analytics . In Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference. 659--672 . Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, and Thorsten Strufe. 2017. PrivApprox: Privacy-Preserving Stream Analytics. In Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference. 659--672."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3526190"},{"key":"e_1_3_2_1_22_1","volume-title":"CoRA: Collaborative Risk-aware Authentication. Cryptology ePrint Archive","author":"Salajegheh Mastooreh","year":"2022","unstructured":"Mastooreh Salajegheh , Shashank Agrawal , Maliheh Shirvanian , Mihai Christodorescu , and Payman Mohassel . 2022. CoRA: Collaborative Risk-aware Authentication. Cryptology ePrint Archive ( 2022 ). Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu, and Payman Mohassel. 2022. CoRA: Collaborative Risk-aware Authentication. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. ACM Program. Lang. 3, OOPSLA","author":"Salvaneschi Guido","year":"2019","unstructured":"Guido Salvaneschi , Mirko K\u00f6hler , Daniel Sokolowski , Philipp Haller , Sebastian Erdweg , and Mira Mezini . 2019 . Language-integrated Privacy-aware Distributed Queries . Proc. ACM Program. Lang. 3, OOPSLA (2019), 167--1. Guido Salvaneschi, Mirko K\u00f6hler, Daniel Sokolowski, Philipp Haller, Sebastian Erdweg, and Mira Mezini. 2019. Language-integrated Privacy-aware Distributed Queries. Proc. ACM Program. Lang. 3, OOPSLA (2019), 167--1."},{"key":"e_1_3_2_1_24_1","volume-title":"End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs. arXiv preprint arXiv:2206.01041","author":"Scopelliti Gianluca","year":"2022","unstructured":"Gianluca Scopelliti , Sepideh Pouyanrad , Job Noorman , Fritz Alder , Christoph Baumann , Frank Piessens , and Jan Tobias M\u00fchlberg . 2022. End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs. arXiv preprint arXiv:2206.01041 ( 2022 ). Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, and Jan Tobias M\u00fchlberg. 2022. End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs. arXiv preprint arXiv:2206.01041 (2022)."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 35th Annual ACM Symposium on Applied Computing. 1272--1279","author":"Stach Christoph","year":"2020","unstructured":"Christoph Stach , Cl\u00e9mentine Gritti , and Bernhard Mitschang . 2020 . Bringing Privacy Control Back to Citizens: DISPEL---A Distributed Privacy Management Platform for the Internet of Things . In Proceedings of the 35th Annual ACM Symposium on Applied Computing. 1272--1279 . Christoph Stach, Cl\u00e9mentine Gritti, and Bernhard Mitschang. 2020. Bringing Privacy Control Back to Citizens: DISPEL---A Distributed Privacy Management Platform for the Internet of Things. In Proceedings of the 35th Annual ACM Symposium on Applied Computing. 1272--1279."},{"key":"e_1_3_2_1_26_1","volume-title":"On-body Localization of Wearable Devices: An Investigation of Position-aware Activity Recognition. In 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). 1--9.","author":"Sztyler Timo","year":"2016","unstructured":"Timo Sztyler and Heiner Stuckenschmidt . 2016 . On-body Localization of Wearable Devices: An Investigation of Position-aware Activity Recognition. In 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). 1--9. Timo Sztyler and Heiner Stuckenschmidt. 2016. On-body Localization of Wearable Devices: An Investigation of Position-aware Activity Recognition. In 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). 1--9."},{"key":"e_1_3_2_1_27_1","volume-title":"Swellfish Privacy: Supporting Time-dependent Relevance for Continuous Differential Privacy. Information Systems","author":"Tex Christine","year":"2022","unstructured":"Christine Tex , Martin Sch\u00e4ler , and Klemens B\u00f6hm . 2022 . Swellfish Privacy: Supporting Time-dependent Relevance for Continuous Differential Privacy. Information Systems (2022), 102079. Christine Tex, Martin Sch\u00e4ler, and Klemens B\u00f6hm. 2022. Swellfish Privacy: Supporting Time-dependent Relevance for Continuous Differential Privacy. Information Systems (2022), 102079."},{"key":"e_1_3_2_1_28_1","volume-title":"Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning. arXiv preprint arXiv:2209.12046","author":"Yang Xin","year":"2022","unstructured":"Xin Yang and Omid Ardakanian . 2022 . Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning. arXiv preprint arXiv:2209.12046 (2022). Xin Yang and Omid Ardakanian. 2022. Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning. arXiv preprint arXiv:2209.12046 (2022)."},{"key":"e_1_3_2_1_29_1","volume-title":"The NebulaStream Platform for Data and Application Management in the Internet of Things. In 10th Conference on Innovative Data Systems Research, CIDR","author":"Zeuch Steffen","year":"2020","unstructured":"Steffen Zeuch , Ankit Chaudhary , Bonaventura Del Monte , Haralampos Gavriilidis , Dimitrios Giouroukis , Philipp M Grulich , Sebastian Bre\u00df , Jonas Traub , and Volker Markl . 2020 . The NebulaStream Platform for Data and Application Management in the Internet of Things. In 10th Conference on Innovative Data Systems Research, CIDR 2020. Steffen Zeuch, Ankit Chaudhary, Bonaventura Del Monte, Haralampos Gavriilidis, Dimitrios Giouroukis, Philipp M Grulich, Sebastian Bre\u00df, Jonas Traub, and Volker Markl. 2020. The NebulaStream Platform for Data and Application Management in the Internet of Things. In 10th Conference on Innovative Data Systems Research, CIDR 2020."}],"event":{"name":"DEBS '23: 17th ACM International Conference on Distributed and Event-based Systems","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Neuchatel Switzerland","acronym":"DEBS '23"},"container-title":["Proceedings of the 17th ACM International Conference on Distributed and Event-based Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583678.3596889","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:55Z","timestamp":1750178275000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583678.3596889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,27]]},"references-count":29,"alternative-id":["10.1145\/3583678.3596889","10.1145\/3583678"],"URL":"https:\/\/doi.org\/10.1145\/3583678.3596889","relation":{},"subject":[],"published":{"date-parts":[[2023,6,27]]},"assertion":[{"value":"2023-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}