I. Introduction
Smartphones, wearable gadgets, and distributed wireless sensors usually generate huge volumes of privacy-sensitive data. In many cases, service providers are interested in mining information from these data to provide personalized services, for example, to make more relevant recommendations to clients. However, the clients are usually not willing to allow the service provider to access the data for privacy reasons.