Chapter 7. Privacy in Databases

Learning Objectives

After studying this chapter, you should be able to:

  • Explain the difference between summary tables and microdata tables

  • Understand the concept of re-identification

  • Present an overview of the types of re-identification attacks

  • Explain the difference between anonymization and de-identification

  • Discuss the importance of quasi-identifiers and how they pose a threat to privacy

  • List and explain the basic techniques for privacy-preserving data publishing

  • Explain and illustrate the concept of k-anonymity

  • Discuss approaches to protecting frequency tables

  • Discuss approaches to protecting magnitude tables

  • Understand the nature of the privacy threat to queryable databases

  • Discuss approaches to query restriction ...

Get Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.