8 Privacy-preserving data management and operations

This chapter covers

  • Widely used privacy models for data publishing
  • Privacy threats and vulnerabilities in database systems
  • Discovering privacy protection strategies in database management systems
  • Database design considerations for implementing a privacy-preserving database system

In the previous chapter we discussed different privacy-enhancing techniques that can be utilized in data mining operations and how to implement the k-anonymity privacy model. In this chapter we’ll explore another set of privacy models that the research community has proposed to mitigate the flaws in the k-anonymity model. Toward the end of this chapter, we’ll discuss the recent evolution of data management techniques, ...

Get Privacy-Preserving Machine Learning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.