8 Privacy-preserving data management and operations
This chapter covers
- Widely used privacy models for data publishing
- Privacy threats and vulnerabilities in database systems
- Discovering privacy protection strategies in database management systems
- Database design considerations for implementing a privacy-preserving database system
In the previous chapter we discussed different privacy-enhancing techniques that can be utilized in data mining operations and how to implement the k-anonymity privacy model. In this chapter we’ll explore another set of privacy models that the research community has proposed to mitigate the flaws in the k-anonymity model. Toward the end of this chapter, we’ll discuss the recent evolution of data management techniques, ...
Get Privacy-Preserving Machine Learning now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.