chapter nine
9 Privacy-preserving data mining and management techniques (Part-2)
This chapter covers
- Widely used privacy models and their characteristics in data mining operations when processing and publishing data
- Privacy threats and vulnerabilities in database systems
- Use of privacy protection in today’s database management systems
- Applying database design considerations and artifacts toward implementing privacy-preserving database system in practice
In the previous chapter, we discussed different privacy enhancing techniques that can be utilized in data mining operations and how to implement k-anonymity privacy model in practice. In this chapter, we are going to explore a set of other privacy models that have been proposed by the research community in terms of mitigating the flaws in k-anonymity model. Towards the end of this chapter, we will be discussing the evolution of data management techniques over the recent past and how these privacy mechanisms can be instrumented in database systems more toward the practical deployment designing a tailormade privacy enriched database management system.