8 Privacy-preserving data management and operations
This chapter covers
- Widely used privacy models
- Introducing privacy threats and vulnerabilities in database systems
- Discovering the privacy protection strategies in database management systems
- Database design considerations when implementing a privacy-preserving database system
In the previous chapter, we discussed different privacy-enhancing techniques that can be utilized in data mining operations and how to implement the k-anonymity privacy model in practice. In this chapter, we are going to explore a set of other privacy models that the research community has proposed in terms of mitigating the flaws in the k-anonymity model. Towards the end of this chapter, we will be discussing the evolution of data management techniques over the recent past and how these privacy mechanisms can be instrumented in database systems more toward the practical deployment of designing a tailormade privacy enriched database management system.

We are now at the eighth chapter of this book. This is the second part of the privacy-preserving data mining and management techniques. Let’s continue our discussion on other privacy models and how to implement them in practice. Towards the end of this chapter, we will be looking at design considerations for a privacy-preserving database system to protect data privacy while processing and managing data for data mining applications.