ABSTRACT

Threat modeling helps in identifying possible threats to the system. Identifying threats is key to building an appropriate protection mechanism. So, what are the possible threats and where are the vulnerabilities in an enterprise’s anonymization design? Anonymized data sets are released by an enterprise as test data or for purposes such as analysis and knowledge discovery. Is it possible to identify the record owner and his or her sensitive data? Threat models include a broad range of de-anonymization attacks.