ABSTRACT

In this chapter, we examine some representative anonymization algorithms. Refer to Tables 5.1, 5.2, 5.3, and 5.4 for a characterization based on privacy model (Chapter 2), anonymization operation (Chapter 3), and information metric (Chapter 4). Our presentation of algorithms is organized according to linkage models. Finally, we discuss the potential privacy threats even though a data table has been anonymized.