Related Work
In generic privacy preserving mechanism protection methods, models and matrices are used. Protection methods are divided into cryptographic methods, non-perturbative methods and perturbative methods. Many privacy preserving models have been used to generate the privacy protocols and encrypted schemes. These models are k-anonymity, t-closeness, i-diversity and e-differential.
Privacy matrices and utility matrices are used to measure the level of provided privacy.[6]