Related Work
In generic privacy preserving mechanism protection methods, models and
matrices are used. Protection methods are divided into cryptographic
methods, non-perturbative methods and perturbative methods. Many privacy
preserving models have been used to generate the privacy protocols and
encrypted schemes. These models are k-anonymity, t-closeness,
i-diversity and e-differential.
Privacy matrices and utility matrices are used to measure the level of
provided privacy.[6]