A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods
Source: University of Maryland
The authors focus primarily on the use of additive and matrix multiplicative data perturbation techniques in Privacy Preserving Data Mining (PPDM). They survey a recent body of research aimed at better understanding the vulnerabilities of these techniques. These researchers assumed the role of an attacker and developed methods for estimating the original data from the perturbed data and any available prior knowledge. Finally, the authors briefly discuss research aimed at attacking k-anonymization, another data perturbation technique in PPDM.