Review Article

[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

Table 7

The summary of data anonymization techniques.

MethodReferencesOperations supportedUsabilityPrivacy

Swapping[99101]Research and application testingApplicable for any type of attributes
Noise addition[102]Research and application testingUsed for the numerical data setDifferential privacy
Microaggregation[103105]Research and application testingUsed for categorical attributes and numerical data sets-Anonymity. -Diversity. -Closeness
Pseudonymization[106]Research and application testingUsed for the numerical data set
Bucketization[108]Research and application testingUsed for categorical attributes and numerical data setsSegmentation
Slicing[109]Research and application testingUsed for categorical attributesClustering
Sampling[110]Research and application testingLarge utility loss
Generalization[111]Research and application testingGranularity and utility loss-Anonymity. -Diversity. -Closeness