Review Article
[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
Table 7
The summary of data anonymization techniques.
| Method | References | Operations supported | Usability | Privacy |
| Swapping | [99–101] | Research and application testing | Applicable for any type of attributes | | Noise addition | [102] | Research and application testing | Used for the numerical data set | Differential privacy | Microaggregation | [103–105] | Research and application testing | Used for categorical attributes and numerical data sets | -Anonymity. -Diversity. -Closeness | Pseudonymization | [106] | Research and application testing | Used for the numerical data set | | Bucketization | [108] | Research and application testing | Used for categorical attributes and numerical data sets | Segmentation | Slicing | [109] | Research and application testing | Used for categorical attributes | Clustering | Sampling | [110] | Research and application testing | Large utility loss | | Generalization | [111] | Research and application testing | Granularity and utility loss | -Anonymity. -Diversity. -Closeness |
|
|