
M. (2021). F-classify: Fuzzy rule based classification
method for privacy preservation of multiple sensitive
attributes. Sensors, 21(14).
Chen, B.-C., Kifer, D., LeFevre, K., Machanavajjhala, A.,
et al. (2009). Privacy-preserving data publishing.
Foundations and Trends® in Databases, 2(1–2):1–
167.
Domingo-Ferrer, J., Muralidhar, K., and Bras-Amoros, M.
(2020). General Confidentiality and Utility Metrics
for Privacy-Preserving Data Publishing Based on the
Permutation Model. IEEE Transactions on Depend-
able and Secure Computing, pages 1–1.
Dwork, C. (2008). Differential Privacy: A Survey of Re-
sults. In Agrawal, M., Du, D., Duan, Z., and Li, A.,
editors, Theory and Applications of Models of Com-
putation, Lecture Notes in Computer Science, pages
1–19, Berlin, Heidelberg. Springer.
Dwork, C. and Roth, A. (2013). The Algorithmic
Foundations of Differential Privacy. Foundations
and Trends® in Theoretical Computer Science, 9(3-
4):211–407.
European Parliament and Council of the European Union
(2016). Regulation (EU) 2016/679 of the European
Parliament and of the Council.
Eyupoglu, C., Aydin, M., Zaim, A., and Sertbas, A. (2018a).
An efficient big data anonymization algorithm based
on chaos and perturbation techniques. Entropy, 20(5).
Eyupoglu, C., Aydin, M., Zaim, A., and Sertbas, A.
(2018b). An efficient big data anonymization algo-
rithm based on chaos and perturbation techniques. En-
tropy, 20(5).
Fan, H. and Wang, Y. (2023). Range optimal dummy lo-
cation selection based on query probability density.
2023 2nd International Conference on Cloud Comput-
ing, Big Data Application and Software Engineering
(CBASE), pages 366–371.
Fieschi, A., Hirmer, P., Agrawal, S., Christoph, S., and
Mitschang, B. (2024). Hysaad – a hybrid selection ap-
proach for anonymization by design in the automotive
domain. In 2024 25th IEEE International Conference
on Mobile Data Management (MDM). IEEE.
Fieschi, A., Hirmer, P., and Stach, C. (2025). Discovering
suitable anonymization techniques: A privacy toolbox
for data experts. Presented at the 21st Conference on
Database Systems for Business, Technology and Web
(BTW 2025), Bamberg, Germany, March 2025.
Fieschi, A., Li, Y., Hirmer, P., Stach, C., and Mitschang,
B. (2023). Privacy in connected vehicles: Perspec-
tives of drivers and car manufacturers. In Symposium
and Summer School on Service-Oriented Computing,
pages 59–68. Springer.
Fung, B. C., Wang, K., Fu, A. W.-C., and Yu, P. S. (2010).
Introduction to Privacy-Preserving Data Publishing.
Chapman and Hall/CRC.
Gaboardi, M., Hay, M., and Vadhan, S. (2020). A program-
ming framework for opendp.
Gao, T. and Li, F. (2019a). PHDP: Preserving Persistent Ho-
mology in Differentially Private Graph Publications.
volume 2019-April, pages 2242–2250.
Gao, T. and Li, F. (2019b). Privacy-Preserving Sketching
for Online Social Network Data Publication. volume
2019-June.
Gao, T. and Li, F. (2019c). Sharing Social Networks Using
a Novel Differentially Private Graph Model.
Hamm, J. (2017). Minimax filter: Learning to preserve
privacy from inference attacks. Journal of Machine
Learning Research, 18.
Javed, I., Alharbi, F., Margaria, T., Crespi, N., and Qureshi,
K. (2021). PETchain: A Blockchain-Based Pri-
vacy Enhancing Technology. IEEE Access, 9:41129–
41143.
Jin, F., Hua, W., Ruan, B., and Zhou, X. (2022). Frequency-
based Randomization for Guaranteeing Differential
Privacy in Spatial Trajectories. volume 2022-May,
pages 1727–1739.
Kalia, P., Bansal, D., and Sofat, S. (2021). Privacy
Preservation in Cloud Computing Using Random-
ized Encoding. Wireless Personal Communications,
120(4):2847–2859.
Khan, R., Tao, X., Anjum, A., Malik, S., Yu, S., Khan,
A., Rehman, W., and Malik, H. (2022). (tau, m)-
slicedBucket privacy model for sequential anonymiza-
tion for improving privacy and utility. Transactions on
Emerging Telecommunications Technologies, 33(6).
Li, B., Zhu, H., and Xie, M. (2022). Releasing Differen-
tially Private Trajectories with Optimized Data Utility.
Applied Sciences (Switzerland), 12(5).
Li, N., Li, T., and Venkatasubramanian, S. (2007). t-
Closeness: Privacy Beyond k-Anonymity and l-
Diversity. In 2007 IEEE 23rd International Confer-
ence on Data Engineering, pages 106–115. ISSN:
2375-026X.
Li, X., Zhu, Y., and Wang, J. (2021). Highly Efficient
Privacy Preserving Location-Based Services with En-
hanced One-Round Blind Filter. IEEE Transactions
on Emerging Topics in Computing, 9(4):1803–1814.
Machanavajjhala, A., Kifer, D., Gehrke, J., and Venkitasub-
ramaniam, M. (2007). L-diversity: Privacy beyond
k-anonymity. ACM Transactions on Knowledge Dis-
covery from Data, 1(1):3–es.
Mahdavifar, S., Deldar, F., and Mahdikhani, H. (2022). Per-
sonalized Privacy-Preserving Publication of Trajec-
tory Data by Generalization and Distortion of Moving
Points. Journal of Network and Systems Management,
30(1).
Majeed, A. and Lee, S. (2021). Anonymization Techniques
for Privacy Preserving Data Publishing: A Compre-
hensive Survey. IEEE Access, 9:8512–8545. Confer-
ence Name: IEEE Access.
Mohamed, M., Ghanem, S., and Nagi, M. (2020). Privacy-
preserving for distributed data streams: Towards l-
diversity. International Arab Journal of Information
Technology, 17(1):52–64.
Moher, D., Shamseer, L., Clarke, M., Ghersi, D., Liberati,
A., Petticrew, M., Shekelle, P., Stewart, L. A., and
Group, P.-P. (2015). Preferred reporting items for sys-
tematic review and meta-analysis protocols (prisma-p)
2015 statement. Systematic reviews, 4:1–9.
Characterising and Categorising Anonymization Techniques: A Literature-Based Approach
117