This document discusses privacy-preserving schema reuse. It introduces the challenges of defining privacy constraints, generating an anonymized schema from multiple schemas while satisfying privacy constraints, defining a utility function for anonymized schemas, and solving the optimization problem of finding the anonymized schema with the highest utility that satisfies all privacy constraints. Experimental results demonstrate the trade-off between privacy enforcement and utility loss. The solution presents an approach for generating anonymized schemas from multiple schemas in a privacy-preserving manner.
Related topics: