“…Many different privacy preserving frameworks have been proposed in the literature, which apply techniques like Data Perturbation [5], Cryptography [11], Differential privacy [12], k-anonymity [13], Tessellation [14], Data aggregation [15], Pseudonyms [16] and Access control mechanisms [17]. Table II does a comparison of few such papers on the basis of attacks and threats dealt with, using various privacy techniques.…”