“…Since then, a large number of privacy protection mechanisms have been proposed in [12,17,29,30,45,46] . These works can generally be divided into two categories: the ones using cryptographic tools [2,3,9,12,17,20,29,30,34,50] and the ones using perturbation based techniques [45,46] .…”