Analysis of privacy preserving K-anonymity methods and techniques | IEEE Conference Publication | IEEE Xplore