Recovering private data : a comparison of three methods

We examine a recent proposal for data privatization by testing it agalnst three well-known attacks. We show that all three attacks successfully retrieve the original datta. We compare the strengths of the three attacks. Finally, we indicate how the data privatization method examined can be modified to assist it to withstand these attacks.