Return to Article Details Privacy preservation in data intensive environment Download Download PDF