k-Anonymity: A model for protecting privacy, Latanya Sweeney, 2002International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, Vol. 10DOI: 10.1142/S0218488502001658 - Introduces the foundational k-anonymity model, a common method for achieving data anonymization by ensuring each record is indistinguishable from at least k-1 other records, which is pertinent to generalization techniques.
Privacy-Preserving Data Publishing: An Overview, Raymond Chi-Wing Wong, Ada Wai-Chee Fu, 2010Synthesis Lectures on Data Management, Vol. 2 (Morgan & Claypool Publishers)DOI: 10.2200/S00237ED1V01Y201003DTM002 - Provides a comprehensive overview of various traditional privacy-preserving data publishing techniques, including masking, generalization, and perturbation, and discusses their utility-privacy trade-offs.
A Survey of Privacy-Preserving Synthetic Data Generation, Zhaohang Cao, Zhe Li, Chuan Wang, Ke Lyu, Yuzhen Wang, and Bing Yuan, 2023ACM Computing Surveys, Vol. 56 (Association for Computing Machinery (ACM))DOI: 10.1145/3631481 - A recent and comprehensive review of methods for generating synthetic data while preserving privacy, directly relevant to understanding synthetic data as an anonymization strategy.
The Algorithmic Foundations of Differential Privacy, Cynthia Dwork and Aaron Roth, 2014Foundations and Trends® in Theoretical Computer Science, Vol. 9 (Now Publishers Inc.)DOI: 10.1561/0400000042 - A foundational text introducing differential privacy, a strong mathematical definition of privacy crucial for building robust privacy-preserving systems and evaluating privacy risks in synthetic data.