Fig. 5From: Big data privacy: a technological perspective and reviewHiding a needle in a haystack Mechanism of hiding a needle in a haystack is shownBack to article page