1. Introduction
Privacy preserving data mining, i.e., the study of data mining side-effects on privacy, has rapidly become a hot and lively research area [8], [20], [3], [27], which has seen the proliferation of many completely different approaches having different objectives, application contexts and using different techniques. The chronologically first approach in privacy preserving data mining was aimed at avoiding the identification of the original database rows (by means of data perturbation or obfuscation) while at the same time allowing the reconstruction of the data distribution at an aggregate level, and thus the production of valid mining models [3], [1], [10], [11], [23].