Describe a method in which one can generate a dataset that satisfies k-anonymity, has the same size as the input dataset, offers reasonable utility, yet offers very weak privacy protection.



Answer :