Implement the privacy-preserving methods based on “k-anonymity”, “l-Diversity”and “t-Closeness”algorithm