Research Article

D2D Big Data Privacy-Preserving Framework Based on (a, k)-Anonymity Model

Table 1

Source data and output of the mapper.

Source dataOutput of the mapper

[1 : 6][10 : 11]1, {s1, 1}, 110, {s1, 1}, 1
[1 : 6][10 : 11]1, {s2, 1}, 111, {s2, 1}, 1
[1 : 6][10 : 11]4, {s1, 1}, 110, {s1, 1}, 1
[1 : 6][10 : 11]6, {s1, 1}, 113, {s1, 1}, 1
[1 : 6][10 : 11]6, {s3, 1}, 111, {s3, 1}, 1