Research Article
D2D Big Data Privacy-Preserving Framework Based on (a, k)-Anonymity Model
Table 6
Comparison with existing works.
| Privacy model | Network | Solution | ILoss |
| Wu et al. [18] | Mobile network | Encryption | Less | Hakola et al. [19] | IoT | Encryption | Less | Li et al. [21] | Mix-net | Encryption generalization | Reasonable | Our model | IoT | MapReduce generalization | Reasonable |
|
|