Research Article

D2D Big Data Privacy-Preserving Framework Based on (a, k)-Anonymity Model

Table 6

Comparison with existing works.

Privacy modelNetworkSolutionILoss

Wu et al. [18]Mobile networkEncryptionLess
Hakola et al. [19]IoTEncryptionLess
Li et al. [21]Mix-netEncryption generalizationReasonable
Our modelIoTMapReduce generalizationReasonable