Research Article

Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks

Algorithm 2

PVST-Constructor.
(i)Input: ɛ, D, m, , Q
(ii)Output: , and
(1)
(2)for in D do
(3)     for do
(4)   
(5)     end
(6)end
(7)for in D do
(8)     while do
(9)   for do
(10)       compute ,
(11)         = 
(12)   end
(13)   
(14)   for do
(15)       
(16)   end
(17)  end
(18)end