{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T19:49:42Z","timestamp":1761853782498,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_33","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T21:20:42Z","timestamp":1537478442000},"page":"357-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching"],"prefix":"10.1007","author":[{"given":"Yuhang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hongli","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shen","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"issue":"1","key":"33_CR1","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2031331.2031335","volume":"13","author":"CY Chow","year":"2011","unstructured":"Chow, C.Y., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. ACM SIGKDD Explor. Newsl. 13(1), 19\u201329 (2011)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Bamba, B., Liu, L., Pesti, P., et al.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th International Conference on World Wide Web, pp. 237\u2013246. ACM (2008)","DOI":"10.1145\/1367497.1367531"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: 2005 Proceedings International Conference on Pervasive Services. ICPS 2005, pp. 88\u201397. IEEE (2005)","DOI":"10.1109\/PERSER.2005.1506394"},{"issue":"3","key":"33_CR4","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1049\/ip-vis:20045083","volume":"152","author":"Z Li","year":"2005","unstructured":"Li, Z., Katsaggelos, A.K., Gandhi, B.: Fast video shot retrieval based on trace geometry matching. IEE Proc. Vis. Image Signal Process. 152(3), 367\u2013373 (2005)","journal-title":"IEE Proc. Vis. Image Signal Process."},{"key":"33_CR5","unstructured":"Bhatia, N.: Survey of nearest neighbor techniques. arXiv preprint arXiv:1007.0085 (2010)"},{"issue":"4","key":"33_CR6","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MSP.2005.1458273","volume":"22","author":"G Sun","year":"2005","unstructured":"Sun, G., Chen, J., Guo, W.: Signal processing techniques in network-aided positioning: a survey of state-of-the-art positioning designs. IEEE Signal Process. Mag. 22(4), 12\u201323 (2005)","journal-title":"IEEE Signal Process. Mag."},{"issue":"7","key":"33_CR7","first-page":"1805","volume":"27","author":"WW Ni","year":"2016","unstructured":"Ni, W.W., Chen, X.: User privacy preference support in location privacy-preserving nearest neighbor query. J. Softw. 27(7), 1805\u20131821 (2016)","journal-title":"J. Softw."},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Yiu, M.L., Jensen, C.S., Huang, X., et al.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: 2008 IEEE 24th International Conference on Data Engineering. ICDE 2008, pp. 366\u2013375. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497445"},{"issue":"10","key":"33_CR9","doi-asserted-by":"crossref","first-page":"2158","DOI":"10.1109\/TMC.2015.2388488","volume":"14","author":"R Schlegel","year":"2015","unstructured":"Schlegel, R., Chow, C.Y., Huang, Q.: User-defined privacy grid system for continuous location-based services. IEEE Trans. Mobile Comput. 14(10), 2158\u20132172 (2015)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"2","key":"33_CR10","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1109\/TKDE.2012.251","volume":"26","author":"H Xu","year":"2014","unstructured":"Xu, H., Guo, S., Chen, K.: Building confidential and efficient query services in the cloud with RASP data perturbation. IEEE Trans. Knowl. Data Eng. 26(2), 322\u2013335 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"33_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1\u201318 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"33_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"CY Chow","year":"2009","unstructured":"Chow, C.Y., Mokbel, M.F., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. 34(4), 1\u201345 (2009)","journal-title":"ACM Trans. Database Syst."},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-73540-3_14","volume-title":"Advances in Spatial and Temporal Databases","author":"A Khoshgozaran","year":"2007","unstructured":"Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239\u2013257. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73540-3_14"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Damiani, M.L., Cuijpers, C.: Privacy challenges in third-party location services. In: 14th IEEE International Conference on Mobile Data Management, pp. 63\u201366. IEEE Press, Milan (2013)","DOI":"10.1109\/MDM.2013.67"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Jiang, F., Fu, Y., Gupta, B.B., et al.: Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans. Sustain. Comput. (2018)","DOI":"10.1109\/TSUSC.2018.2793284"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Tippenhauer, N.O., Rasmussen, K.B., P\u00f6pper, C.: Attacks on public WLAN-based positioning systems. In: 7th Proceedings of the International Conference on Mobile systems, pp, 29\u201340. ACM, Wroclaw (2009)","DOI":"10.1145\/1555816.1555820"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Li, H., Lim, S., Hao, Z.: Achieving privacy preservation in WiFi fingerprint-based localization. In: IEEE INFOCOM Proceedings, pp. 2337\u20132345. IEEE, Toronto (2014)","DOI":"10.1109\/INFOCOM.2014.6848178"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Wang, X., Liu, Y., Shi, Z., et al.: A privacy-preserving fuzzy localization scheme with CSI fingerprint. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136 (2015)","DOI":"10.1109\/GLOCOM.2015.7417168"},{"key":"33_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3023-4_1","volume-title":"Handbook of Combinatorial Optimization","author":"IM Bomze","year":"1999","unstructured":"Bomze, I.M., Budinich, M., Pardalos, P.M., Pelillo, M.: The maximum clique problem. In: Du, D.Z., Pardalos, P.M. (eds.) Handbook of Combinatorial Optimization. Springer, Boston (1999). https:\/\/doi.org\/10.1007\/978-1-4757-3023-4_1"},{"key":"33_CR20","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.jss.2015.03.067","volume":"116","author":"D Christin","year":"2016","unstructured":"Christin, D.: Privacy in mobile participatory sensing: current trends and future challenges. J. Syst. Softw. 116, 57\u201368 (2016)","journal-title":"J. Syst. Softw."},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., Shokri, R., Troncoso, C., et al.: Prolonging the hide-and-seek game: optimal trajectory privacy for location-based services. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 73\u201382. ACM (2014)","DOI":"10.1145\/2665943.2665946"},{"issue":"1","key":"33_CR22","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MWC.2015.7054716","volume":"22","author":"D He","year":"2015","unstructured":"He, D., Chan, S., Guizani, M.: User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel. Commun. 22(1), 28\u201334 (2015)","journal-title":"IEEE Wirel. Commun."},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Giannetsos, T., Gisdakis, S., Papadimitratos, P.: Trustworthy people-centric sensing: privacy, security and user incentives road-map. In: 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), pp. 39\u201346. IEEE (2014)","DOI":"10.1109\/MedHocNet.2014.6849103"},{"key":"33_CR24","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.comnet.2015.12.022","volume":"101","author":"B Zhang","year":"2016","unstructured":"Zhang, B., Liu, C.H., Lu, J.: Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing. Comput. Netw. 101, 29\u201341 (2016)","journal-title":"Comput. Netw."},{"issue":"5","key":"33_CR25","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/JIOT.2016.2560768","volume":"3","author":"S Gisdakis","year":"2016","unstructured":"Gisdakis, S., Giannetsos, T., Papadimitratos, P.: Security, privacy, and incentive provision for mobile crowd sensing systems. IEEE Internet Things J. 3(5), 839\u2013853 (2016)","journal-title":"IEEE Internet Things J."},{"key":"33_CR26","doi-asserted-by":"crossref","unstructured":"Niu, B., Gao, S., Li, F., et al.: Protection of location privacy in continuous LBSs against adversaries with background information. In: 2016 International Conference on Computing, Networking and Communications (ICNC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICCNC.2016.7440649"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Boutsis, I., Kalogeraki, V.: Location privacy for crowdsourcing applications. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 694\u2013705. ACM (2016)","DOI":"10.1145\/2971648.2971741"},{"issue":"4","key":"33_CR28","first-page":"11","volume":"19","author":"R Shokri","year":"2017","unstructured":"Shokri, R., Theodorakopoulos, G., Troncoso, C.: Privacy games along location traces: a game-theoretic framework for optimizing location privacy. ACM Trans. Priv. Secur. (TOPS) 19(4), 11 (2017)","journal-title":"ACM Trans. Priv. Secur. (TOPS)"},{"key":"33_CR29","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.ins.2016.08.010","volume":"387","author":"T Peng","year":"2017","unstructured":"Peng, T., Liu, Q., Meng, D.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387, 165\u2013179 (2017)","journal-title":"Inf. Sci."},{"issue":"5","key":"33_CR30","first-page":"4410","volume":"66","author":"B Liu","year":"2017","unstructured":"Liu, B., Zhou, W., Zhu, T.: Invisible hand: a privacy preserving mobile crowd sensing framework based on economic models. IEEE Trans. Veh. Technol. 66(5), 4410\u20134423 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"33_CR31","doi-asserted-by":"crossref","first-page":"2578","DOI":"10.1109\/TVT.2015.2415515","volume":"65","author":"D Tang","year":"2016","unstructured":"Tang, D., Ren, J.: A novel delay-aware and privacy-preserving data-forwarding scheme for urban sensing network. IEEE Trans. Veh. Technol. 65(4), 2578\u20132588 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"33_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, S., Wang, G., Liu, Q., et al.: A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 1\u201313 (2017)","DOI":"10.1007\/s00500-017-2676-6"},{"issue":"6","key":"33_CR33","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1109\/TSMCC.2007.905750","volume":"37","author":"H Liu","year":"2007","unstructured":"Liu, H., Darabi, H., Banerjee, P.: Survey of wireless indoor positioning techniques and systems. IEEE Trans. Syst. Man. Cybern. Part C (Appl. Rev.) 37(6), 1067\u20131080 (2007)","journal-title":"IEEE Trans. Syst. Man. Cybern. Part C (Appl. Rev.)"},{"key":"33_CR34","doi-asserted-by":"crossref","unstructured":"Ahmadi, H., Bouallegue, R.: Exploiting machine learning strategies and RSSI for localization in wireless sensor networks: a survey. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1150\u20131154. IEEE (2017)","DOI":"10.1109\/IWCMC.2017.7986447"},{"key":"33_CR35","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2031331.2031335","volume":"13","author":"CY Chow","year":"2011","unstructured":"Chow, C.Y., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. SIGKDD 13, 19\u201329 (2011). ACM","journal-title":"SIGKDD"},{"key":"33_CR36","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Pers. Ubiquit. Comput. 13, 391\u2013399 (2009)","journal-title":"Pers. Ubiquit. Comput."},{"key":"33_CR37","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s00779-012-0633-z","volume":"18","author":"M Wernke","year":"2014","unstructured":"Wernke, M.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18, 163\u2013175 (2014)","journal-title":"Pers. Ubiquit. Comput."},{"key":"33_CR38","first-page":"230","volume":"36","author":"W Yu","year":"2015","unstructured":"Yu, W., Hong, Z., Xiang, Y.: Research on location privacy on mobile internet. Communication 36, 230\u2013243 (2015)","journal-title":"Communication"},{"issue":"3","key":"33_CR39","first-page":"20","volume":"35","author":"D Zhang","year":"2017","unstructured":"Zhang, D., Guo, L., Nie, L.: Targeted advertising in public transportation systems with quantitative evaluation. ACM Trans. Inf. Syst. (TOIS) 35(3), 20 (2017)","journal-title":"ACM Trans. Inf. Syst. (TOIS)"},{"key":"33_CR40","doi-asserted-by":"crossref","unstructured":"Zhang, S., Liu, Q., Wang, G.: Enhancing location privacy through user-defined grid in location-based services. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 730\u2013736. IEEE (2016)","DOI":"10.1109\/TrustCom.2016.0132"},{"key":"33_CR41","doi-asserted-by":"crossref","unstructured":"Ziegeldorf, J.H., Henze, M., Bavendiek, J., et al.: TraceMixer: privacy-preserving crowd-sensing sans trusted third party. In: 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp. 17\u201324. IEEE (2017)","DOI":"10.1109\/WONS.2017.7888771"},{"key":"33_CR42","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, X., Li, H., et al.: Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8056978"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T10:42:24Z","timestamp":1751971344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}