{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:27:03Z","timestamp":1762507623910},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030050627"},{"type":"electronic","value":"9783030050634"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05063-4_24","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T19:23:45Z","timestamp":1544124225000},"page":"303-312","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking"],"prefix":"10.1007","author":[{"given":"Mehdi","family":"Gheisari","sequence":"first","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuhong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hamidreza","family":"Ghorbani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"24_CR1","unstructured":"Dataprotection. Technical report, DLA piper (2017). https:\/\/www.dlapiperdataprotection.com\/index.html?t=about&c=BR"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"20298","DOI":"10.1109\/ACCESS.2018.2823720","volume":"6","author":"K Alinani","year":"2018","unstructured":"Alinani, K., Alinani, A., Narejo, D.H., Wang, G.: Aggregating author profiles from multiple publisher networks to build a list of potential collaborators. IEEE Access 6, 20298\u201320308 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"24_CR3","doi-asserted-by":"crossref","first-page":"235","DOI":"10.24846\/v27i2y201811","volume":"27","author":"M Arif","year":"2018","unstructured":"Arif, M., Wang, G., Balas, V.E.: Secure vanets: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inform. Control 27(2), 235\u2013246 (2018)","journal-title":"Stud. Inform. Control"},{"issue":"3","key":"24_CR4","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1108\/13639510610684674","volume":"29","author":"R Broadhurst","year":"2006","unstructured":"Broadhurst, R.: Developments in the global law enforcement of cyber-crime. Polic. Int. J. Police Strat. Manag. 29(3), 408\u2013433 (2006)","journal-title":"Polic. Int. J. Police Strat. Manag."},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Bull, P., Austin, R., Popov, E., Sharma, M., Watson, R.: Flow based security for IoT devices using an SDN gateway. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 157\u2013163. IEEE (2016)","DOI":"10.1109\/FiCloud.2016.30"},{"key":"24_CR6","unstructured":"Chase, J.: The evolution of the internet of things. Texas Instruments, pp. 1\u20135 (2013)"},{"issue":"3","key":"24_CR7","doi-asserted-by":"publisher","first-page":"1631","DOI":"10.3233\/JIFS-169457","volume":"34","author":"Y Dai","year":"2018","unstructured":"Dai, Y., Wang, G., Li, K.C.: Conceptual alignment deep neural networks. J. Intell. Fuzzy Syst. 34(3), 1631\u20131642 (2018)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Flauzac, O., Gonzlez, C., Hachani, A., Nolot, F.: SDN based architecture for IoT and improvement of the security. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, pp. 688\u2013693 (2015)","DOI":"10.1109\/WAINA.2015.110"},{"key":"24_CR9","unstructured":"GhadakSaz, E., Amini, M.R., Porkar, P., Gheisari, M.: Design, implement and compare two proposed sensor datas storages named SemHD and SSW. From Editor in Chief, p. 78 (2012)"},{"key":"24_CR10","unstructured":"Gheisari, M.: The effectiveness of schema therapy integrated with neurological rehabilitation on reducing early maladaptive schemas and symptoms of depression in patients with chronic depressive disorder. Health Sci. J. 10(4) (2016)"},{"key":"24_CR11","unstructured":"Gheisari, M., Baloochi, H., Gharghi, M., Khajehyousefi, M.: An evaluation of two proposed systems of sensor datas storage in total data parameter. Int. Geoinformatics Res. Dev. J. (2012)"},{"key":"24_CR12","unstructured":"Higginbotham, S.: Ericsson CEO predicts 50 billion internet connected devices by 2020. Ericsson (2011). http:\/\/gigaom.com\/2010\/04\/14\/ericsson-sees-the-internet-of-things-by-2020"},{"key":"24_CR13","unstructured":"Hunt, T., Song, C., Shokri, R., Shmatikov, V., Witchel, E.: Chiron: privacy- preserving machine learning as a service. arXiv preprint arXiv:1803.05961 (2018)"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: DASC 2009, pp. 711\u2013716. IEEE (2009)","DOI":"10.1109\/DASC.2009.139"},{"issue":"4","key":"24_CR15","first-page":"1471","volume":"9","author":"A Karim","year":"2015","unstructured":"Karim, A., Shah, S.A.A., Salleh, R.B., Arif, M., Noor, R.M., Shamshirband, S.: Mobile botnet attacks-an emerging threat: classification, review and open issues. TIIS 9(4), 1471\u20131492 (2015)","journal-title":"TIIS"},{"issue":"6","key":"24_CR16","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1007\/s11390-017-1797-9","volume":"32","author":"Q Liu","year":"2017","unstructured":"Liu, Q., Guo, Y., Wu, J., Wang, G.: Effective query grouping strategy in clouds. J. Comput. Sci. Technol. 32(6), 1231\u20131249 (2017)","journal-title":"J. Comput. Sci. Technol."},{"key":"24_CR17","unstructured":"Low, Y., Gonzalez, J.E., Kyrola, A., Bickson, D., Guestrin, C.E., Hellerstein, J.: GraphLab: a new framework for parallel machine learning. arXiv preprint arXiv:1408.2041 (2014)"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Gheisari, M., Esnaashari, M.: Data storages in wireless sensor networks to deal with disaster management. In: Emergency and Disaster Management: Concepts, Methodologies, Tools, and Applications, pp. 655\u2013682. IGI Global (2019)","DOI":"10.4018\/978-1-5225-6195-8.ch030"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Mekky, H., Hao, F., Mukherjee, S., Zhang, Z.L., Lakshman, T.: Application-aware data plane processing in SDN. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, pp. 13\u201318. ACM (2014)","DOI":"10.1145\/2620728.2620735"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Nobakht, M., Sivaraman, V., Boreli, R.: A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: ARES, pp. 147\u2013156, August 2016","DOI":"10.1109\/ARES.2016.64"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Porkar, P., Gheisari, M., Bazyari, G.H., Kaviyanjahromi, Z.: A comparison with two sensor data storagesin energy. In: ICCCI. ASME Press (2011)","DOI":"10.1115\/1.859926.paper104"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Raza, M., Chowdhury, S., Robertson, W.: SDN based emulation of an academic networking testbed. In: CCECE, pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/CCECE.2016.7726828"},{"key":"24_CR23","unstructured":"Rezaeiye, P.P., Gheisari, M.: Performance analysis of two sensor data storages. In: Proceedings of 2nd International Conference on Circuits, Systems, Communications & Computers (CSCC), pp. 133\u2013136 (2011)"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Rezaeiye, P.P., Rezaeiye, P.P., Karbalayi, E., Gheisari, M.: Statistical method used for doing better corneal junction operation. In: Material and Manufacturing Technology III. Advanced Materials Research, vol. 548, pp. 762\u2013766. Trans Tech Publications, September 2012","DOI":"10.4028\/www.scientific.net\/AMR.548.762"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Rezaeiye, P.P., et al.: Agent programming with object oriented (c\u2009++). In: ICECCT, pp. 1\u201310. IEEE (2017)","DOI":"10.1109\/ICECCT.2017.8117809"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Salman, O., Abdallah, S., Elhajj, I.H., Chehab, A., Kayssi, A.: Identity-based authentication scheme for the internet of things. In: ISCC, pp. 1109\u20131111. IEEE (2016)","DOI":"10.1109\/ISCC.2016.7543884"},{"key":"24_CR27","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.landurbplan.2016.07.004","volume":"157","author":"D Shanahan","year":"2017","unstructured":"Shanahan, D., et al.: Variation in experiences of nature across gradients of tree cover in compact and sprawling cities. Landsc. Urban Plann. 157, 231\u2013238 (2017)","journal-title":"Landsc. Urban Plann."},{"key":"24_CR28","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"24_CR29","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1016\/j.future.2017.05.050","volume":"86","author":"F Wang","year":"2018","unstructured":"Wang, F., Jiang, W., Li, X., Wang, G.: Maximizing positive influence spread in online social networks via fluid dynamics. Future Gener. Comput. Syst. 86, 1491\u20131502 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"24_CR30","unstructured":"Wang, T., Li, Y., Wang, G., Cao, J., Bhuiyan, M.Z.A., Jia, W.: Sustainable and efficient data collection from WSNs to cloud. IEEE Trans. Sustain. Comput. 1 (2018)"},{"key":"24_CR31","doi-asserted-by":"publisher","first-page":"31541","DOI":"10.1109\/ACCESS.2018.2845468","volume":"6","author":"Q Zhang","year":"2018","unstructured":"Zhang, Q., Liu, Q., Wang, G.: PRMS: a personalized mobile search over encrypted outsourced data. IEEE Access 6, 31541\u201331552 (2018)","journal-title":"IEEE Access"},{"key":"24_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, S., Wang, G., Liu, Q.: A dual privacy preserving scheme in continuous location-based services. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp. 402\u2013408, August 2017","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.264"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05063-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T18:18:14Z","timestamp":1573064294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05063-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030050627","9783030050634"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05063-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2018\/authors.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"407","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"141","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"7.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}