{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:20:54Z","timestamp":1743110454097,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688837"},{"type":"electronic","value":"9783030688844"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68884-4_7","type":"book-chapter","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:29:09Z","timestamp":1612826949000},"page":"77-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Location Based Communication Privacy in Internet of Vehicles Using Fog Computing"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Arif","sequence":"first","affiliation":[]},{"given":"Jianer","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Pin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 247\u2013255 (2001)","DOI":"10.1145\/375551.375602"},{"issue":"2","key":"7_CR2","first-page":"143","volume":"24","author":"M Arif","year":"2020","unstructured":"Arif, M., Wang, G.: Cloud-based service oriented architecture for social vehicular ad hoc network communications. Int. J. Commun. Netw. Distrib. Syst. 24(2), 143\u2013166 (2020)","journal-title":"Int. J. Commun. Netw. Distrib. Syst."},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"235","DOI":"10.24846\/v27i2y201811","volume":"27","author":"M Arif","year":"2018","unstructured":"Arif, M., Wang, G., Balas, V.E.: Secure VANETs: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inf. Control 27(2), 235\u2013246 (2018)","journal-title":"Stud. Inf. Control"},{"key":"7_CR4","first-page":"100265","volume":"26","author":"M Arif","year":"2020","unstructured":"Arif, M., Wang, G., Balas, V.E., Geman, O., Castiglione, A., Chen, J.: SDN based communications privacy-preserving architecture for VANETs using fog computing. Veh. Commun. 26, 100265 (2020)","journal-title":"Veh. Commun."},{"key":"7_CR5","first-page":"100179","volume":"19","author":"M Arif","year":"2019","unstructured":"Arif, M., Wang, G., Bhuiyan, M.Z.A., Wang, T., Chen, J.: A survey on security attacks in VANETs: communication, applications and challenges. Veh. Commun. 19, 100179 (2019)","journal-title":"Veh. Commun."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Arif, M., Wang, G., Chen, S.: Deep learning with non-parametric regression model for traffic flow prediction. In: IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), pp. 681\u2013688. IEEE (2018)","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00120"},{"issue":"9","key":"7_CR7","doi-asserted-by":"publisher","first-page":"3217","DOI":"10.3390\/app10093217","volume":"10","author":"M Arif","year":"2020","unstructured":"Arif, M., et al.: SDN-based VANETs, security attacks, applications, and challenges. Appl. Sci. 10(9), 3217 (2020)","journal-title":"Appl. Sci."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Arif, M., Wang, G., Peng, T.: Track me if you can? Query based dual location privacy in vanets for V2V and V2I. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 1091\u20131096. IEEE (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00152"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Arif, M., Wang, G., Peng, T., Balas, V.E., Geman, O., Chen, J.: Optimization of communication in VANETs using fuzzy logic and artificial bee colony. J. Intell. Fuzzy Syst. 1\u201313 (2020, preprint)","DOI":"10.3233\/JIFS-179697"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-030-05345-1_4","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"M Arif","year":"2018","unstructured":"Arif, M., Wang, G., Wang, T., Peng, T.: SDN-based secure VANETs communication with fog computing. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 46\u201359. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05345-1_4"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13\u201316 (2012)","DOI":"10.1145\/2342509.2342513"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1016\/j.future.2019.12.030","volume":"105","author":"K Bylykbashi","year":"2020","unstructured":"Bylykbashi, K., Qafzezi, E., Ikeda, M., Matsuo, K., Barolli, L.: Fuzzy-based driver monitoring system (FDMS): implementation of two intelligent FDMSs and a testbed for safe driving in VANETs. Future Gener. Comput. Syst. 105, 665\u2013674 (2020)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"7_CR14","doi-asserted-by":"publisher","unstructured":"Chen, C.M., Huang, Y., Wang, K.H., Kumari, S., Wu, M.E.: A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 1\u201316 (2020). https:\/\/doi.org\/10.1080\/17517575.2020.1712746","DOI":"10.1080\/17517575.2020.1712746"},{"key":"7_CR15","unstructured":"Chen, K., Liu, L.: A random rotation perturbation approach to privacy preserving data classification (2005)"},{"key":"7_CR16","series-title":"Advances in Database SystemsAdvances in Database Systems","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-0-387-70992-5_7","volume-title":"Privacy-Preserving Data Mining","author":"K Chen","year":"2008","unstructured":"Chen, K., Liu, L.: A survey of multiplicative perturbation for privacy-preserving data mining. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. Advances in Database SystemsAdvances in Database Systems, vol. 34, pp. 157\u2013181. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-70992-5_7"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Chen, K., Sun, G., Liu, L.: Towards attack-resilient geometric data perturbation. In: Proceedings of the 2007 SIAM International Conference on Data Mining, pp. 78\u201389. SIAM (2007)","DOI":"10.1137\/1.9781611972771.8"},{"issue":"8","key":"7_CR18","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MC.2016.245","volume":"49","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet of things realize its potential. Computer 49(8), 112\u2013116 (2016)","journal-title":"Computer"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 211\u2013222 (2003)","DOI":"10.1145\/773153.773174"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"issue":"2","key":"7_CR21","doi-asserted-by":"publisher","first-page":"e0228319","DOI":"10.1371\/journal.pone.0228319","volume":"15","author":"M Han","year":"2020","unstructured":"Han, M., Liu, S., Ma, S., Wan, A.: Anonymous-authentication scheme based on fog computing for VANET. PLoS One 15(2), e0228319 (2020)","journal-title":"PLoS One"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-60159-7_6","volume-title":"Advances in Spatial Databases","author":"GR Hjaltason","year":"1995","unstructured":"Hjaltason, G.R., Samet, H.: Ranking in spatial databases. In: Egenhofer, M.J., Herring, J.R. (eds.) SSD 1995. LNCS, vol. 951, pp. 83\u201395. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60159-7_6"},{"issue":"1","key":"7_CR23","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MCOMSTD.2019.1800050","volume":"3","author":"HA Khattak","year":"2019","unstructured":"Khattak, H.A., Islam, S.U., Din, I.U., Guizani, M.: Integrating fog computing with VANETs: a consumer perspective. IEEE Commun. Stan. Mag. 3(1), 19\u201325 (2019)","journal-title":"IEEE Commun. Stan. Mag."},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Liu, K., Xiao, K., Dai, P., Lee, V., Guo, S., Cao, J.: Fog computing empowered data dissemination in software defined heterogeneous vanets. IEEE Trans. Mobile Comput. (2020). https:\/\/doi.org\/10.1109\/TMC.2020.2997460","DOI":"10.1109\/TMC.2020.2997460"},{"issue":"9","key":"7_CR25","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","volume":"23","author":"R Lu","year":"2012","unstructured":"Lu, R., Liang, X., Li, X., Lin, X., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621\u20131631 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Luan, T.H., Cai, L.X., Chen, J., Shen, X., Bai, F.: VTube: towards the media rich city life with autonomous vehicular content distribution. In: 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 359\u2013367. IEEE (2011)","DOI":"10.1109\/SAHCN.2011.5984918"},{"issue":"1","key":"7_CR27","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MWC.2019.1700441","volume":"26","author":"Z Ning","year":"2019","unstructured":"Ning, Z., Huang, J., Wang, X.: Vehicular fog computing: enabling real-time traffic management for smart cities. IEEE Wirel. Commun. 26(1), 87\u201393 (2019)","journal-title":"IEEE Wirel. Commun."},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30073-1_6","volume-title":"Secure Data Management","author":"SRM Oliveira","year":"2004","unstructured":"Oliveira, S.R.M., Za\u00efane, O.R.: Achieving privacy preservation when sharing data for clustering. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 67\u201382. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30073-1_6"},{"issue":"1","key":"7_CR29","first-page":"77","volume":"2","author":"N Poolsappasit","year":"2009","unstructured":"Poolsappasit, N., Ray, I.: Towards achieving personalized privacy for location-based services. Trans. Data Priv. 2(1), 77\u201399 (2009)","journal-title":"Trans. Data Priv."},{"key":"7_CR30","doi-asserted-by":"publisher","DOI":"10.1090\/mbk\/050","volume-title":"Applied Linear Algebra: The Decoupling Principle","author":"LA Sadun","year":"2007","unstructured":"Sadun, L.A.: Applied Linear Algebra: The Decoupling Principle. American Mathematical Society, Providence (2007)"},{"key":"7_CR31","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998)"},{"issue":"3","key":"7_CR32","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1137\/0717034","volume":"17","author":"GW Stewart","year":"1980","unstructured":"Stewart, G.W.: The efficient generation of random orthogonal matrices with an application to condition estimators. SIAM J. Numer. Anal. 17(3), 403\u2013409 (1980)","journal-title":"SIAM J. Numer. Anal."},{"issue":"5","key":"7_CR33","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2677046.2677052","volume":"44","author":"LM Vaquero","year":"2014","unstructured":"Vaquero, L.M., Rodero-Merino, L.: Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 44(5), 27\u201332 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68884-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T17:52:43Z","timestamp":1671126763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68884-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688837","9783030688844"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68884-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}