{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:01:57Z","timestamp":1743087717226,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030980047"},{"type":"electronic","value":"9783030980054"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98005-4_22","type":"book-chapter","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T08:02:30Z","timestamp":1648281750000},"page":"301-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dual Scheme Privacy-Preserving Approach for Location-Aware Application in Edge Computing"],"prefix":"10.1007","author":[{"given":"Bruce","family":"Gu","sequence":"first","affiliation":[]},{"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Khandakar","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Chenchen","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Miao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,27]]},"reference":[{"key":"22_CR1","unstructured":"Vicfreewifi access point locations - victorian government data directory, July 2017. https:\/\/discover.data.vic.gov.au\/dataset\/vicfreewifi-access-point-locations"},{"issue":"3","key":"22_CR2","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/TSC.2018.2839587","volume":"14","author":"S Badsha","year":"2018","unstructured":"Badsha, S., et al.: Privacy preserving location-aware personalized web service recommendations. IEEE Trans. Serv. Comput. 14(3), 791\u2013804 (2018)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"22_CR3","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-319-05029-4_7","volume-title":"Big Data and Internet of Things: A Roadmap for Smart Environments","author":"F Bonomi","year":"2014","unstructured":"Bonomi, F., Milito, R., Natarajan, P., Zhu, J.: Fog computing: a platform for internet of things and analytics. In: Bessis, N., Dobre, C. (eds.) Big Data and Internet of Things: A Roadmap for Smart Environments. SCI, vol. 546, pp. 169\u2013186. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05029-4_7"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Dang, T.D., Hoang, D.: A data protection model for fog computing. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), pp. 32\u201338 (2017)","DOI":"10.1109\/FMEC.2017.7946404"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Deepali, Bhushan, K.: DDoS attack defense framework for cloud using fog computing. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), pp. 534\u2013538 (2017)","DOI":"10.1109\/RTEICT.2017.8256654"},{"key":"22_CR6","unstructured":"Frey, B.J., Dueck, D.: Affinity propagation (2007)"},{"key":"22_CR7","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-030-57328-7_6","volume-title":"Fog\/Edge Computing For Security, Privacy, and Applications","author":"Q Xia","year":"2021","unstructured":"Xia, Q., Tao, Z., Li, Q.: Privacy issues in edge computing. In: Chang, W., Wu, J. (eds.) Fog\/Edge Computing For Security, Privacy, and Applications. AIS, vol. 83, pp. 147\u2013169. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-57328-7_6"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Gu, B., Wang, X., Qu, Y., Jin, J., Xiang, Y., Gao, L.: Context-aware privacy preservation in a hierarchical fog computing system. In: 2019 IEEE International Conference on Communications (ICC), ICC 2019, pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761455"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"2298","DOI":"10.1109\/TNSE.2019.2933639","volume":"7","author":"BS Gu","year":"2019","unstructured":"Gu, B.S., Gao, L., Wang, X., Qu, Y., Jin, J., Yu, S.: Privacy on the edge: customizable privacy-preserving context sharing in hierarchical edge computing. IEEE Trans. Netw. Sci. Eng. 7, 2298\u20132309 (2019)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"22_CR10","doi-asserted-by":"publisher","unstructured":"Hasan, K., Ahmed, K., Biswas, K., Islam, M.S., Kayes, A.S.M., Islam, S.M.R.: Control plane optimisation for an SDN-based WBAN framework to support healthcare applications. Sensors 20(15) (2020). https:\/\/doi.org\/10.3390\/s20154200. https:\/\/www.mdpi.com\/1424-8220\/20\/15\/4200","DOI":"10.3390\/s20154200"},{"key":"22_CR11","doi-asserted-by":"publisher","unstructured":"Hasan, K., Ahmed, K., Biswas, K., Saiful Islam, M., Ameri Sianaki, O.: Software-defined application-specific traffic management for wireless body area networks. Future Gener. Comput. Syst. 107, 274\u2013285 (2020). https:\/\/doi.org\/10.1016\/j.future.2020.01.052, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X19322587","DOI":"10.1016\/j.future.2020.01.052"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"103066","DOI":"10.1016\/j.jnca.2021.103066","volume":"185","author":"S Ho","year":"2021","unstructured":"Ho, S., Qu, Y., Gu, B., Gao, L., Li, J., Xiang, Y.: DP-GAN: differentially private consecutive data publishing using generative adversarial nets. J. Netw. Comput. Appl. 185, 103066 (2021)","journal-title":"J. Netw. Comput. Appl."},{"issue":"8","key":"22_CR13","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1109\/TITS.2017.2764095","volume":"19","author":"J Kang","year":"2018","unstructured":"Kang, J., Yu, R., Huang, X., Zhang, Y.: Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans. Intell. Transp. Syst. 19(8), 2627\u20132637 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302\u20133312 (2017)","journal-title":"IEEE Access"},{"issue":"8","key":"22_CR15","doi-asserted-by":"publisher","first-page":"3733","DOI":"10.1109\/TII.2018.2803782","volume":"14","author":"L Lyu","year":"2018","unstructured":"Lyu, L., Nandakumar, K., Rubinstein, B., Jin, J., Bedo, J., Palaniswami, M.: PPFA: privacy preserving fog-enabled aggregation in smart grid. IEEE Trans. Ind. Inf. 14(8), 3733\u20133744 (2018)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"22_CR16","first-page":"500","volume":"79","author":"L Ma","year":"2018","unstructured":"Ma, L., Liu, X., Pei, Q., Xiang, Y.: Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing. IEEE Trans. Serv. Comput. 79, 500\u2013513 (2018). Part 2","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"22_CR17","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/COMST.2017.2771153","volume":"20","author":"C Mouradian","year":"2018","unstructured":"Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R.H., Morrow, M.J., Polakos, P.A.: A comprehensive survey on fog computing: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 20(1), 416\u2013464 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"22_CR18","doi-asserted-by":"publisher","unstructured":"Nafi, N.S., Ahmed, K., Gregory, M.A., Datta, M.: Software defined neighborhood area network for smart grid applications. Future Gener. Comput. Syst. 79, 500\u2013513 (2018). https:\/\/doi.org\/10.1016\/j.future.2017.09.064, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X17311007","DOI":"10.1016\/j.future.2017.09.064"},{"issue":"1","key":"22_CR19","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2018","unstructured":"Ni, J., Zhang, K., Lin, X., Shen, X.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601\u2013628 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"22_CR20","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TCSS.2018.2861775","volume":"5","author":"Y Qu","year":"2018","unstructured":"Qu, Y., Yu, S., Gao, L., Zhou, W., Peng, S.: A hybrid privacy protection scheme in cyber-physical social networks. IEEE Trans. Comput. Soc. Syst. 5(3), 773\u2013784 (2018)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"34885","DOI":"10.1109\/ACCESS.2019.2904236","volume":"7","author":"RU Rasool","year":"2019","unstructured":"Rasool, R.U., Ashraf, U., Ahmed, K., Wang, H., Rafique, W., Anwar, Z.: CyberPulse: a machine learning based link flooding attack mitigation system for software defined networks. IEEE Access 7, 34885\u201334899 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2904236","journal-title":"IEEE Access"},{"key":"22_CR22","doi-asserted-by":"publisher","unstructured":"Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, pp. 1\u20138, September 2014. https:\/\/doi.org\/10.15439\/2014F503","DOI":"10.15439\/2014F503"},{"key":"22_CR23","doi-asserted-by":"publisher","first-page":"17962","DOI":"10.1109\/ACCESS.2017.2748956","volume":"5","author":"Q Wang","year":"2017","unstructured":"Wang, Q., Chen, D., Zhang, N., Ding, Z., Qin, Z.: PCP: a privacy-preserving content-based publish subscribe scheme with differential privacy in fog computing. IEEE Access 5, 17962\u201317974 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2748956","journal-title":"IEEE Access"},{"issue":"1","key":"22_CR24","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TETCI.2017.2764109","volume":"2","author":"T Wang","year":"2018","unstructured":"Wang, T., Zhou, J., Chen, X., Wang, G., Liu, A., Liu, Y.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3\u201312 (2018)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"issue":"6","key":"22_CR25","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1109\/TNET.2015.2512301","volume":"24","author":"W Wang","year":"2016","unstructured":"Wang, W., Zhang, Q.: Privacy preservation for context sensing on smartphone. IEEE\/ACM Trans. Netw. 24(6), 3235\u20133247 (2016). https:\/\/doi.org\/10.1109\/TNET.2015.2512301","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"22_CR26","doi-asserted-by":"publisher","unstructured":"Wibowo, F.X., Gregory, M.A., Ahmed, K., Gomez, K.M.: Multi-domain software defined networking: research status and challenges. J. Netw. Comput. Appl. 87, 32\u201345 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.03.004, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804517300991","DOI":"10.1016\/j.jnca.2017.03.004"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Yannuzzi, M., Milito, R., Serral-Graci, R., Montero, D., Nemirovsky, M.: Key ingredients in an IoT recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 325\u2013329 (2014)","DOI":"10.1109\/CAMAD.2014.7033259"},{"key":"22_CR28","doi-asserted-by":"publisher","first-page":"13117","DOI":"10.1109\/ACCESS.2018.2797885","volume":"6","author":"J Zhang","year":"2018","unstructured":"Zhang, J., Feng, X., Liu, Z.: A grid-based clustering algorithm via load analysis for industrial internet of things. IEEE Access 6, 13117\u201313128 (2018)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Ad Hoc Networks and Tools for IT"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98005-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T08:05:10Z","timestamp":1648281910000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98005-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030980047","9783030980054"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98005-4_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TridentCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Testbeds and Research Infrastructures","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tridentcom2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/tridentcom.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}