{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T15:33:44Z","timestamp":1758814424948,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811399411"},{"type":"electronic","value":"9789811399428"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9942-8_50","type":"book-chapter","created":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T03:03:25Z","timestamp":1563419005000},"page":"529-542","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Context-Aware Approach to Enhance Service Utility for Location Privacy in Internet of Things"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8945-2721","authenticated-orcid":false,"given":"Shivangi","family":"Shukla","sequence":"first","affiliation":[]},{"given":"Sankita J.","family":"Patel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"issue":"1","key":"50_CR1","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11277-011-0288-5","volume":"58","author":"D Bandyopadhyay","year":"2011","unstructured":"Bandyopadhyay, D., Sen, J.: Internet of things: applications and challenges in technology and standardization. Wirel. Pers. Commun. 58(1), 49\u201369 (2011). \n                    https:\/\/doi.org\/10.1007\/s11277-011-0288-5","journal-title":"Wirel. Pers. Commun."},{"key":"50_CR2","doi-asserted-by":"publisher","unstructured":"Liu, Y., Zhou, G.: Key technologies and applications of internet of things. In: 2012 Fifth International Conference on Intelligent Computation Technology and Automation (ICICTA), pp. 197\u2013200. IEEE (2012). \n                    https:\/\/doi.org\/10.1109\/ICICTA.2012.56","DOI":"10.1109\/ICICTA.2012.56"},{"key":"50_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88, 10\u201328 (2017). \n                    https:\/\/doi.org\/10.1016\/j.jnca.2017.04.002","journal-title":"J. Netw. Comput. Appl."},{"issue":"11","key":"50_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.5120\/15764-4454","volume":"90","author":"JS Kumar","year":"2014","unstructured":"Kumar, J.S., Patel, D.R.: A survey on internet of things: security and privacy issues. Int. J. Comput. Appl. 90(11), 20\u201326 (2014). \n                    https:\/\/doi.org\/10.5120\/15764-4454","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"50_CR5","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","volume":"16","author":"C Perera","year":"2014","unstructured":"Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. IEEE Commun. Surv. Tutor. 16(1), 414\u2013454 (2014). \n                    https:\/\/doi.org\/10.1109\/SURV.2013.042313.00197","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"50_CR6","doi-asserted-by":"publisher","unstructured":"Elkhodr, M., Shahrestani, S., Cheung, H.: A contextual-adaptive location disclosure agent for general devices in the internet of things. In: 38th Annual IEEE Conference on Local Computer Networks-Workshops, pp. 848\u2013855. IEEE (2013). \n                    https:\/\/doi.org\/10.1109\/LCNW.2013.6758522","DOI":"10.1109\/LCNW.2013.6758522"},{"key":"50_CR7","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/s11235-017-0352-x","volume":"67","author":"I Ullah","year":"2018","unstructured":"Ullah, I., Shah, M.A., Wahid, A., et al.: ESOT: a new privacy model for preserving location privacy in Internet of Things. Telecommun. Syst. 67, 553\u2013573 (2018). \n                    https:\/\/doi.org\/10.1007\/s11235-017-0352-x","journal-title":"Telecommun. Syst."},{"key":"50_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"1","author":"AR Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 1, 46\u201355 (2003). \n                    https:\/\/doi.org\/10.1109\/MPRV.2003.1186725","journal-title":"IEEE Pervasive Comput."},{"issue":"1","key":"50_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1\u201318 (2008). \n                    https:\/\/doi.org\/10.1109\/TMC.2007.1062","journal-title":"IEEE Trans. Mob. Comput."},{"key":"50_CR10","doi-asserted-by":"publisher","unstructured":"Ying, B., Makrakis, D.: Protecting location privacy with clustering anonymization in vehicular networks. In: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 305\u2013310. IEEE (2014). \n                    https:\/\/doi.org\/10.1109\/INFCOMW.2014.6849249","DOI":"10.1109\/INFCOMW.2014.6849249"},{"key":"50_CR11","doi-asserted-by":"publisher","unstructured":"Aryan, A., Singh, S.: Protecting location privacy in augmented reality using k-anonymization and pseudo-id. In: 2010 International Conference on Computer and Communication Technology (ICCCT), pp. 119\u2013124. IEEE (2010). \n                    https:\/\/doi.org\/10.1109\/ICCCT.2010.5640424","DOI":"10.1109\/ICCCT.2010.5640424"},{"key":"50_CR12","doi-asserted-by":"publisher","unstructured":"Wightman, P., Coronell, W., Jabba, D., Jimeno, M., Labrador, M.: Evaluation of location obfuscation techniques for privacy in location based information systems. In: 2011 IEEE Third Latin-American Conference on Communications, pp. 1\u20136. IEEE (2011). \n                    https:\/\/doi.org\/10.1109\/LatinCOM.2011.6107399","DOI":"10.1109\/LatinCOM.2011.6107399"},{"key":"50_CR13","doi-asserted-by":"publisher","unstructured":"Wightman, P., Zurbaran, M., Zurek, E., Salazar, A., Jabba, D., Jimeno, M.: \n                    \n                      \n                    \n                    $$\\theta $$\n                  -Rand: random noise-based location obfuscation based on circle sectors. In: 2013 IEEE Symposium on Industrial Electronics and Applications, pp. 100\u2013104. IEEE (2013). \n                    https:\/\/doi.org\/10.1109\/ISIEA.2013.6738976","DOI":"10.1109\/ISIEA.2013.6738976"},{"key":"50_CR14","doi-asserted-by":"publisher","unstructured":"Wightman, P., Zurbar\u00e1n, M., Santander, A.: High variability geographical obfuscation for location privacy. In: 2013 47th International Carnahan conference on security technology (ICCST), pp. 1\u20136. IEEE (2013). \n                    https:\/\/doi.org\/10.1109\/CCST.2013.6922079","DOI":"10.1109\/CCST.2013.6922079"},{"key":"50_CR15","doi-asserted-by":"publisher","unstructured":"Shao, J., Lu, R., Lin, X.: FINE: a fine-grained privacy-preserving location-based service framework for mobile devices. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 244\u2013252. IEEE (2014). \n                    https:\/\/doi.org\/10.1109\/INFOCOM.2014.6847945","DOI":"10.1109\/INFOCOM.2014.6847945"},{"key":"50_CR16","doi-asserted-by":"publisher","unstructured":"Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical k nearest neighbor queries with location privacy. In: 2014 IEEE 30th International Conference on Data Engineering, pp. 640\u2013651. IEEE (2014). \n                    https:\/\/doi.org\/10.1109\/ICDE.2014.6816688","DOI":"10.1109\/ICDE.2014.6816688"},{"key":"50_CR17","doi-asserted-by":"publisher","unstructured":"Lu, H., Jensen, C.S., Yiu, M.L.: PAD: privacy-area aware, dummy-based location privacy in mobile services. In: Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, pp. 16\u201323. ACM (2008). \n                    https:\/\/doi.org\/10.1145\/1626536.1626540","DOI":"10.1145\/1626536.1626540"},{"key":"50_CR18","doi-asserted-by":"publisher","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 754\u2013762. IEEE (2014). \n                    https:\/\/doi.org\/10.1109\/INFOCOM.2014.6848002","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"50_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Data and Applications Security XXI","author":"CA Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) DBSec 2007. LNCS, vol. 4602, pp. 47\u201360. Springer, Heidelberg (2007). \n                    https:\/\/doi.org\/10.1007\/978-3-540-73538-0_4"},{"issue":"1","key":"50_CR20","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/TDSC.2009.25","volume":"8","author":"CA Ardagna","year":"2011","unstructured":"Ardagna, C.A., Cremonini, M., di Vimercati, S.D.C., Samarati, P.: An obfuscation-based approach for protecting location privacy. Trans. Dependable Secure Comput. 8(1), 13\u201327 (2011). \n                    https:\/\/doi.org\/10.1109\/TDSC.2009.25","journal-title":"Trans. Dependable Secure Comput."},{"key":"50_CR21","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Chen, K., Lian, Y.: A path-based access control method for location obfuscation in mobile environment. In: 2012 IEEE Symposium on Electrical and Electronics Engineering (EEESYM), pp. 570\u2013573. IEEE (2012). \n                    https:\/\/doi.org\/10.1109\/EEESym.2012.6258721","DOI":"10.1109\/EEESym.2012.6258721"},{"key":"50_CR22","unstructured":"Get Started with Contiki. \n                    http:\/\/www.contiki-os.org\/\n                    \n                  . Accessed 31 Jan 2019"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9942-8_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T03:18:37Z","timestamp":1563419917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9942-8_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811399411","9789811399428"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9942-8_50","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghazibad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds0a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"621","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}