{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:28:48Z","timestamp":1742952528715,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811575297"},{"type":"electronic","value":"9789811575303"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-7530-3_38","type":"book-chapter","created":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:50:27Z","timestamp":1597333827000},"page":"501-513","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preservation of Future Trajectory Using Dummy Rotation Algorithm in Fog Computing"],"prefix":"10.1007","author":[{"given":"Shadan","family":"AlHamed","sequence":"first","affiliation":[]},{"given":"Mznah","family":"AlRodhaan","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,14]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Hong, H.J.: From cloud computing to fog computing: unleash the power of edge and end devices. In: Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, vol. 2017, pp. 331\u2013334 (2017)","DOI":"10.1109\/CloudCom.2017.53"},{"issue":"10","key":"38_CR2","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1002\/cpe.3485","volume":"28","author":"I Stojmenovic","year":"2016","unstructured":"Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of Fog computing and its security issues. Concurr. Comput. Pract. Exp. 28(10), 2991\u20133005 (2016)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"38_CR3","doi-asserted-by":"publisher","first-page":"19293","DOI":"10.1109\/ACCESS.2017.2749422","volume":"5","author":"M Mukherjee","year":"2017","unstructured":"Mukherjee, M., et al.: Security and privacy in fog computing: challenges. IEEE Access 5, 19293\u201319304 (2017)","journal-title":"IEEE Access"},{"issue":"1","key":"38_CR4","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s00779-012-0633-z","volume":"18","author":"M Wernke","year":"2012","unstructured":"Wernke, M., Skvortsov, P., D\u00fcrr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquitous Comput. 18(1), 163\u2013175 (2012). \nhttps:\/\/doi.org\/10.1007\/s00779-012-0633-z","journal-title":"Pers. Ubiquitous Comput."},{"issue":"1","key":"38_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2031331.2031335","volume":"13","author":"CY Chow","year":"2011","unstructured":"Chow, C.Y., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. ACM SIGKDD Explor. Newsl. 13(1), 19 (2011)","journal-title":"ACM SIGKDD Explor. Newsl."},{"issue":"2","key":"38_CR6","doi-asserted-by":"publisher","first-page":"108","DOI":"10.26599\/BDMA.2018.9020010","volume":"1","author":"R Wu","year":"2018","unstructured":"Wu, R., Luo, G., Shao, J., Tian, L., Peng, C.: Location prediction on trajectory data: a review. Big Data Min. Anal. 1(2), 108\u2013127 (2018)","journal-title":"Big Data Min. Anal."},{"key":"38_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1007\/11823285_96","volume-title":"Euro-Par 2006 Parallel Processing","author":"J Petzold","year":"2006","unstructured":"Petzold, J., Bagci, F., Trumler, W., Ungerer, T.: Comparison of different methods for next location prediction. In: Nagel, W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128, pp. 909\u2013918. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11823285_96"},{"issue":"1","key":"38_CR8","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TITS.2014.2331758","volume":"16","author":"S Qiao","year":"2015","unstructured":"Qiao, S., Shen, D., Wang, X., Han, N., Zhu, W.: A self-adaptive parameter selection trajectory prediction approach via hidden Markov models. IEEE Trans. Intell. Transp. Syst. 16(1), 284\u2013296 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"38_CR9","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.neucom.2017.05.101","volume":"278","author":"Y Qiao","year":"2018","unstructured":"Qiao, Y., Si, Z., Zhang, Y., Ben Abdesslem, F., Zhang, X., Yang, J.: A hybrid Markov-based model for human mobility prediction. Neurocomputing 278, 99\u2013109 (2018)","journal-title":"Neurocomputing"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Du, Y., Wang, C., Qiao, Y., Zhao, D., Guo, W.: A geographical location prediction method based on continuous time series Markov model. PLoS One 13(11), e0207063 (2018)","DOI":"10.1371\/journal.pone.0207063"},{"key":"38_CR11","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.is.2015.07.001","volume":"54","author":"M Chen","year":"2015","unstructured":"Chen, M., Yu, X., Liu, Y.: Mining moving patterns for predicting next location. Inf. Syst. 54, 156\u2013168 (2015)","journal-title":"Inf. Syst."},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Gambs, S., Killijian, M.O., Del Prado Cortez, M.N.: Next place prediction using mobility Markov chains. In: Proceedings of the First Workshop on Measurement, Privacy, and Mobility - MPM 2012, pp. 1\u20136 (2012)","DOI":"10.1145\/2181196.2181199"},{"issue":"2","key":"38_CR13","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TSC.2013.55","volume":"7","author":"RH Hwang","year":"2014","unstructured":"Hwang, R.H., Hsueh, Y.L., Chung, H.W.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126\u2013139 (2014)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"38_CR14","doi-asserted-by":"publisher","first-page":"e3437","DOI":"10.1002\/dac.3437","volume":"31","author":"I Memon","year":"2018","unstructured":"Memon, I., Chen, L., Arain, Q.A., Memon, H., Chen, G.: Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. Int. J. Commun Syst 31(1), e3437 (2018)","journal-title":"Int. J. Commun Syst"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Liao, D., Li, H., Sun, G., Anand, V.: Protecting user trajectory in location-based services. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136 (2015)","DOI":"10.1109\/GLOCOM.2015.7417512"},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jnca.2013.03.010","volume":"38","author":"S Gao","year":"2014","unstructured":"Gao, S., Ma, J., Sun, C., Li, X.: Balancing trajectory privacy and data utility using a personalized anonymization model. J. Netw. Comput. Appl. 38, 125\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"38_CR17","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.ins.2016.08.010","volume":"387","author":"T Peng","year":"2017","unstructured":"Peng, T., Liu, Q., Meng, D., Wang, G.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. (Ny) 387, 165\u2013179 (2017)","journal-title":"Inf. Sci. (Ny)"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Niu, B., Gao, S., Li, F., Li, H., Lu, Z.: Protection of location privacy in continuous LBSs against adversaries with background information. In: 2016 International Conference on Computing, Networking and Communications (ICNC), pp. 1\u20136 (2016)","DOI":"10.1109\/ICCNC.2016.7440649"},{"key":"38_CR19","doi-asserted-by":"publisher","first-page":"7692","DOI":"10.1109\/ACCESS.2017.2698078","volume":"5","author":"T Wang","year":"2017","unstructured":"Wang, T., et al.: Trajectory privacy preservation based on a fog structure for cloud location services. IEEE Access 5, 7692\u20137701 (2017)","journal-title":"IEEE Access"},{"key":"38_CR20","doi-asserted-by":"publisher","first-page":"22958","DOI":"10.1109\/ACCESS.2018.2829898","volume":"6","author":"S Hayashida","year":"2018","unstructured":"Hayashida, S., Amagata, D., Hara, T., Xie, X.: Dummy generation based on user-movement estimation for location privacy protection. IEEE Access 6, 22958\u201322969 (2018)","journal-title":"IEEE Access"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-7530-3_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T16:04:14Z","timestamp":1597334654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-7530-3_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811575297","9789811575303"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-7530-3_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OJS\/PKP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"251","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}