{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T19:43:10Z","timestamp":1769888590553,"version":"3.49.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s00607-025-01591-z","type":"journal-article","created":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T14:09:02Z","timestamp":1764684542000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cost-efficient privacy-preserving service deployment for SDN-based edge computing"],"prefix":"10.1007","volume":"108","author":[{"given":"Jingsen","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shoulu","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Xiulei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kailan","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,2]]},"reference":[{"key":"1591_CR1","doi-asserted-by":"publisher","first-page":"2329","DOI":"10.1109\/COMST.2022.3211462","volume":"24","author":"FS Abkenar","year":"2022","unstructured":"Abkenar FS, Ramezani P, Iranmanesh S, Murali S, Chulerttiyawong D, Wan X, Jamalipour A, Raad R (2022) A survey on mobility of edge computing networks in IoT: state-of-the-art, architectures, and challenges. IEEE Commun Surv Tutor 24:2329\u20132365","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"1591_CR2","doi-asserted-by":"publisher","first-page":"3276","DOI":"10.1109\/TNSM.2022.3159670","volume":"19","author":"A Nouruzi","year":"2022","unstructured":"Nouruzi A, Zakeri A, Javan MR, Mokari N, Hussain R, Kazmi SA (2022) Online service provisioning in NFV-enabled networks using deep reinforcement learning. IEEE Trans Netw Serv Manag 19(3):3276\u20133289","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"12","key":"1591_CR3","doi-asserted-by":"publisher","first-page":"4597","DOI":"10.1109\/TPDS.2022.3199392","volume":"33","author":"B Yi","year":"2022","unstructured":"Yi B, Wang X, Huang M, Das SK, Li K (2022) Fairness-aware VNF sharing and rate coordination for high efficient service scheduling. IEEE Trans Parallel Distrib Syst 33(12):4597\u20134611","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1591_CR4","doi-asserted-by":"crossref","unstructured":"Lanka S, Win TA, Eshan S (2021) A review on edge computing and 5G in IoT: architecture and applications. In: 2021 5th International conference on electronics, communication and aerospace technology (ICECA). IEEE, pp 532\u2013536","DOI":"10.1109\/ICECA52323.2021.9675934"},{"key":"1591_CR5","doi-asserted-by":"publisher","first-page":"3790","DOI":"10.1109\/TMC.2022.3147871","volume":"22","author":"H Gao","year":"2022","unstructured":"Gao H, Feng J, Xiao Y, Zhang B, Wang W (2022) A UAV-assisted multi-task allocation method for mobile crowd sensing. IEEE Trans Mob Comput 22:3790\u20133804","journal-title":"IEEE Trans Mob Comput"},{"issue":"3","key":"1591_CR6","doi-asserted-by":"publisher","first-page":"3594","DOI":"10.1109\/TITS.2022.3225269","volume":"24","author":"B Liu","year":"2022","unstructured":"Liu B, Ni W, Liu RP, Guo YJ, Zhu H (2022) Optimal routing of unmanned aerial vehicle for joint goods delivery and in-situ sensing. IEEE Trans Intell Transp Syst 24(3):3594\u20133599","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"8","key":"1591_CR7","doi-asserted-by":"publisher","first-page":"5091","DOI":"10.1109\/TITS.2020.3043351","volume":"22","author":"Z Su","year":"2021","unstructured":"Su Z, Dai M, Xu Q, Li R, Zhang H (2021) UAV enabled content distribution for internet of connected vehicles in 5G heterogeneous networks. IEEE Trans Intell Transp Syst 22(8):5091\u20135102","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1591_CR8","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1109\/TGCN.2022.3187463","volume":"7","author":"Z Zhou","year":"2022","unstructured":"Zhou Z, Chen X, Liao H, Gan Z, Xiao F, Tu Q, Sun W, Liu Y, Mumtaz S, Guizani M (2022) Collaborative learning-based network resource scheduling and route management for multi-mode green IoT. IEEE Trans Green Commun Netw 7:928\u2013939","journal-title":"IEEE Trans Green Commun Netw"},{"key":"1591_CR9","unstructured":"Sun X, Li C, Yan L, Cao S (2022) A modeling of TSRCG and resource optimization for multi-task delivery guarantee algorithm based on CGR strategy in LEO satellite network. arXiv preprint arXiv:2209.13227"},{"key":"1591_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2022.102397","volume":"79","author":"Y Lin","year":"2023","unstructured":"Lin Y, Xu Y, Zhu J, Wang X, Wang L, Hu G (2023) MLATSO: a method for task scheduling optimization in multi-load AGVs-based systems. Robot Comput Integr Manuf 79:102397","journal-title":"Robot Comput Integr Manuf"},{"issue":"4","key":"1591_CR11","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/MWC.2019.1800371","volume":"26","author":"H Peng","year":"2019","unstructured":"Peng H, Ye Q, Shen XS (2019) SDN-based resource management for autonomous vehicular networks: a multi-access edge computing approach. IEEE Wirel Commun 26(4):156\u2013162","journal-title":"IEEE Wirel Commun"},{"key":"1591_CR12","doi-asserted-by":"publisher","first-page":"5124960","DOI":"10.1155\/2022\/5124960","volume":"2022","author":"C Chen","year":"2022","unstructured":"Chen C, Xue F, Lu Z, Tang Z, Li C et al (2022) RLMR: reinforcement learning based multipath routing for SDN. Wirel Commun Mob Comput 2022:5124960","journal-title":"Wirel Commun Mob Comput"},{"issue":"6","key":"1591_CR13","doi-asserted-by":"publisher","first-page":"4378","DOI":"10.1016\/j.jfranklin.2023.01.033","volume":"360","author":"K Shi","year":"2023","unstructured":"Shi K, Wu Z, Jiang B, Karimi HR (2023) Dynamic path planning of mobile robot based on improved simulated annealing algorithm. J Franklin Inst 360(6):4378\u20134398","journal-title":"J Franklin Inst"},{"key":"1591_CR14","doi-asserted-by":"publisher","first-page":"18971","DOI":"10.1109\/JIOT.2023.3235382","volume":"10","author":"D Basu","year":"2023","unstructured":"Basu D, Kal S, Ghosh U, Datta R (2023) Drive: dynamic resource introspection and VNF embedding for 5G using machine learning. IEEE Internet Things J 10:18971\u201318979","journal-title":"IEEE Internet Things J"},{"key":"1591_CR15","doi-asserted-by":"crossref","unstructured":"Jadav NK, Gupta R, Tanwar S (2023) Ai and onion routing-based secure architectural framework for IoT-based critical infrastructure. In: 2023 13th International conference on cloud computing, data science and engineering (confluence). IEEE, pp 559\u2013564","DOI":"10.1109\/Confluence56041.2023.10048875"},{"key":"1591_CR16","doi-asserted-by":"crossref","unstructured":"Tusa F, Griffin D, Rio M (2021) Private routing in the internet. In: 2021 IEEE 22nd international conference on high performance switching and routing (HPSR)","DOI":"10.1109\/HPSR52026.2021.9481808"},{"key":"1591_CR17","doi-asserted-by":"crossref","unstructured":"Jadav NK, Gupta R, Kakkar R, Tanwar S (2023) Intelligent onion routing and UAV-based electronic health record sharing framework for healthcare 4.0. In: IEEE INFOCOM 2023-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 1\u20136","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10225955"},{"issue":"2","key":"1591_CR18","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1177\/10439862231157553","volume":"39","author":"AK Ghazi-Tehrani","year":"2023","unstructured":"Ghazi-Tehrani AK (2023) Mapping real-world use of the onion router. J Contemp Crim Justice 39(2):239\u2013256","journal-title":"J Contemp Crim Justice"},{"key":"1591_CR19","doi-asserted-by":"crossref","unstructured":"Yu Y, Yu F, Zhang M, Wang D, Soyata T, Liu C, Chen X (2023) GACER: Granularity-Aware ConcurrEncy regulation for multi-tenant deep learning","DOI":"10.1145\/3676536.3676718"},{"key":"1591_CR20","doi-asserted-by":"crossref","unstructured":"Liu Z, Leng J, Zhang Z, Chen Q, Li C, Guo M (2022) VELTAIR: towards high-performance multi-tenant deep learning services via adaptive compilation and scheduling. In: Proceedings of the 27th ACM international conference on architectural support for programming languages and operating systems, pp 388\u2013401","DOI":"10.1145\/3503222.3507752"},{"key":"1591_CR21","doi-asserted-by":"publisher","first-page":"45820","DOI":"10.1109\/ACCESS.2022.3168972","volume":"10","author":"M Rahouti","year":"2022","unstructured":"Rahouti M, Xiong K, Xin Y, Jagatheesaperumal SK, Ayyash M, Shaheed M (2022) SDN security review: threat taxonomy, implications, and open challenges. IEEE Access 10:45820\u201345854","journal-title":"IEEE Access"},{"key":"1591_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100588","volume":"20","author":"M Bhuyan","year":"2022","unstructured":"Bhuyan M, Kashihara S, Fall D, Taenaka Y, Kadobayashi Y et al (2022) A survey on blockchain, SDN and NFV for the smart-home security. Internet Things 20:100588","journal-title":"Internet Things"},{"key":"1591_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ribaf.2022.101826","volume":"64","author":"A Jabbar","year":"2023","unstructured":"Jabbar A, Geebren A, Hussain Z, Dani S, Ul-Durar S (2023) Investigating individual privacy within CBDC: a privacy calculus perspective. Res Int Bus Financ 64:101826","journal-title":"Res Int Bus Financ"},{"issue":"4","key":"1591_CR24","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s11280-016-0403-3","volume":"20","author":"I Memon","year":"2017","unstructured":"Memon I, Arain QA (2017) Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web 20(4):639\u2013672","journal-title":"World Wide Web"},{"key":"1591_CR25","doi-asserted-by":"publisher","first-page":"9627","DOI":"10.1109\/TITS.2023.3272500","volume":"24","author":"B Liu","year":"2023","unstructured":"Liu B, Ni W, Liu RP, Guo YJ, Zhu H (2023) Decentralized, privacy-preserving routing of cellular-connected unmanned aerial vehicles for joint goods delivery and sensing. IEEE Trans Intell Transport Syst 24:9627\u20139641","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"1591_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103607","volume":"213","author":"HJ Hadi","year":"2023","unstructured":"Hadi HJ, Cao Y, Nisa KU, Jamil AM, Ni Q (2023) A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. J Netw Comput Appl 213:103607","journal-title":"J Netw Comput Appl"},{"key":"1591_CR27","doi-asserted-by":"publisher","first-page":"77541","DOI":"10.1109\/ACCESS.2019.2921274","volume":"7","author":"K Yan","year":"2019","unstructured":"Yan K, Luo G, Zheng X, Tian L, Sai AMVV (2019) A comprehensive location-privacy-awareness task selection mechanism in mobile crowd-sensing. IEEE Access 7:77541\u201377554","journal-title":"IEEE Access"},{"key":"1591_CR28","doi-asserted-by":"crossref","unstructured":"Pang X, Wang Z, Li J, Zhou R, Ren J, Li Z (2022) Towards online privacy-preserving computation offloading in mobile edge computing. In: IEEE INFOCOM 2022-IEEE conference on computer communications. IEEE, pp 1179\u20131188","DOI":"10.1109\/INFOCOM48880.2022.9796748"},{"key":"1591_CR29","doi-asserted-by":"crossref","unstructured":"Wang H, Wang E, Yang Y, Wu J, Dressler F (2022) Privacy-preserving online task assignment in spatial crowdsourcing: a graph-based approach. In: IEEE INFOCOM 2022-IEEE conference on computer communications. IEEE, pp 570\u2013579","DOI":"10.1109\/INFOCOM48880.2022.9796827"},{"key":"1591_CR30","doi-asserted-by":"crossref","unstructured":"Niu B, Chen Y, Wang B, Wang Z, Li F, Cao J (2021) AdaPDP: adaptive personalized differential privacy. In: IEEE INFOCOM 2021-IEEE conference on computer communications. IEEE, pp 1\u201310","DOI":"10.1109\/INFOCOM42981.2021.9488825"},{"issue":"2","key":"1591_CR31","doi-asserted-by":"publisher","first-page":"2141","DOI":"10.32604\/csse.2023.030984","volume":"45","author":"P Tam","year":"2023","unstructured":"Tam P, Math S, Kim S (2023) Adaptive partial task offloading and virtual resource placement in SDN\/NFV-based network softwarization. Comput Syst Sci Eng 45(2):2141\u20132154","journal-title":"Comput Syst Sci Eng"},{"key":"1591_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103601","volume":"213","author":"H Abualola","year":"2023","unstructured":"Abualola H, Mizouni R, Otrok H, Singh S, Barada H (2023) A matching game-based crowdsourcing framework for last-mile delivery: ground-vehicles and unmanned-aerial vehicles. J Netw Comput Appl 213:103601","journal-title":"J Netw Comput Appl"},{"key":"1591_CR33","doi-asserted-by":"crossref","unstructured":"Deng Y, Zhang H, Chen X, Fang Y (2023) Spectrum-aware multi-hop task routing in vehicle-assisted collaborative edge computing. arXiv preprint arXiv:2304.07422","DOI":"10.1109\/TVT.2023.3312142"},{"issue":"21","key":"1591_CR34","doi-asserted-by":"publisher","first-page":"19270","DOI":"10.1109\/JIOT.2023.3281609","volume":"10","author":"W Hua","year":"2023","unstructured":"Hua W, Zhou Z, Huang L (2023) Location privacy-aware offloading for MEC-enabled IoT: optimality and heuristics. IEEE Internet Things J 10(21):19270\u201319281","journal-title":"IEEE Internet Things J"},{"key":"1591_CR35","doi-asserted-by":"crossref","unstructured":"Dijkstra EW (2022) A note on two problems in connexion with graphs. In: Edsger Wybe Dijkstra: his life, work, and legacy, pp 287\u2013290","DOI":"10.1145\/3544585.3544600"},{"issue":"1","key":"1591_CR36","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/TFUZZ.2020.2986982","volume":"29","author":"M Ali","year":"2020","unstructured":"Ali M, Adnan M, Tariq M, Poor HV (2020) Load forecasting through estimated parametrized based fuzzy inference system in smart grids. IEEE Trans Fuzzy Syst 29(1):156\u2013165","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"1591_CR37","first-page":"1","volume":"71","author":"M Liu","year":"2022","unstructured":"Liu M, Li Z, Li Y, Liu Y (2022) A fast and accurate method of power line intelligent inspection based on edge computing. IEEE Trans Instrum Meas 71:1\u201312","journal-title":"IEEE Trans Instrum Meas"},{"issue":"6","key":"1591_CR38","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1145\/367766.368168","volume":"5","author":"RW Floyd","year":"1962","unstructured":"Floyd RW (1962) Algorithm 97: shortest path. Commun ACM 5(6):345","journal-title":"Commun ACM"},{"issue":"1\u20132","key":"1591_CR39","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn HW (1955) The Hungarian method for the assignment problem. Naval Res Logist Q 2(1\u20132):83\u201397","journal-title":"Naval Res Logist Q"},{"issue":"4","key":"1591_CR40","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1587\/transcom.2022EBN0001","volume":"106","author":"T Tachibana","year":"2023","unstructured":"Tachibana T, Hirota Y, Suzuki K, Tsuritani T, Hasegawa H (2023) Metropolitan area network model design using regional railways information for beyond 5G research. IEICE Trans Commun 106(4):296\u2013306","journal-title":"IEICE Trans Commun"},{"key":"1591_CR41","unstructured":"https:\/\/www.ieice.org\/cs\/pn\/eng\/jpnm_en.html"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01591-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-025-01591-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01591-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T05:19:13Z","timestamp":1769836753000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-025-01591-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,2]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["1591"],"URL":"https:\/\/doi.org\/10.1007\/s00607-025-01591-z","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,2]]},"assertion":[{"value":"18 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"1"}}