{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T05:40:02Z","timestamp":1746337202173,"version":"3.40.4"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T00:00:00Z","timestamp":1407974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Distrib Parallel Databases"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s10619-014-7152-z","type":"journal-article","created":{"date-parts":[[2014,8,13]],"date-time":"2014-08-13T16:03:43Z","timestamp":1407945823000},"page":"319-352","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A privacy-aware monitoring algorithm for moving $$k$$ k -nearest neighbor queries in road networks"],"prefix":"10.1007","volume":"33","author":[{"given":"Hyung-Ju","family":"Cho","sequence":"first","affiliation":[]},{"given":"Se Jin","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Rize","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Tae-Sun","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,14]]},"reference":[{"key":"7152_CR1","doi-asserted-by":"crossref","unstructured":"Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacy grid. In: Proceedings of WWW, pp. 237\u2013246, (2008)","DOI":"10.1145\/1367497.1367531"},{"key":"7152_CR2","doi-asserted-by":"crossref","unstructured":"Bamba, B., Liu, L., Iyengar, A., Yu, P.: Distributed processing of spatial alarms: a safe region-based approach. In: Proceedings of ICDCS, pp. 207\u2013214, (2009)","DOI":"10.1109\/ICDCS.2009.25"},{"key":"7152_CR3","doi-asserted-by":"crossref","unstructured":"Bao, J., Chow, C., Mokbel, M., Ku, W.: Efficient evaluation of $$k$$ k -range nearest neighbor queries in road networks. In: Proceedings of Mobile Data Management, pp. 115\u2013124, (2010)","DOI":"10.1109\/MDM.2010.40"},{"issue":"2","key":"7152_CR4","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"T Brinkhoff","year":"2002","unstructured":"Brinkhoff, T.: A framework for generating network-based moving cbjects. GeoInformatica 6(2), 153\u2013180 (2002)","journal-title":"GeoInformatica"},{"key":"7152_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures, pp. 393\u2013412. In: Proceedings of Privacy Enhancing Technologies, Workshop (2006)","DOI":"10.1007\/11957454_23"},{"key":"7152_CR6","unstructured":"Cho, H., Chung, C.: An efficient scalable approach to CNN queries in a road network. In: Proceedings of VLDB, pp. 865\u2013876, (2005)"},{"issue":"2","key":"7152_CR7","first-page":"107","volume":"8","author":"H Cho","year":"2012","unstructured":"Cho, H., Choe, S., Chung, T.: A distributed approach to continuous monitoring of constrained $$k$$ k -nearest neighbor queries in road networks. Mob. Inf. Syst. 8(2), 107\u2013126 (2012)","journal-title":"Mob. Inf. Syst."},{"issue":"5","key":"7152_CR8","doi-asserted-by":"crossref","first-page":"1323","DOI":"10.1016\/j.jss.2012.12.034","volume":"86","author":"H Cho","year":"2013","unstructured":"Cho, H.: Continuous range $$k$$ k -nearest neighbor queries in vehicular ad hoc networks. J. Syst. Softw. 86(5), 1323\u20131332 (2013)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"7152_CR9","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/s10707-009-0099-y","volume":"15","author":"C Chow","year":"2011","unstructured":"Chow, C., Mokbel, M., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351\u2013380 (2011)","journal-title":"GeoInformatica"},{"issue":"1","key":"7152_CR10","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/TMC.2010.145","volume":"10","author":"C Chow","year":"2011","unstructured":"Chow, C., Mokbel, M., He, T.: A privacy-preserving location monitoring system for wireless sensor networks. IEEE Trans. Mob. Comput. 10(1), 94\u2013107 (2011)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"7152_CR11","doi-asserted-by":"crossref","unstructured":"Chow, C., Mokbel, M.: Enabling private continuous queries for revealed user locations. In: Proceedings of SSTD, pp. 258\u2013275, (2007)","DOI":"10.1007\/978-3-540-73540-3_15"},{"issue":"4","key":"7152_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"C Chow","year":"2009","unstructured":"Chow, C., Mokbel, M., Aref, W.: Casper*: Query processing for location services without compromising privacy. ACM Trans. Database Syst. 34(4), 1\u201345 (2009)","journal-title":"ACM Trans. Database Syst."},{"issue":"3","key":"7152_CR13","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1007\/s10707-010-0117-0","volume":"15","author":"C Chow","year":"2011","unstructured":"Chow, C., Mokbel, M., Bao, J., Liu, X.: Query-aware location anonymization for road networks. GeoInformatica 15(3), 571\u2013607 (2011)","journal-title":"GeoInformatica"},{"key":"7152_CR14","first-page":"595","volume-title":"Introduction to Algorithms","author":"T Cormen","year":"2001","unstructured":"Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithms, 2nd edn, pp. 595\u2013601. MIT Press, Cambridge (2001)","edition":"2"},{"key":"7152_CR15","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"E Dijkstra","year":"1959","unstructured":"Dijkstra, E.: A note on two problems in connexion with graphs. Numer. Math. 1, 269\u2013271 (1959)","journal-title":"Numer. Math."},{"key":"7152_CR16","doi-asserted-by":"crossref","unstructured":"Divanis, A., Verykios, V., Mokbel, M.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of SDM, pp. 942\u2013953, (2009)","DOI":"10.1137\/1.9781611972795.81"},{"issue":"1","key":"7152_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized $$k$$ k -anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1\u201318 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"7152_CR18","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of SIGMOD, pp. 121\u2013132, (2008)","DOI":"10.1145\/1376616.1376631"},{"key":"7152_CR19","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of WWW, pp. 371\u2013380, (2007)","DOI":"10.1145\/1242572.1242623"},{"key":"7152_CR20","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: a mobilea peer-to-peer system for anonymous location-based queries. In: Proceedings of SSTD, pp. 221\u2013238, (2007)","DOI":"10.1007\/978-3-540-73540-3_13"},{"key":"7152_CR21","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Hoh, B.: On the anonymity of periodic location samples. In: Proceedings of SPC, pp. 179\u2013192, (2005)","DOI":"10.1007\/978-3-540-32004-3_19"},{"key":"7152_CR22","unstructured":"Hashem, T., Kulik, L., Zhang, R.: Protecting trajectory privacy for moving KNN queries. To appear in VLDB Journal."},{"key":"7152_CR23","doi-asserted-by":"crossref","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in GPS traces via uncertainty-aware path cloaking. In: Proceedings of CCS, pp. 161\u2013171, (2007)","DOI":"10.1145\/1315245.1315266"},{"key":"7152_CR24","doi-asserted-by":"crossref","unstructured":"Hu, H., Xu, J., Lee, D.: A generic framework for monitoring continuous spatial queries over moving objects. In: Proceedngs of SIGMOD, pp. 479\u2013490, (2005)","DOI":"10.1145\/1066157.1066212"},{"issue":"3","key":"7152_CR25","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1109\/TKDE.2009.86","volume":"22","author":"H Hu","year":"2010","unstructured":"Hu, H., Xu, J., Lee, D.: PAM: an efficient and privacy-aware monitoring framework for continuously moving objects. IEEE Trans. Knowl. Data Eng. 22(3), 404\u2013419 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7152_CR26","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: Proceedings of ICDE Workshops, pp. 1248, (2005)","DOI":"10.1109\/ICDE.2005.269"},{"key":"7152_CR27","doi-asserted-by":"crossref","unstructured":"Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of SSTD, pp. 239\u2013257, (2007)","DOI":"10.1007\/978-3-540-73540-3_14"},{"key":"7152_CR28","doi-asserted-by":"crossref","unstructured":"Ku, W., Zimmermann, R., Peng, W., Shroff, S.: Privacy protected query processing on spatial networks. In: Proceedings of ICDE Workshops, pp. 215\u2013220, (2007)","DOI":"10.1109\/ICDEW.2007.4400994"},{"key":"7152_CR29","doi-asserted-by":"crossref","unstructured":"Lee, K., Lee, W., Leong, H., Zheng, B.: Navigational path privacy protection: navigational path privacy protection. In: Proceedings of CIKM, pp. 691\u2013700, (2009)","DOI":"10.1145\/1645953.1646041"},{"key":"7152_CR30","doi-asserted-by":"crossref","unstructured":"Li, P., Peng, W., Wang, T., Ku, W., Xu, J., Hamilton Jr, J.: A cloaking algorithm based on spatial networks for location privacy. In: Proceedings of SUTC, pp. 90\u201397, (2008)","DOI":"10.1109\/SUTC.2008.56"},{"key":"7152_CR31","doi-asserted-by":"crossref","unstructured":"Meyerowitz, J., Choudhury, R.: Hiding stars with fireworks: location privacy through camouflage. In: Proceedings of MOBICOM, pp. 345\u2013356, (2009)","DOI":"10.1145\/1614320.1614358"},{"key":"7152_CR32","unstructured":"Mokbel, M., Chow, C., Aref, W.: The new Casper: query processing for location services without compromising privacy. In: Proceedings of VLDB, pp. 763\u2013774, (2006)"},{"issue":"1","key":"7152_CR33","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TKDE.2009.48","volume":"22","author":"K Mouratidis","year":"2010","unstructured":"Mouratidis, K., Yiu, M.: Anonymous query processing in road networks. IEEE Trans. Knowl. Data Eng. 22(1), 2\u201315 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7152_CR34","unstructured":"Mouratidis, K., Yiu, M., Papadias, D., Mamoulis, N.: Continuous nearest neighbor monitoring in road networks. In: Proceedings of VLDB, pp. 43\u201354, (2006)"},{"key":"7152_CR35","doi-asserted-by":"crossref","unstructured":"Shokri, R., Papadimitratos, P., Theodorakopoulos, G., Hubaux, J.: Collaborative location privacy. In: Proceedings of MASS, pp. 500\u2013509 (2011)","DOI":"10.1109\/MASS.2011.55"},{"issue":"5","key":"7152_CR36","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: $$k$$ k -anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"7152_CR37","doi-asserted-by":"crossref","unstructured":"Palanisamy, B., Liu, L.: MobiMix: Protecting location privacy with mix-zones over road networks. In: Proceedings of ICDE, pp. 494\u2013505, (2011)","DOI":"10.1109\/ICDE.2011.5767898"},{"issue":"8","key":"7152_CR38","doi-asserted-by":"crossref","first-page":"1506","DOI":"10.1109\/TKDE.2011.105","volume":"24","author":"X Pan","year":"2012","unstructured":"Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506\u20131519 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7152_CR39","doi-asserted-by":"crossref","unstructured":"Papadias, D., Zhang, J., Mamoulis, N., Tao, Y.: Query processing in spatial network databases. In: Proceedings of VLDB, pp. 802\u2013813, (2003)","DOI":"10.1016\/B978-012722442-8\/50076-8"},{"issue":"1","key":"7152_CR40","first-page":"1042","volume":"2","author":"T Wang","year":"2009","unstructured":"Wang, T., Liu, L.: Privacy-aware mobile services over road networks. PVLDB 2(1), 1042\u20131053 (2009)","journal-title":"PVLDB"},{"issue":"3","key":"7152_CR41","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1109\/TPDS.2009.65","volume":"21","author":"J Xu","year":"2010","unstructured":"Xu, J., Tang, X., Hu, H., Du, J.: Privacy-conscious location-based queries in mobile environments. IEEE Trans. Parallel Distrib. Syst. 21(3), 313\u2013326 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7152_CR42","doi-asserted-by":"crossref","unstructured":"Xu, T., Cai, Y.L: Location anonymity in continuous location-based services. In: Proceedings of ACM GIS, (2007)","DOI":"10.1145\/1341012.1341062"},{"key":"7152_CR43","doi-asserted-by":"crossref","unstructured":"Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of INFOCOM, pp. 547\u2013555, (2008)","DOI":"10.1109\/INFOCOM.2008.103"},{"key":"7152_CR44","doi-asserted-by":"crossref","unstructured":"Yiu, M., Jensen, C., Huang, X., Lu, H.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of ICDE, pp. 366\u2013375, (2008)","DOI":"10.1109\/ICDE.2008.4497445"},{"key":"7152_CR45","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.datak.2011.10.001","volume":"72","author":"D Yung","year":"2012","unstructured":"Yung, D., Yiu, M., Lo, E.: A safe-exit approach for efficient network-based moving range queries. Data Knowl. Eng. 72, 126\u2013147 (2012)","journal-title":"Data Knowl. Eng."},{"key":"7152_CR46","unstructured":"Real Datasets for Spatial Databases, http:\/\/www.cs.fsu.edu\/~lifeifei\/SpatialDataset.htm"}],"container-title":["Distributed and Parallel Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10619-014-7152-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10619-014-7152-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10619-014-7152-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T05:08:29Z","timestamp":1746335309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10619-014-7152-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,14]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["7152"],"URL":"https:\/\/doi.org\/10.1007\/s10619-014-7152-z","relation":{},"ISSN":["0926-8782","1573-7578"],"issn-type":[{"type":"print","value":"0926-8782"},{"type":"electronic","value":"1573-7578"}],"subject":[],"published":{"date-parts":[[2014,8,14]]}}}