{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:35Z","timestamp":1740149015256,"version":"3.37.3"},"reference-count":12,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502047"],"award-info":[{"award-number":["61502047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002888","name":"Beijing Municipal Commission of Education","doi-asserted-by":"publisher","award":["61502047"],"award-info":[{"award-number":["61502047"]}],"id":[{"id":"10.13039\/501100002888","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>Location-aware publish\/subscribe is an important location-based service based on server-initiated model. Often times, the owner of massive spatio-textual messages and subscriptions outsources its location-aware publish\/subscribe services to a third-party service provider, for example, cloud service provider, who is responsible for delivering messages to their relevant subscribers. The issue arising here is that the messages delivered by the service provider might be tailored for profit purposes, intentionally or not. Therefore, it is essential to develop mechanisms which allow subscribers to verify the correctness of the messages delivered by the service provider. In this paper, we study the problem of authenticating messages in outsourced location-aware publish\/subscribe services. We propose an authenticated framework which not only can deliver the messages efficiently but also can make the subscribers\u2019 authentication available with low cost. Extensive experiments on a real-world dataset demonstrate the effectiveness and efficiency of our proposed authenticated framework.<\/jats:p>","DOI":"10.1155\/2017\/4215425","type":"journal-article","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T17:01:14Z","timestamp":1506358874000},"page":"1-15","source":"Crossref","is-referenced-by-count":1,"title":["Authenticated Location-Aware Publish\/Subscribe Services in Untrusted Outsourced Environments"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6783-1103","authenticated-orcid":true,"given":"Han","family":"Yan","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4266-7527","authenticated-orcid":true,"given":"Sen","family":"Su","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Siyao","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"311","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2012.687431"},{"journal-title":"VLDB","first-page":"147","year":"2007","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-009-0145-2"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-009-0145-2"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2656336"},{"journal-title":"VLDB","first-page":"126","year":"2008","key":"16"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.14778\/2732219.2732224"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18120-2_36"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18120-2_33"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2350252"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2016.0095"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.267"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/4215425.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/4215425.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/4215425.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T17:01:16Z","timestamp":1506358876000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/4215425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":12,"alternative-id":["4215425","4215425"],"URL":"https:\/\/doi.org\/10.1155\/2017\/4215425","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2017]]}}}