{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T15:25:15Z","timestamp":1775316315582,"version":"3.50.1"},"reference-count":26,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,12,16]],"date-time":"2018-12-16T00:00:00Z","timestamp":1544918400000},"content-version":"vor","delay-in-days":349,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002569","name":"Wonkwang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002569","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>\n                    An increasing amount of active research is being conducted to protect the locations of mobile device users. Users must tune to more data than they would like to in order to hide their location. In particular, if a user requests a query over\n                    <jats:italic>k<\/jats:italic>\n                    NN, the number of objects the user must receive may increase. Several studies have been proposed to solve these problems. However, problems have been identified during the course of query processing, such as errors and increased query processing times. When the tuning time is increased, the amount of data to download and the battery consumption of the client also increase. In this study, we propose the Privacy\u2010preserving Spatial Index (PSI), an index that allows users to reduce their tuning time while being satisfied with the results of their queries. The querier (q) requests the object in the area protecting his\/her location from the server. The server sends the requested data of points of interest (POIs) (DPOIs) in the Privacy\u2010preserving Region (PR) to q. Finally, q reduces tuning time by selectively tuning to the desired data of POIs (Dw) through PSI. The superiority of PSI over previous techniques is experimentally proven.\n                  <\/jats:p>","DOI":"10.1155\/2018\/2067047","type":"journal-article","created":{"date-parts":[[2018,12,16]],"date-time":"2018-12-16T18:30:37Z","timestamp":1544985037000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Privacy\u2010Preserving Spatial Index for Spatial Query Processing"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9802-7257","authenticated-orcid":false,"given":"Doohee","family":"Song","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2134-289X","authenticated-orcid":false,"given":"Moonbae","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1806-577X","authenticated-orcid":false,"given":"Kwangjin","family":"Park","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,12,16]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/2031331.2031335"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-013-7121-y"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155874"},{"key":"e_1_2_11_5_2","doi-asserted-by":"crossref","unstructured":"NiuB. ZhuX. LiW. LiH. WangY. andLuZ. A personalized two-tier cloaking scheme for privacy-aware location-based services Proceedings of the 2015 International Conference on Computing Networking and Communications ICNC 2015 2015 Garden Grove CA USA 94\u201398 https:\/\/doi.org\/10.1109\/ICCNC.2015.7069322 2-s2.0-84928019122.","DOI":"10.1109\/ICCNC.2015.7069322"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.011"},{"key":"e_1_2_11_7_2","doi-asserted-by":"crossref","unstructured":"NiuB. LiQ. ZhuX. CaoG. andLiH. Enhancing privacy through caching in location-based services Proceedings of the 34th IEEE Annual Conference on Computer Communications (IEEE INFOCOM \u203215) May 2015 Kowloon Hong Kong IEEE 1017\u20131025 https:\/\/doi.org\/10.1109\/infocom.2015.7218474 2-s2.0-84953810577.","DOI":"10.1109\/INFOCOM.2015.7218474"},{"key":"e_1_2_11_8_2","doi-asserted-by":"crossref","unstructured":"NiuB. ZhuX. ChiH. andLiH. 3PLUS: Privacy-preserving pseudo-location updating system in location-based services Proceedings of the 2013 IEEE Wireless Communications and Networking Conference WCNC 2013 April 2013 4564\u20134569 2-s2.0-84881582817.","DOI":"10.1109\/WCNC.2013.6555314"},{"key":"e_1_2_11_9_2","unstructured":"MokbelM. F. ChowC. Y. andArefW. G. The new Casper: query processing for location services without compromising privacy Proceedings of the 32nd International Conference on Very Large Data Bases 2006 763\u2013774."},{"key":"e_1_2_11_10_2","doi-asserted-by":"crossref","unstructured":"GhinitaG. KalnisP. KhoshgozaranA. ShahabiC. andTanK.-L. Private queries in location based services: anonymizers are not necessary Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD \u203208) 2008 121\u2013132 https:\/\/doi.org\/10.1145\/1376616.1376631.","DOI":"10.1145\/1376616.1376631"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2015.2388488"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/815613"},{"key":"e_1_2_11_13_2","doi-asserted-by":"crossref","unstructured":"NiuB. LiQ. ZhuX. CaoG. andLiH. Achieving k-anonymity in privacy-aware location-based services Proceedings of the IEEE International Conference on Computing Networking and Communications 2014 Toronto Canada IEEE 754\u2013762 https:\/\/doi.org\/10.1109\/INFOCOM.2014.6848002.","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijsh.2016.10.6.15"},{"key":"e_1_2_11_15_2","doi-asserted-by":"crossref","unstructured":"LiF. WanS. NiuB. LiH. andHeY. Time obfuscation-based privacy-preserving scheme for location-based services Proceedings of the 2016 IEEE Wireless Communications and Networking Conference (WCNC) April 2016 Doha Qatar 1\u20136 https:\/\/doi.org\/10.1109\/WCNC.2016.7564715.","DOI":"10.1109\/WCNC.2016.7564715"},{"key":"e_1_2_11_16_2","doi-asserted-by":"crossref","unstructured":"NiuB. GaoS. LiF. LiH. andLuZ. Protection of location privacy in continuous LBSs against adversaries with background information Proceedings of the International Conference on Computing Networking and Communications ICNC 2016 February 2016 1\u20136 2-s2.0-84966668076.","DOI":"10.1109\/ICCNC.2016.7440649"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.87"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.87"},{"key":"e_1_2_11_19_2","doi-asserted-by":"crossref","unstructured":"YiX. PauletR. BertinoE. andVaradharajanV. Practical k nearest neighbor queries with location privacy Proceedings of the 30th IEEE International Conference on Data Engineering (ICDE \u203214) April 2014 Chicago Ill USA IEEE 640\u2013651 https:\/\/doi.org\/10.1109\/icde.2014.6816688 2-s2.0-84901814752.","DOI":"10.1109\/ICDE.2014.6816688"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2520473"},{"key":"e_1_2_11_21_2","doi-asserted-by":"crossref","unstructured":"NiuB. ZhangZ. LiX. andLiH. Privacy-area aware dummy generation algorithms for location-based services Proceedings of the IEEE International Conference on Communications June 2014 Sydney Australia 957\u2013962 https:\/\/doi.org\/10.1109\/ICC.2014.6883443 2-s2.0-84906996510.","DOI":"10.1109\/ICC.2014.6883443"},{"key":"e_1_2_11_22_2","first-page":"335","article-title":"Dummy-based schemes for protecting movement trajectories","volume":"28","author":"Lei P.-R.","year":"2012","journal-title":"Journal of Information Science and Engineering"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2526060"},{"key":"e_1_2_11_24_2","doi-asserted-by":"crossref","unstructured":"ElmehdwiY. SamanthulaB. K. andJiangW. Secure k-nearest neighbor query over encrypted data in outsourced environments Proceedings of the 30th IEEE International Conference on Data Engineering (ICDE \u203214) April 2014 664\u2013675 https:\/\/doi.org\/10.1109\/icde.2014.6816690 2-s2.0-84901750940.","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"e_1_2_11_25_2","doi-asserted-by":"crossref","unstructured":"WongW. K. CheungD. W. KaoB. andMamoulisN. Secure kNN computation on encrypted databases Proceedings of the ACM SIGMOD Int. Conf. Manage. Data Eng July 2014 139\u2013152 https:\/\/doi.org\/10.1145\/1559845.1559862 2-s2.0-70849131456.","DOI":"10.1145\/1559845.1559862"},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"ChowC.-Y. MokbelM. F. andLiuX. A peer-to-peer spatial cloaking algorithm for anonymous location-based services Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (ACM-GIS \u203206) November 2006 ACM 171\u2013178 https:\/\/doi.org\/10.1145\/1183471.1183500 2-s2.0-34547474184.","DOI":"10.1145\/1183471.1183500"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/2067047.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/2067047.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/2067047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T14:38:31Z","timestamp":1775313511000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/2067047"}},"subtitle":[],"editor":[{"given":"Laurie","family":"Cuthbert","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/2067047"],"URL":"https:\/\/doi.org\/10.1155\/2018\/2067047","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-10-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2067047"}}