{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:54:17Z","timestamp":1740174857014,"version":"3.37.3"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,9,16]],"date-time":"2018-09-16T00:00:00Z","timestamp":1537056000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"],"award-info":[{"award-number":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"],"award-info":[{"award-number":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"],"award-info":[{"award-number":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)","award":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"],"award-info":[{"award-number":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"]}]},{"name":"Postgraduate Research & Practice Innovation Program of Jiangsu Province","award":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"],"award-info":[{"award-number":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"],"award-info":[{"award-number":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET)","award":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"],"award-info":[{"award-number":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"]}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People\u2019s Republic of China","doi-asserted-by":"publisher","award":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"],"award-info":[{"award-number":["61772282","61772454","61811530332","KYCX18_1032","BK20150460"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2018,9,16]]},"abstract":"<jats:p>Along with the rapid development of smart campus, the deployment of novel learning applications for smart campus requires full consideration of information security issues. Location privacy protection is one of the most important issues, which considers the privacy protection and guarantees the quality of service. The existing schemes did not consider the area of the querying regions for location-based service provider (LSP) during the construction of the anonymous regions, which led to the low quality of service. To deal with this problem, the user\u2019s query range was introduced to present a novel anonymous region construction scheme. In the proposal, the anonymous server first generated the original anonymous subregions according to the user\u2019s privacy requirements, and then merged these subregions to construct the anonymity regions submitted to LSP based on the size of corresponding querying regions. The security and experiment analysis show that the proposed scheme not only protects the user\u2019s privacy effectively but also decreases the area of LSP querying regions and the region-constructing time, improving the quality of service for smart campus.<\/jats:p>","DOI":"10.1155\/2018\/3682382","type":"journal-article","created":{"date-parts":[[2018,9,16]],"date-time":"2018-09-16T19:30:56Z","timestamp":1537126256000},"page":"1-11","source":"Crossref","is-referenced-by-count":4,"title":["Location Privacy Protection Research Based on Querying Anonymous Region Construction for Smart Campus"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8892-4424","authenticated-orcid":true,"given":"Ruxia","family":"Sun","sequence":"first","affiliation":[{"name":"School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0397-3241","authenticated-orcid":true,"given":"Jinwen","family":"Xi","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5764-2432","authenticated-orcid":true,"given":"Chunyong","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5473-8738","authenticated-orcid":true,"given":"Jin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7427-4766","authenticated-orcid":true,"given":"Gwang-jun","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Chonnam National University, Gwangju, Republic of Korea"}]}],"member":"311","reference":[{"issue":"1","key":"1","first-page":"11","volume":"13","year":"1995","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.cose.2018.07.002","volume":"78","year":"2018","journal-title":"Computers & Security"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.12.002"},{"issue":"33","key":"4","first-page":"1","volume":"9","year":"2009","journal-title":"Automation of Electric Power Systems"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2014.2354235"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2015.2388488"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2012.6155874"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2398363"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2017.2773646"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2692728"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2015.2506573"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3902"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-015-0453-x"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2014.2309133"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1620585.1620591"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7251395"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3545-5"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2513-y"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2016.2544779"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2014.2342533"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2011.2164068"},{"issue":"6","key":"27","first-page":"40","volume":"99","year":"2003","journal-title":"IEEE Security & Privacy"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3613"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2007.1062"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2007.190662"},{"issue":"99","key":"36","first-page":"1","volume":"2017","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2300-y"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/tst.2016.7488736"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1023\/a:1015231126594"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35973-1_1151"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2018\/3682382.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2018\/3682382.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2018\/3682382.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,16]],"date-time":"2018-09-16T19:31:03Z","timestamp":1537126263000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2018\/3682382\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,16]]},"references-count":30,"alternative-id":["3682382","3682382"],"URL":"https:\/\/doi.org\/10.1155\/2018\/3682382","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2018,9,16]]}}}