{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T01:56:14Z","timestamp":1726106174238},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T00:00:00Z","timestamp":1587600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T00:00:00Z","timestamp":1587600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s11277-020-07402-2","type":"journal-article","created":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T05:02:36Z","timestamp":1587618156000},"page":"949-973","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["OMCPR: Optimal Mobility Aware Cache Data Pre-fetching and Replacement Policy Using Spatial K-Anonymity for LBS"],"prefix":"10.1007","volume":"114","author":[{"given":"Ajay K.","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Udai","family":"Shanker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"7402_CR1","doi-asserted-by":"crossref","unstructured":"Gupta, A. K., & Shanker, U. (2018). Location dependent information system\u2019s queries for mobile environment. In 23rd international conference on database systems for advanced applications (DASFAA) international workshops, Gold Coast, QLD, Australia, May 21\u201324, pp. 1\u20139.","DOI":"10.1007\/978-3-319-91455-8_19"},{"issue":"4","key":"7402_CR2","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.1007\/s11277-016-3425-3","volume":"90","author":"N Ilayaraja","year":"2016","unstructured":"Ilayaraja, N., Mary Magdalene Jane, F., Safar, M., & Nadarajan, R. (2016). WARM based data pre-fetching and cache replacement strategies for location dependent information system in wireless environment. Wireless Personal Communications, 90(4), 1811\u20131842.","journal-title":"Wireless Personal Communications"},{"key":"7402_CR3","doi-asserted-by":"crossref","unstructured":"Xu, T., & Cai, Y. (2009). Feeling-based location privacy protection for location-based services. In Proceedings of ACM CCS.","DOI":"10.1145\/1653662.1653704"},{"key":"7402_CR4","doi-asserted-by":"crossref","unstructured":"Pingley, A., Yu, W., Zhang, N., Fu, X., & Zhao, W. (2009). Cap: A contextaware privacy protection system for location-based services. In Proceedings of IEEE ICDCS.","DOI":"10.1109\/ICDCS.2009.62"},{"key":"7402_CR5","doi-asserted-by":"crossref","unstructured":"Manweiler, J., Scudellari, R., & Cox, L. P. (2009). Smile: Encounter-based trust for mobile social services. In Proceedings of ACM CCS.","DOI":"10.1145\/1653662.1653692"},{"key":"7402_CR6","doi-asserted-by":"crossref","unstructured":"Hu, H., & Xu, J. (2009). Non-exposure location anonymity. In Proceedings of IEEE ICDE.","DOI":"10.1109\/ICDE.2009.106"},{"key":"7402_CR7","unstructured":"Zhu, X., Chi, H., Niu, B., Zhang, W., Li, Z., & Li, H. (2013). Mobicache: When k-anonymity meets cache. In Proceedings of IEEE GLOBECOM."},{"key":"7402_CR8","doi-asserted-by":"crossref","unstructured":"Niu, B., Zhu, X., Li, W., & Li, H. (2014). Epcloak: An efficient and privacypreserving spatial cloaking scheme for LBSS. In Proceedings of IEEE MASS.","DOI":"10.1109\/MASS.2014.53"},{"issue":"4","key":"7402_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"C-Y Chow","year":"2009","unstructured":"Chow, C.-Y., Mokbel, M. F., & Aref, W. G. (2009). Casper*: Query processing for location services without compromising privacy. ACM Transactions on Database Systems, 34(4), 1\u201348.","journal-title":"ACM Transactions on Database Systems"},{"key":"7402_CR10","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1016\/j.future.2017.06.022","volume":"86","author":"S Zhang","year":"2018","unstructured":"Zhang, S., Choo, K.-K. R., Liu, Q., & Wang, G. (2018). Enhancing privacy through uniform grid and caching in location-based services. Future Generation Computing Systems, 86, 881\u2013892.","journal-title":"Future Generation Computing Systems"},{"key":"7402_CR11","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., & Li, H. (2014). Achieving k-anonymity in privacy-aware location-based services. In Proceedings of the IEEE international conference on computer communications (INFOCOM \u201814), pp. 754\u2013762, IEEE, Toronto, Canada, April\u2013May 2014.","DOI":"10.1109\/INFOCOM.2014.6848002"},{"issue":"3","key":"7402_CR12","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.is.2009.10.001","volume":"35","author":"G Ghinita","year":"2010","unstructured":"Ghinita, G., Zhao, K., Papadias, D., & Kalnis, P. (2010). A reciprocal framework for spatial K-anonymity. Information Systems, 35(3), 299\u2013314.","journal-title":"Information Systems"},{"issue":"11","key":"7402_CR13","doi-asserted-by":"publisher","first-page":"2524","DOI":"10.1109\/TMC.2018.2811481","volume":"17","author":"J Chen","year":"2018","unstructured":"Chen, J., He, K., Yuan, Q., Chen, M., Du, R., & Xiang, Y. (2018). \u2018Blind filtering at third parties: an efficient privacy-preserving framework for location-based services\u2019. IEEE Transactions on Mobile Computing, 17(11), 2524\u20132535.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"7402_CR14","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.ins.2016.08.010","volume":"387","author":"T Peng","year":"2017","unstructured":"Peng, T., Liu, Q., Meng, D., & Wang, G. (2017). Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences, 387, 165\u2013179.","journal-title":"Information Sciences"},{"issue":"3","key":"7402_CR15","doi-asserted-by":"publisher","first-page":"2283","DOI":"10.1007\/s10586-017-0986-1","volume":"20","author":"D Liao","year":"2017","unstructured":"Liao, D., Sun, G., Li, H., Yu, H., & Chang, V. (2017). The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems. Cluster Computing, 20(3), 2283\u20132297.","journal-title":"Cluster Computing"},{"key":"7402_CR16","unstructured":"Michael, K. (2004). Location-based services: A vehicle for IT & T convergence. In Advances in e-Engineering and Digital Enterprise Technology. Professional Engineering Publishing, University of Wollongong Research Online UK, pp. 467\u2013477."},{"issue":"2","key":"7402_CR17","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1109\/JIOT.2018.2799545","volume":"5","author":"P Zhao","year":"2018","unstructured":"Zhao, P., Li, J., Zeng, F., Xiao, F., Wang, C., & Jiang, H. (2018). ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things Journal, 5(2), 1033\u20131042.","journal-title":"IEEE Internet Things Journal"},{"key":"7402_CR18","doi-asserted-by":"crossref","unstructured":"Amini, S., Lindqvist, J., Hong, J., Lin, J., Toch, E., & Sadeh, N. (2011). Cache: Caching location-enhanced content to improve user privacy. In Proceedings of ACM MobiSys.","DOI":"10.1145\/1999995.2000015"},{"key":"7402_CR19","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/TDSC.2013.57","volume":"11","author":"R Shokri","year":"2014","unstructured":"Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., & Hubaux, J.-P. (2014). Hiding in the mobile crowd: Location privacy through collaboration. IEEE Transactions on Dependable and Secure Computing, 11, 266\u2013279.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"5","key":"7402_CR20","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1023\/A:1019194325861","volume":"3","author":"GD Abowd","year":"1997","unstructured":"Abowd, G. D., Atkeson, C. G., Hong, J., Long, S., Kooper, R., & Pinkerton, M. (1997). Cyberguide: A mobile context aware tour guide. Wireless Networks, 3(5), 421\u2013433.","journal-title":"Wireless Networks"},{"key":"7402_CR21","first-page":"625","volume-title":"CityVoyager: An outdoor recommendation system based on user location history","author":"Y Takeuchi","year":"2006","unstructured":"Takeuchi, Y., & Sugimoto, M. (2006). CityVoyager: An outdoor recommendation system based on user location history (pp. 625\u2013636). Berlin: Springer."},{"key":"7402_CR22","doi-asserted-by":"crossref","unstructured":"Park, M.-H., Hong, J.-H., & Cho, S.-B. (2007). Location-based recommendation system using Bayesian users preference model in mobile devices. In International conference on ubiquitous intelligence and computing. Springer, pp. 1130\u20131139.","DOI":"10.1007\/978-3-540-73549-6_110"},{"key":"7402_CR23","doi-asserted-by":"crossref","unstructured":"Horozov, T., Narasimhan, N., & Vasudevan, V. (2006). Using location for personalized poi recommendations in mobile environments. In Proceedings of the international symposium on applications on internet, SAINT\u201906, IEEE Computer Society, Washington, DC, USA, pp. 124\u2013129.","DOI":"10.1109\/SAINT.2006.55"},{"key":"7402_CR24","doi-asserted-by":"publisher","unstructured":"Zheng, Y., Zhang, L., Xie, X., & Ma, W.-Y. (2009). Mining interesting locations and travel sequences from GPS trajectories. In Proceedings of the 18th international conference on world wide web, WWW\u201909, ACM, New York, NY, USA, pp. 791\u2013800. https:\/\/doi.org\/10.1145\/1526709.1526816.","DOI":"10.1145\/1526709.1526816"},{"key":"7402_CR25","unstructured":"Li, Q., Zheng, Y., Xie, X., Chen, Y., Liu, W., & Ma, W.-Y. (2008). Mining user similarity based on location history. In Proceedings of the 16th ACM SIGSPATIAL international conference on advances in geographic information systems, GIS\u201908, ACM, New York, NY, USA, pp. 34:1\u201334:10."},{"key":"7402_CR26","doi-asserted-by":"crossref","unstructured":"Giannotti, F., Nanni, M., Pinelli, F., & Pedreschi, D. (2007). Trajectory pattern mining. In Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining, KDD\u201907, ACM, New York, NY, USA, pp. 330\u2013339.","DOI":"10.1145\/1281192.1281230"},{"issue":"5","key":"7402_CR27","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/j.pmcj.2011.06.004","volume":"8","author":"OD Lara","year":"2012","unstructured":"Lara, O. D., P\u00e9rez, A. J., Labrador, M. A., & Posada, J. D. (2012). Centinela: A human activity recognition system based on acceleration and vital sign data. Pervasive and Mobile Computing, 8(5), 717\u2013729.","journal-title":"Pervasive and Mobile Computing"},{"key":"7402_CR28","first-page":"51","volume-title":"Location-based activity recognition","author":"D Fox","year":"2007","unstructured":"Fox, D. (2007). Location-based activity recognition (pp. 51\u201351). Berlin: Springer."},{"key":"7402_CR29","unstructured":"Wyatt, D., Philipose, M., & Choudhury, T. (2005). Unsupervised activity recognition using automatically mined common sense. In Proceedings of the 20th national conference on artificial intelligence\u2014Volume 1, AAAI\u201905, AAAI Press, pp. 21\u201327"},{"key":"7402_CR30","doi-asserted-by":"crossref","unstructured":"Zheng, V. W., Zheng, Y., Xie, X., & Yang, Q. (2010). Collaborative location and activity recommendations with GPS history data. In Proceedings of the 19th international conference on world wide web, WWW\u201910, ACM, New York, NY, USA, pp. 1029\u20131038.","DOI":"10.1145\/1772690.1772795"},{"key":"7402_CR31","first-page":"1","volume":"7","author":"A Kumar","year":"2008","unstructured":"Kumar, A., Misra, M., & Sarje, A. K. (2008). A predicted region based cache replacement policy for location dependent data in mobile environment. 10th Inter-Research-Institute Student Semin Comput. Sci. IIIT Hyd., 7, 1\u20138.","journal-title":"10th Inter-Research-Institute Student Semin Comput. Sci. IIIT Hyd."},{"key":"7402_CR32","doi-asserted-by":"crossref","unstructured":"Kumar, A., Misra, M., & Sarje, A. K. (2007). A weighted cache replacement policy for location dependent data in mobile environments. In SAC\u201907 Proceedings 2007 ACM Symposium Applied Computing, Seoul, Repub. Korea, vol. 7, pp. 920\u2013924.","DOI":"10.1145\/1244002.1244204"},{"key":"7402_CR33","unstructured":"Gupta, A. K., & Shanker, U. (2017). Modified predicted region based cache replacement policy for location dependent data in mobile environment. In Sixth international conference on smart computing and comminations, NIT Kurukshetra, India."},{"key":"7402_CR34","unstructured":"Gupta, A. K., & Shanker, U. (2017). SPMC-CRP: A cache replacement policy for location dependent data in mobile environment. In Sixth international conference on smart computing and communications. NIT Kurukshetra, India, pp. 632\u2013639."},{"key":"7402_CR35","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1109\/TC.2002.1039841","volume":"51","author":"B Zheng","year":"2002","unstructured":"Zheng, B., Xu, J., Member, S., & Lee, D. L. (2002). Cache invalidation and replacement strategies for location-dependent data in mobile environments. IEEE Transactions on Computers, 51, 1141\u20131153.","journal-title":"IEEE Transactions on Computers"},{"key":"7402_CR36","unstructured":"Kumar, A., Misra, M., & Sarje, A. K. (2006). A new cost function based cache replacement policy for location dependent data in mobile environment. In 5th annual inter research institute student seminar computer science Indian Institute Technology Kanpur, vol. 5, pp. 1\u20138."},{"key":"7402_CR37","doi-asserted-by":"crossref","unstructured":"Gupta, A. K., & Shanker, U. (2018). CELPB: A cache invalidation policy for location dependent data in mobile environment. In 22nd international database engineering applications symposium (IDEAS 2018), Calabria, Italy, June 18\u201320, 2018, pp. 302\u2013306.","DOI":"10.1145\/3216122.3216147"},{"key":"7402_CR38","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1007\/s42452-020-2431-y","volume":"2","author":"AK Gupta","year":"2020","unstructured":"Gupta, A. K., & Shanker, U. (2020). Study of fuzzy logic and particle swarm methods in map matching algorithm. SN Applied Sciences, 2, 608.","journal-title":"SN Applied Sciences"},{"key":"7402_CR39","doi-asserted-by":"crossref","unstructured":"Gupta, A. K. (2020). Spam mail filtering using data mining approach: A comparative performance analysis. In Handling priority inversion in time-constrained distributed databases, pp. 253\u2013282.","DOI":"10.4018\/978-1-7998-2491-6.ch015"},{"key":"7402_CR40","doi-asserted-by":"crossref","unstructured":"Lubbe, C., Brodt, A., Cipriani, N., Gro\u00dfmann, M., & Mitschang, B. (2011). DiSCO: A distributed semantic cache overlay for location-based services. In 2011 IEEE 12th international conference on mobile data management, Lulea, pp. 17\u201326.","DOI":"10.1109\/MDM.2011.56"},{"key":"7402_CR41","unstructured":"Gupta, A. K., & Shanker, U. (2017). SPMC-PRRP: A predicted region based cache replacement policy. In International conference on data and information sciences (ICDIS-2017), M.P, India."},{"key":"7402_CR42","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., & Li, H. (2015). Enhancing privacy through caching in location based services. In 2015 IEEE conference on computer communications (INFOCOM), IEEE, pp. 1017\u20131025.","DOI":"10.1109\/INFOCOM.2015.7218474"},{"key":"7402_CR43","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.future.2018.10.053","volume":"94","author":"S Zhang","year":"2018","unstructured":"Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2018). \u2018A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services\u2019. Future Generation Computing Systems, 94, 40\u201350.","journal-title":"Future Generation Computing Systems"},{"issue":"1","key":"7402_CR44","first-page":"31","volume":"1","author":"Vishnu Swaroop","year":"2011","unstructured":"Swaroop, Vishnu, & Shanker, Udai. (2011). Concept and management issues in mobile distributed real time database. International Journal of Recent Trends in Electrical and Electronics Engineering, 1(1), 31\u201342.","journal-title":"International Journal of Recent Trends in Electrical and Electronics Engineering"},{"issue":"4","key":"7402_CR45","first-page":"3504","volume":"3","author":"V Swaroop","year":"2011","unstructured":"Swaroop, V., Gupta, G. K., & Shanker, U. (2011). Issues in mobile distributed real time databases: Performance & review. International Journal of Engineering Science and Technology (IJEST), 3(4), 3504\u20133517.","journal-title":"International Journal of Engineering Science and Technology (IJEST)"},{"key":"7402_CR46","volume-title":"Next-generation networks.\u00a0Advances in intelligent systems and computing","author":"AK Gupta","year":"2018","unstructured":"Gupta, A. K., Prakash, S. (2018). Secure communication in cluster-based ad hoc networks: A review. In: Lobiyal, D., Mansotra, V., Singh, U. (Eds.), Next-generation networks.\u00a0Advances in intelligent systems and computing (Vol. 638). Springer, Singapore."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07402-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07402-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07402-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T00:22:59Z","timestamp":1619137379000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07402-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,23]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["7402"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07402-2","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,23]]},"assertion":[{"value":"23 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The corresponding author would like to declare there is no conflict of interest situation in preparing this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}