{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:31:25Z","timestamp":1726849885830},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61632009"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Guangdong Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["2017A030308006"],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012243","name":"Higher Education in Guangdong Province","doi-asserted-by":"publisher","award":["2016ZJ01"],"id":[{"id":"10.13039\/501100012243","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1016\/j.cose.2019.02.006","type":"journal-article","created":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T22:51:29Z","timestamp":1557615089000},"page":"101470","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":47,"special_numbering":"C","title":["A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking"],"prefix":"10.1016","volume":"87","author":[{"given":"Mehdi","family":"Gheisari","sequence":"first","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wazir Zada","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Fern\u00e1ndez-Campusano","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2019.02.006_bib0001","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.future.2015.11.008","article-title":"Trust, security and privacy in emerging distributed systems","volume":"55","author":"Abawajy","year":"2016","journal-title":"Future Gen Comput Syst"},{"key":"10.1016\/j.cose.2019.02.006_bib0002","series-title":"Proceedings of the fourth international conference on software defined systems (SDS), 2017","first-page":"174","article-title":"Software defined storage for cooperative mobile edge computing systems","author":"Al-Badarneh","year":"2017"},{"key":"10.1016\/j.cose.2019.02.006_bib0003","series-title":"Proceedings of the algorithms and architectures for parallel processing","first-page":"130","article-title":"Improve heteroscedastic discriminant analysis by using CBP algorithm","author":"Alzubi Jafar A. and Yaghoubi","year":"2018"},{"key":"10.1016\/j.cose.2019.02.006_bib0004","series-title":"Proceedings of the ICAC 2018, UK","article-title":"A new algorithm for cluster leader selection in wireless sensor networks","author":"Alzubi","year":"2018"},{"key":"10.1016\/j.cose.2019.02.006_bib0005","series-title":"Proceedings of the Nordic conference on secure IT systems","first-page":"229","article-title":"Spook in your network: attacking an SDN with a compromised openflow switch","author":"Antikainen","year":"2014"},{"issue":"2","key":"10.1016\/j.cose.2019.02.006_bib0006","doi-asserted-by":"crossref","first-page":"235","DOI":"10.24846\/v27i2y201811","article-title":"Secure vanets: trusted communication scheme between vehicles and infrastructure based on fog computing","volume":"27","author":"ARIF","year":"2018","journal-title":"Stud Inform Control"},{"key":"10.1016\/j.cose.2019.02.006_bib0007","series-title":"Proceedings of the 2015 IEEE 12th international conference on mobile ad hoc and sensor systems","first-page":"190","article-title":"Black SDN for the internet of things","author":"Chakrabarty","year":"2015"},{"key":"10.1016\/j.cose.2019.02.006_bib0008","doi-asserted-by":"crossref","unstructured":"Chen S., Wang G., Yan G., Xie D.. Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures. Concurr Comput: Pract Exp; 29(7):e3901.","DOI":"10.1002\/cpe.3901"},{"issue":"1","key":"10.1016\/j.cose.2019.02.006_bib0009","first-page":"1","article-title":"Intrusion detection","volume":"1","author":"Chen","year":"2014","journal-title":"IET Eng Technol Ref"},{"key":"10.1016\/j.cose.2019.02.006_bib0010","series-title":"Proceedings of the fifth international symposium on advances in science & technology","article-title":"Shd: a new sensor data storage","author":"Gheisari","year":"2011"},{"key":"10.1016\/j.cose.2019.02.006_bib0011","first-page":"115","article-title":"Design, implementation and evaluation of SemHD: a new semantic hierarchical sensor data storage","author":"Gheisari","year":"2012","journal-title":"Indian Journal of Innovations and Developments"},{"key":"10.1016\/j.cose.2019.02.006_bib0012","series-title":"Proceedings of the 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC)","first-page":"173","article-title":"A survey on deep learning in big data","volume":"2","author":"Gheisari","year":"2017"},{"key":"10.1016\/j.cose.2019.02.006_bib0013","series-title":"Proceedings of the 18th international conference on algorithms and architectures for parallel processing","article-title":"Iot-SDNPP: a method for privacy-preserving in IoT-based smart city with software defined networking","author":"Gheisari","year":"2018"},{"key":"10.1016\/j.cose.2019.02.006_bib0014","first-page":"77265","article-title":"An edge computing-enhanced IoT architecture for privacy-preserving in smart city","volume":"6","author":"Gheisari","year":"2019","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.cose.2019.02.006_bib0015","series-title":"Proceedings of the 2016 22nd international conference on automation and computing (ICAC)","first-page":"256","article-title":"Automatic text summarization using fuzzy inference","author":"Jafari","year":"2016"},{"issue":"9","key":"10.1016\/j.cose.2019.02.006_bib0017","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/MCOM.2017.1700714","article-title":"Securing internet of things with software defined networking","volume":"56","author":"Kalkan","year":"2018","journal-title":"IEEE Commun Mag"},{"key":"10.1016\/j.cose.2019.02.006_bib0018","doi-asserted-by":"crossref","first-page":"77265","DOI":"10.1109\/ACCESS.2018.2881050","article-title":"A novel method for recognition of Persian alphabet by using fuzzy neural network","volume":"6","author":"Kia","year":"2018","journal-title":"IEEE Access"},{"issue":"6","key":"10.1016\/j.cose.2019.02.006_bib0019","doi-asserted-by":"crossref","first-page":"1231","DOI":"10.1007\/s11390-017-1797-9","article-title":"Effective query grouping strategy in clouds","volume":"32","author":"Liu","year":"2017","journal-title":"J Comput Sci Technol"},{"issue":"5","key":"10.1016\/j.cose.2019.02.006_bib0020","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1109\/TPDS.2016.2615020","article-title":"Preserving privacy with probabilistic indistinguishability in weighted social networks","volume":"28","author":"Liu","year":"2017","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10.1016\/j.cose.2019.02.006_bib0021","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.compeleceng.2016.10.005","article-title":"Achieving reliable and secure services in cloud computing environments","volume":"59","author":"Liu","year":"2017","journal-title":"Comput Electr Eng"},{"issue":"2","key":"10.1016\/j.cose.2019.02.006_bib0022","first-page":"43","article-title":"An improved node scheduling scheme for resilient packet ring network","volume":"9","author":"M","year":"2015","journal-title":"Majlesi J Electr Eng"},{"key":"10.1016\/j.cose.2019.02.006_bib0023","series-title":"Proceedings of the 2017 IEEE international conference on ubiquitous computing and communications (ISPA\/IUCC), 2017 IEEE international symposium on parallel and distributed processing with applications","first-page":"897","article-title":"Mapp: a modular arithmetic algorithm for privacy preserving in IoT","author":"M","year":"2017"},{"key":"10.1016\/j.cose.2019.02.006_bib0024","series-title":"Proceedings of the 16th IEEE international Symposium on parallel and distributed processing with applications (ISPA 2018)","article-title":"A method for privacy-preserving in IoT-SDN integration environment","author":"Mehdi Gheisari Guojun Wang","year":"2018"},{"key":"10.1016\/j.cose.2019.02.006_bib0025","series-title":"Proceedings of the emergency and disaster management: concepts, methodologies, tools, and applications","first-page":"655","article-title":"Data storages in wireless sensor networks to deal with disaster management","author":"M.Gheisari","year":"2019"},{"key":"10.1016\/j.cose.2019.02.006_bib0026","article-title":"Cyber attack challenges and resilience for smart grids","volume":"134","author":"Nazir","year":"2015","journal-title":"Eur J Sci Res"},{"key":"10.1016\/j.cose.2019.02.006_bib0027","series-title":"Computational complexity","author":"Papadimitriou","year":"2003"},{"issue":"1","key":"10.1016\/j.cose.2019.02.006_bib0028","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MCSE.2017.13","article-title":"A multilevel access control scheme for data security in transparent computing","volume":"19","author":"Peng","year":"2017","journal-title":"Comput Sci Eng"},{"issue":"5","key":"10.1016\/j.cose.2019.02.006_bib0029","doi-asserted-by":"crossref","DOI":"10.1177\/1550147717707891","article-title":"An optimal energy-saving real-time task-scheduling algorithm for mobile terminals","volume":"13","author":"Peng","year":"2017","journal-title":"Int J Distrib Sensor Netw"},{"key":"10.1016\/j.cose.2019.02.006_bib0030","series-title":"Proceedings of the 2017 second international conference on electrical, computer and communication technologies (ICECCT)","first-page":"1","article-title":"Agent programming with object oriented (C++)","author":"Rezaeiye","year":"2017"},{"issue":"2","key":"10.1016\/j.cose.2019.02.006_bib0016","doi-asserted-by":"crossref","first-page":"110","DOI":"10.2174\/2213275911666181115093050","article-title":"Eccentric methodology with optimization to unearth hidden facts of search engine result pages","volume":"12","author":"Sethuraman","year":"2019","journal-title":"Recent Pat Comput Sci"},{"issue":"9","key":"10.1016\/j.cose.2019.02.006_bib0031","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MCOM.2017.1700041","article-title":"Distblocknet: a distributed blockchains-based secure SDN architecture for IoT networks","volume":"55","author":"Sharma","year":"2017","journal-title":"IEEE Commun Mag"},{"key":"10.1016\/j.cose.2019.02.006_bib0032","series-title":"World population ageing, 1950-2050","author":"United Nations New York","year":"2002"},{"issue":"3","key":"10.1016\/j.cose.2019.02.006_bib0033","doi-asserted-by":"crossref","first-page":"2143","DOI":"10.1007\/s11277-017-4047-0","article-title":"Temporal topic-based multi-dimensional social influence evaluation in online social networks","volume":"95","author":"Wang","year":"2017","journal-title":"Wirel Pers Commun"},{"key":"10.1016\/j.cose.2019.02.006_bib0034","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","article-title":"Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers","volume":"30","author":"Wang","year":"2011","journal-title":"Comput Secur"},{"key":"10.1016\/j.cose.2019.02.006_bib0035","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1007\/s11227-013-0953-4","article-title":"Trust, security and privacy for pervasive applications","volume":"64","author":"Wang","year":"2013","journal-title":"J Supercomput"},{"key":"10.1016\/j.cose.2019.02.006_bib0036","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/MCOM.2018.1700303","article-title":"Big data reduction for a smart city\u2019s critical infrastructural health monitoring","volume":"56","author":"Wang","year":"2018","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"10.1016\/j.cose.2019.02.006_bib0037","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s40995-017-0206-0","article-title":"Multi-period multi-criteria (MPMC) valuation of american options based on entropy optimization principles","volume":"41","author":"Yari","year":"2017","journal-title":"Iran J Sci Technol Trans A: Sci"},{"issue":"6","key":"10.1016\/j.cose.2019.02.006_bib0038","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MNET.2015.7340429","article-title":"Modeling malicious activities in cyber space","volume":"29","author":"Yu","year":"2015","journal-title":"IEEE Netw"},{"key":"10.1016\/j.cose.2019.02.006_bib0039","doi-asserted-by":"crossref","first-page":"31541","DOI":"10.1109\/ACCESS.2018.2845468","article-title":"PRMS: a personalized mobile search over encrypted outsourced data","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.cose.2019.02.006_bib0040","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2018.12.016","article-title":"Enabling cooperative privacy-preserving personalized search in cloud environments","volume":"480","author":"Zhang","year":"2019","journal-title":"Inf Sci"},{"key":"10.1016\/j.cose.2019.02.006_bib0041","series-title":"Proceedings of the 2017 IEEE Trustcom\/BigDataSE\/ICESS","first-page":"402","article-title":"A dual privacy preserving scheme in continuous location-based services","author":"Zhang","year":"2017"},{"key":"10.1016\/j.cose.2019.02.006_bib0042","first-page":"1","article-title":"A trajectory privacy-preserving scheme based on query exchange in mobile social networks","volume":"22","author":"Zhang","year":"2017","journal-title":"Soft Comput"},{"issue":"18","key":"10.1016\/j.cose.2019.02.006_bib1000","doi-asserted-by":"crossref","first-page":"6121","DOI":"10.1007\/s00500-017-2676-6","article-title":"A trajectory privacy-preserving scheme based on query exchange in mobile social networks","volume":"22","author":"Zhang","year":"2018","journal-title":"Soft Comput"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404818313336?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404818313336?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T14:44:30Z","timestamp":1575470670000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404818313336"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":43,"alternative-id":["S0167404818313336"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2019.02.006","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2019,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2019.02.006","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"101470"}}