{"id":"https://openalex.org/W2962482836","doi":"https://doi.org/10.1109/icc.2019.8761455","title":"Context-Aware Privacy Preservation in a Hierarchical Fog Computing System","display_name":"Context-Aware Privacy Preservation in a Hierarchical Fog Computing System","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2962482836","doi":"https://doi.org/10.1109/icc.2019.8761455","mag":"2962482836"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761455","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/Context-aware_privacy_preservation_in_a_hierarchical_fog_computing_system/20745187","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056029786","display_name":"Bruce Gu","orcid":"https://orcid.org/0000-0002-3008-6285"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Bruce Gu","raw_affiliation_strings":["School of Information Technology, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031611520","display_name":"Xiaodong Wang","orcid":"https://orcid.org/0000-0002-9451-6213"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiaodong Wang","raw_affiliation_strings":["School of Information Technology, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040772796","display_name":"Youyang Qu","orcid":"https://orcid.org/0000-0002-2944-4647"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Youyang Qu","raw_affiliation_strings":["School of Information Technology, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080328538","display_name":"Jiong Jin","orcid":"https://orcid.org/0000-0002-0306-2691"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiong Jin","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051297830","display_name":"Yong Xiang","orcid":"https://orcid.org/0000-0003-3545-7863"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yong Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012293028","display_name":"Longxiang Gao","orcid":"https://orcid.org/0000-0002-3026-7537"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Longxiang Gao","raw_affiliation_strings":["School of Information Technology, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5056029786"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":1.876,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.8942262,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8436880111694336},{"id":"https://openalex.org/keywords/fog-computing","display_name":"Fog computing","score":0.6498907208442688},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6036961674690247},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5451301336288452},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5349897742271423},{"id":"https://openalex.org/keywords/stochastic-game","display_name":"Stochastic game","score":0.5097340941429138},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4980456829071045},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.48213884234428406},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.45436057448387146},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4328060746192932}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8436880111694336},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.6498907208442688},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6036961674690247},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5451301336288452},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5349897742271423},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.5097340941429138},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4980456829071045},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.48213884234428406},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.45436057448387146},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4328060746192932},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/icc.2019.8761455","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.vu.edu.au:42706","is_oa":false,"landing_page_url":"https://vuir.vu.edu.au/42706/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400215","display_name":"Victoria University Research Repository (Victoria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I41156924","host_organization_name":"Victoria University of Wellington","host_organization_lineage":["https://openalex.org/I41156924"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30129025","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402457","display_name":"Deakin Research Online (Deakin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},{"id":"pmh:oai:figshare.com:article/20745187","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Context-aware_privacy_preservation_in_a_hierarchical_fog_computing_system/20745187","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:researchbank.swinburne.edu.au:287c5208-a8c4-4429-8eb7-f9d787949641/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/450559","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2019 IEEE International Conference on Communications (ICC 2019), Shanghai, China, 20-24 May 2019","raw_type":""}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20745187","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Context-aware_privacy_preservation_in_a_hierarchical_fog_computing_system/20745187","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5400000214576721,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1486457878","https://openalex.org/W1926090661","https://openalex.org/W1979944580","https://openalex.org/W2025725145","https://openalex.org/W2109426455","https://openalex.org/W2114623221","https://openalex.org/W2141587120","https://openalex.org/W2159158762","https://openalex.org/W2245189809","https://openalex.org/W2343248474","https://openalex.org/W2344424854","https://openalex.org/W2566891160","https://openalex.org/W2783916036","https://openalex.org/W2786010450","https://openalex.org/W2796856437","https://openalex.org/W2888121718","https://openalex.org/W2907885309","https://openalex.org/W3101824822","https://openalex.org/W6628978358"],"related_works":["https://openalex.org/W2885657717","https://openalex.org/W2892869641","https://openalex.org/W4285553818","https://openalex.org/W4328007012","https://openalex.org/W3183865553","https://openalex.org/W3158188878","https://openalex.org/W3090142401","https://openalex.org/W4205392332","https://openalex.org/W3185624939","https://openalex.org/W3198311045"],"abstract_inverted_index":{"Fog":[0],"computing":[1,34,75,124],"faces":[2],"various":[3],"security":[4],"and":[5,17,60,65,71,114,154],"privacy":[6,41,44,83,112],"threats.":[7],"Internet":[8],"of":[9,49,53,110,144],"Things":[10],"(IoTs)":[11],"devices":[12],"have":[13,76],"limited":[14],"computing,":[15,55],"storage,":[16],"other":[18],"resources.":[19],"They":[20],"are":[21],"vulnerable":[22],"to":[23,38,106,117],"attack":[24],"by":[25],"adversaries.":[26],"Although":[27],"the":[28,50,58,82,108,111,142,145,157],"existing":[29],"privacy-preserving":[30,69,101],"solutions":[31],"in":[32,73,85,103,121,151],"fog":[33,54,74,87,123],"can":[35],"be":[36],"migrated":[37],"address":[39],"some":[40],"issues,":[42],"specific":[43],"challenges":[45],"still":[46],"exist":[47],"because":[48],"unique":[51],"features":[52],"such":[56],"as":[57],"decentralized":[59],"hierarchical":[61],"infrastructure,":[62],"mobility,":[63],"location":[64],"content-aware":[66],"applications.":[67],"Unfortunately,":[68],"issues":[70],"resources":[72],"not":[77],"been":[78],"systematically":[79],"identified,":[80],"especially":[81],"preservation":[84],"multiple":[86],"node":[88],"communication":[89],"with":[90,133,149],"end":[91],"users.":[92],"In":[93],"this":[94],"paper,":[95],"we":[96,127],"propose":[97],"a":[98,122,129],"dynamic":[99,131],"MDP-based":[100,134],"model":[102,132,147],"zero-sum":[104],"game":[105],"identify":[107,141],"efficiency":[109],"loss":[113],"payoff":[115],"changes":[116],"preserve":[118],"sensitive":[119],"content":[120],"environment.":[125],"First,":[126],"develop":[128],"new":[130],"comprehensive":[135],"algorithms.":[136],"Then,":[137],"extensive":[138],"experimental":[139],"results":[140],"significance":[143],"proposed":[146],"compared":[148],"others":[150],"more":[152],"effectively":[153],"feasibly":[155],"solving":[156],"discussed":[158],"issues.":[159]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
