{"id":"https://openalex.org/W3200706918","doi":"https://doi.org/10.1155/2021/5855745","title":"From Centralized Protection to Distributed Edge Collaboration: A Location Difference-Based Privacy-Preserving Framework for Mobile Crowdsensing","display_name":"From Centralized Protection to Distributed Edge Collaboration: A Location Difference-Based Privacy-Preserving Framework for Mobile Crowdsensing","publication_year":2021,"publication_date":"2021-09-20","ids":{"openalex":"https://openalex.org/W3200706918","doi":"https://doi.org/10.1155/2021/5855745","mag":"3200706918"},"language":"en","primary_location":{"id":"doi:10.1155/2021/5855745","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5855745","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5855745.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/5855745.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043715258","display_name":"Zihao Shao","orcid":"https://orcid.org/0000-0002-2250-6817"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihao Shao","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101954149","display_name":"Huiqiang Wang","orcid":"https://orcid.org/0000-0002-1007-5589"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huiqiang Wang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"],"raw_orcid":"https://orcid.org/0000-0002-1007-5589","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112867757","display_name":"Yifan Zou","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yifan Zou","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023513705","display_name":"Zihan Gao","orcid":"https://orcid.org/0000-0001-9624-5587"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihan Gao","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038832558","display_name":"Hongwu Lv","orcid":"https://orcid.org/0000-0002-1917-3978"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwu Lv","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101954149"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.9794,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.80930041,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.896371603012085},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.6951853036880493},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5645463466644287},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5522680878639221},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.485737144947052},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4747614860534668},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4704674184322357},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4617718458175659},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4476010799407959},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4441223442554474},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4154249429702759},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4105612635612488},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.305230975151062},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16530394554138184},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11346712708473206},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07563486695289612}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.896371603012085},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.6951853036880493},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5645463466644287},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5522680878639221},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.485737144947052},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4747614860534668},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4704674184322357},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4617718458175659},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4476010799407959},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4441223442554474},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4154249429702759},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4105612635612488},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.305230975151062},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16530394554138184},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11346712708473206},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07563486695289612},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/5855745","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5855745","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5855745.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b41f10f46ace4140b9e8fd1fbd62ac35","is_oa":false,"landing_page_url":"https://doaj.org/article/b41f10f46ace4140b9e8fd1fbd62ac35","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/5855745","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5855745","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5855745.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities"}],"awards":[{"id":"https://openalex.org/G1123220133","display_name":null,"funder_award_id":"61872104","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2072077023","display_name":null,"funder_award_id":"61872104","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2781057090","display_name":null,"funder_award_id":"3072020CF0603","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G3345670082","display_name":null,"funder_award_id":"3072020CF0603","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3200706918.pdf","grobid_xml":"https://content.openalex.org/works/W3200706918.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W2012045293","https://openalex.org/W2056773559","https://openalex.org/W2125826911","https://openalex.org/W2164297046","https://openalex.org/W2273763651","https://openalex.org/W2276327163","https://openalex.org/W2473808492","https://openalex.org/W2731867899","https://openalex.org/W2733578733","https://openalex.org/W2766407754","https://openalex.org/W2774686253","https://openalex.org/W2792739720","https://openalex.org/W2793722525","https://openalex.org/W2796856437","https://openalex.org/W2800304887","https://openalex.org/W2800954238","https://openalex.org/W2869015012","https://openalex.org/W2885935450","https://openalex.org/W2911837828","https://openalex.org/W2918718461","https://openalex.org/W2921872812","https://openalex.org/W2932074948","https://openalex.org/W2947746371","https://openalex.org/W2969716496","https://openalex.org/W2975069432","https://openalex.org/W2979523842","https://openalex.org/W2981222105","https://openalex.org/W2996022685","https://openalex.org/W3000817561","https://openalex.org/W3008550439","https://openalex.org/W3046696035","https://openalex.org/W3047069132","https://openalex.org/W3087906567","https://openalex.org/W3090782806","https://openalex.org/W3129515304","https://openalex.org/W6751037380"],"related_works":["https://openalex.org/W4386820853","https://openalex.org/W4390887375","https://openalex.org/W2094069016","https://openalex.org/W4212859770","https://openalex.org/W1484081998","https://openalex.org/W3036675567","https://openalex.org/W2955273252","https://openalex.org/W2518050971","https://openalex.org/W1507098372","https://openalex.org/W2092515448"],"abstract_inverted_index":{"Mobile":[0],"Crowdsensing":[1],"(MCS)":[2],"has":[3],"evolved":[4],"into":[5],"an":[6],"effective":[7],"and":[8,17,51,55,86,92,110,119,169,178,184],"valuable":[9],"paradigm":[10],"to":[11,15,90,96],"engage":[12],"mobile":[13],"users":[14,22,85,94,172],"sense":[16],"collect":[18],"urban-scale":[19],"information.":[20],"However,":[21],"risk":[23],"their":[24],"location":[25,37,44,131,168,191],"privacy":[26,129],"while":[27],"reporting":[28],"data":[29,132],"with":[30],"actual":[31],"sensing":[32,53,88,138],"locations.":[33],"Existing":[34],"works":[35],"of":[36,59,130,186],"privacy-preserving":[38,64,123,159],"are":[39],"primarily":[40],"based":[41,105,143],"on":[42,48,62,106,135,144],"single-region":[43],"information,":[45],"which":[46],"rely":[47],"a":[49,72,116,136,145,153],"trusted":[50,137],"centralized":[52],"platform":[54,89],"ignore":[56],"the":[57,79,87,107,111,128,163,182,187],"impact":[58],"regional":[60,97],"differences":[61],"user":[63,98],"demands.":[65],"To":[66],"tackle":[67],"this":[68],"issue,":[69],"we":[70,114,151],"propose":[71,115],"Location":[73],"Difference-Based":[74],"Privacy-Preserving":[75],"Framework":[76],"(LDPF),":[77],"leveraging":[78],"powerful":[80],"edge":[81,108],"servers":[82,109],"deployed":[83],"between":[84],"hide":[91],"manage":[93],"according":[95],"characteristics.":[99],"More":[100],"specifically,":[101],"for":[102,166],"popular":[103],"regions,":[104,142],"k-anonymity":[112],"algorithm,":[113],"Coordinate":[117],"Transformation":[118],"Bit":[120],"Commitment":[121],"(CTBC)":[122],"method":[124,160],"that":[125,161],"effectively":[126],"guarantees":[127],"without":[133],"relying":[134],"platform.":[139],"For":[140],"remote":[141],"more":[146],"realistic":[147],"distance":[148],"calculation":[149],"mode,":[150],"design":[152],"Paillier":[154],"Encryption":[155],"Data":[156],"Coding":[157],"(PDC)":[158],"realizes":[162],"secure":[164],"computation":[165],"users\u2019":[167],"prevents":[170],"malicious":[171],"from":[173],"deceiving.":[174],"The":[175],"theoretical":[176],"analysis":[177],"simulation":[179],"results":[180],"demonstrate":[181],"security":[183],"efficiency":[185],"proposed":[188],"framework":[189],"in":[190],"difference-based":[192],"privacy-preserving.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
