{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T09:14:08Z","timestamp":1765012448727,"version":"3.46.0"},"reference-count":47,"publisher":"Wiley","issue":"27-28","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/100016806","name":"Natural Science Foundation of Nantong Municipality","doi-asserted-by":"publisher","award":["JC2023069"],"award-info":[{"award-number":["JC2023069"]}],"id":[{"id":"10.13039\/100016806","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2025,12,25]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>To address the issues of high computational overhead, poor real\u2010time performance, and excessive focus on location privacy while neglecting query privacy in existing Internet of Vehicles (IoV) Location\u2010Based Services (LBS) privacy protection schemes. This research proposes a joint protection scheme for location and query privacy in IoV LBS based on a subspace\u2010optimized PIR algorithm. This scheme integrates keyword\u2010based Private Information Retrieval (PIR) protocols with the BFV fully homomorphic encryption algorithm to protect the privacy of user query content and access patterns, preventing the server and attackers from obtaining specific queries or feedback results. Furthermore, the scheme introduces R\u2010tree spatial indexing and Order\u2010Preserving Encryption (OPE) algorithms, optimizing global search into subspace search, thereby reducing the computational complexity of PIR from O(N) to O(logN) and improving efficiency. Security analysis demonstrates excellent performance in query privacy protection and resistance to malicious attacks. Performance tests reveal that the overall computational overhead is reduced by approximately 80% compared to existing typical solutions, significantly enhancing system efficiency under strong privacy protection, making it suitable for resource\u2010constrained and high real\u2010time\u2010demand environments in IoV LBS applications.<\/jats:p>","DOI":"10.1002\/cpe.70447","type":"journal-article","created":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T01:22:36Z","timestamp":1762996956000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Joint Protection of LBS Location and Query Privacy in Internet of Vehicles Based on an Improved PIR Algorithm"],"prefix":"10.1002","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9909-2981","authenticated-orcid":false,"given":"Gu","family":"Danqian","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence and Computer Science Nantong University  Jiangsu China"}]},{"given":"Cao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Computer Science Nantong University  Jiangsu China"}]},{"given":"Chen","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Computer Science Nantong University  Jiangsu China"}]},{"given":"Men","family":"Honglei","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Computer Science Nantong University  Jiangsu China"}]},{"given":"Zheng","family":"Guoli","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Computer Science Nantong University  Jiangsu China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9986-058X","authenticated-orcid":false,"given":"Dou","family":"Zhi","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Computer Science Nantong University  Jiangsu China"}]}],"member":"311","published-online":{"date-parts":[[2025,11,12]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.19734\/j.issn.1001\u20103695.2024.03.0165"},{"issue":"5","key":"e_1_2_11_3_1","first-page":"357","article-title":"Multi\u2010Factor Dummy Location Selection Algorithm in Location\u2010Based Service","volume":"52","author":"Li Y.","year":"2025","journal-title":"Computer Science"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.20009\/j.cnki.21\u20101106\/TP.2023\u20100259"},{"issue":"4","key":"e_1_2_11_5_1","first-page":"32","article-title":"Differential Privacy Protection Method for Localization of ADS\u2010B Message Positioning Data Oriented to LBS","volume":"11","author":"Yang H.","year":"2025","journal-title":"Chinese Journal of Network and Information Security"},{"issue":"3","key":"e_1_2_11_6_1","first-page":"802","article-title":"Local Differential Privacy Location Protection for Mobile Terminals Based on Huffman Coding","volume":"19","author":"Yan y.","year":"2025","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"e_1_2_11_7_1","doi-asserted-by":"publisher","DOI":"10.19734\/j.issn.1001\u20103695.2023.10.0539"},{"issue":"2","key":"e_1_2_11_8_1","first-page":"273","article-title":"Entropy\u2010Based Differential Location Privacy Protection Scheme","volume":"37","author":"Deng Y.","year":"2025","journal-title":"Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)"},{"key":"e_1_2_11_9_1","unstructured":"S.Narkedimilli R. A.Kumar N.Kumar andR. P.Reddy \u201cFL\u2010DECO\u2010BC: A Privacy\u2010Preserving Provably Secure and Provenance\u2010Preserving Federated Learning Framework With Decentralized Oracles on Blockchain for VANETs \u201d(2024). arXiv Preprint arXiv:2407.21141."},{"issue":"1","key":"e_1_2_11_10_1","first-page":"107","article-title":"A Privacy\u2010Preserving Data Sharing Scheme for Vehicle\u2010To\u2010Everything Networks Based on Federated Learning and Blockchain","volume":"44","author":"Wang Y.","year":"2024","journal-title":"Journal of Computer Applications"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/03611981231180200"},{"issue":"5","key":"e_1_2_11_12_1","first-page":"2159","article-title":"A Multi\u2010Party Vertically Partitioned Data Synthesis Mechanism With Personalized Differential Privacy","volume":"46","author":"Zhu Y.","year":"2024","journal-title":"Journal of Electronics and Information Technology"},{"issue":"4","key":"e_1_2_11_13_1","first-page":"835","article-title":"Blockchain\u2010Based Outsourced Secure Multi\u2010Party Computation Verifiable Privacy Protection Scheme","volume":"54","author":"Xia H.","year":"2024","journal-title":"Radio Engineering"},{"key":"e_1_2_11_14_1","doi-asserted-by":"publisher","DOI":"10.13190\/j.jbupt.2014.06.018"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.13190\/j.jbupt.2017\u2010103"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.03.001"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354210"},{"issue":"6","key":"e_1_2_11_18_1","first-page":"1327","article-title":"Paillier Homomorphic Encryption Based Location Privacy Protection Scheme for Crowdsensing Task Distribution","volume":"16","author":"Tian J.","year":"2022","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"issue":"7","key":"e_1_2_11_19_1","first-page":"1481","article-title":"A Privacy Protection Scheme for Mobile Social Networks Supporting K\u2010Nearest Neighbor Search","volume":"44","author":"Li Y.","year":"2021","journal-title":"Chinese Journal of Computers"},{"issue":"6","key":"e_1_2_11_20_1","first-page":"817","article-title":"Research of Privacy\u2010Preserving Proximity Test","volume":"24","author":"Li Z.","year":"2024","journal-title":"Netinfo Security"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.14711\/thesis-b1487523"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3063955.3063984"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIIDS.2021.118550"},{"key":"e_1_2_11_24_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0309919"},{"key":"e_1_2_11_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/3574245.3574251"},{"key":"e_1_2_11_26_1","first-page":"1723","volume-title":"Constant\u2010Weight PIR: {Single\u2010Round Keyword PIR} Via Constant\u2010Weight Equality Operators","author":"Mahdavi R. A.","year":"2022"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"key":"e_1_2_11_28_1","doi-asserted-by":"publisher","DOI":"10.13328\/j.cnki.jos.007095"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.13868\/j.cnki.jcr.000657"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2820039"},{"issue":"5","key":"e_1_2_11_32_1","first-page":"95","article-title":"Virtual Location\u2010Based Location Privacy Protection Scheme in Vanets","volume":"42","author":"Liu S.","year":"2025","journal-title":"Computer Applications and Software"},{"issue":"11","key":"e_1_2_11_33_1","first-page":"27","article-title":"Efficient Pseudonym Certificate Distribution Scheme for Internet of Vehicles Based on Novel Sanitizable Multi\u2010Signature","volume":"45","author":"Liu Z.","year":"2024","journal-title":"Journal on Communications"},{"key":"e_1_2_11_34_1","doi-asserted-by":"publisher","DOI":"10.13328\/j.cnki.jos.006157"},{"issue":"7","key":"e_1_2_11_35_1","first-page":"150","article-title":"Bus Cache\u2010Based Location Privacy Protection Scheme in the Internet of Vehicles","volume":"42","author":"Cui J.","year":"2021","journal-title":"Journal on Communications"},{"key":"e_1_2_11_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06544-2"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2838041"},{"key":"e_1_2_11_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2926385"},{"key":"e_1_2_11_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2811481"},{"key":"e_1_2_11_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2025.103422"},{"issue":"9","key":"e_1_2_11_41_1","first-page":"301","article-title":"Research on Variable\u2010Order Encryption Security Algorithms for Sensitive Database Information","volume":"38","author":"Lyu H.","year":"2021","journal-title":"Computer Simulation"},{"issue":"1","key":"e_1_2_11_42_1","first-page":"466","article-title":"P2LBS: Privacy Provisioning in Location\u2010Based Services","volume":"16","author":"Yadav V. K.","year":"2021","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_2_11_43_1","doi-asserted-by":"publisher","DOI":"10.19734\/j.issn.1001\u20103695.2023.12.0602"},{"issue":"4","key":"e_1_2_11_44_1","first-page":"308","article-title":"Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services","volume":"50","author":"Guo N.","year":"2023","journal-title":"Computer Science"},{"issue":"4","key":"e_1_2_11_45_1","first-page":"781","article-title":"Vehicle Pseudonym Management Scheme in Internet of Vehicles for Mobile Edge Computing","volume":"59","author":"Han M.","year":"2022","journal-title":"Journal of Computer Research and Development"},{"issue":"9","key":"e_1_2_11_46_1","first-page":"393","article-title":"Enhanced Location K\u2010Anonymity Privacy Protection Scheme Based on Geohash","volume":"51","author":"Li Y.","year":"2024","journal-title":"Computer Science"},{"key":"e_1_2_11_47_1","doi-asserted-by":"publisher","DOI":"10.14188\/j.1671\u20108836.2021.0278"},{"key":"e_1_2_11_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS53394.2021.00092"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.70447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T09:10:43Z","timestamp":1765012243000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.70447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":47,"journal-issue":{"issue":"27-28","published-print":{"date-parts":[[2025,12,25]]}},"alternative-id":["10.1002\/cpe.70447"],"URL":"https:\/\/doi.org\/10.1002\/cpe.70447","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2025,11,12]]},"assertion":[{"value":"2025-07-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70447"}}