“…While, in a context-aware privacy, how to prevent adversaries from gaining access to the context information, for instance, identity, physical location and so on. Data-centric privacy has been addressed significantly (e.g., Zhang et al [16], Sicari et al [17], Yang et al [18] and Yao et al [19] schemes), but ignoring the node identity privacy. Similarly, in the context-aware privacy, recently, Debnath et al [14], Li et al [15] and Pnogaliur-Xiao [20] have paid a significant attention to the source node privacy and leaving out the destination node privacy.…”