{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:18:05Z","timestamp":1726064285972},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_19","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"475-492","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Fog Computing: Applications and Secure Data Aggregation"],"prefix":"10.1007","author":[{"given":"Sudesh","family":"Rani","sequence":"first","affiliation":[]},{"given":"Poonam","family":"Saini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"19_CR1","first-page":"1","volume-title":"2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)","author":"M Aazam","year":"2017","unstructured":"Aazam, M., & Fernando, X. (2017). Fog assisted driver behavior monitoring for intelligent transportation system. In 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall) (pp. 1\u20135). Piscataway: IEEE."},{"key":"19_CR2","unstructured":"Akrivopoulos, O., Chatzigiannakis, I., Tselios, C., & Antoniou, A. (2017). On the deployment of healthcare applications over fog computing infrastructure. In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) (Vol. 2, pp. 288\u2013293). Piscataway: IEEE."},{"key":"19_CR3","first-page":"1","volume-title":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","author":"S Ali","year":"2017","unstructured":"Ali, S., & Ghazal, M. (2017). Real-time heart attack mobile detection service (RHAMDS): An IoT use case for software defined networks. In 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE) (pp. 1\u20136). Piscataway: IEEE."},{"key":"19_CR4","volume-title":"Deploying fog applications how much does it cost, by the way? In International Conference on Cloud Computing and Services Science","author":"B Antonio","year":"2017","unstructured":"Antonio, B., Stefano, F., & Ahmad, I. (2017). Deploying fog applications how much does it cost, by the way? In International Conference on Cloud Computing and Services Science. Set\u00fabal: SciTePress."},{"issue":"5","key":"19_CR5","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1109\/JIOT.2017.2701408","volume":"4","author":"A Brogi","year":"2017","unstructured":"Brogi, A., & Forti, S. (2017). QoS-aware deployment of IoT applications through the fog. IEEE Internet of Things Journal, 4(5), 1185\u20131192.","journal-title":"IEEE Internet of Things Journal"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/ICFEC.2017.8","volume-title":"2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC)","author":"A Brogi","year":"2017","unstructured":"Brogi, A., Forti, S., & Ibrahim, A. (2017). How to best deploy your fog applications, probably. In 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC) (pp. 105\u2013114). Piscataway: IEEE."},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1002\/9781119525080.ch9","volume-title":"Fog and edge computing: Principles and paradigms","author":"A Brogi","year":"2019","unstructured":"Brogi, A., Forti, S., & Ibrahim, A. (2019). Predictive analysis to support fog application deployment. In Fog and edge computing: Principles and paradigms (pp. 191\u2013222). Hoboken: Wiley."},{"issue":"1","key":"19_CR8","first-page":"23","volume":"41","author":"R N Calheiros","year":"2011","unstructured":"Calheiros, R. N., Ranjan, R., Beloglazov, A., De Rose, C. A., & Buyya, R. (2011). CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and Experience, 41(1), 23\u201350.","journal-title":"Software: Practice and Experience"},{"key":"19_CR9","first-page":"1378583","volume":"2018","author":"Y Chen","year":"2018","unstructured":"Chen, Y., Lu, Z., Xiong, H., & Xu, W. (2018). Privacy-preserving data aggregation protocol for fog computing-assisted vehicle-to-infrastructure scenario. Security and Communication Networks, 2018, 1378583.","journal-title":"Security and Communication Networks"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1109\/ACSSC.2015.7421170","volume-title":"2015 49th Asilomar Conference on Signals, Systems and Computers","author":"R Craciunescu","year":"2015","unstructured":"Craciunescu, R., Mihovska, A., Mihaylov, M., Kyriazakos, S., Prasad, R., & Halunga, S. (2015). Implementation of fog computing for reliable e-health applications. In 2015 49th Asilomar Conference on Signals, Systems and Computers (pp. 459\u2013463). Piscataway: IEEE."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Dasgupta, K., Kalpakis, K., & Namjoshi, P. (2003). An efficient clustering-based heuristic for data gathering and aggregation in sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1948\u20131953). Citeseer.","DOI":"10.1109\/WCNC.2003.1200685"},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/ICCNC.2017.7876242","volume-title":"2017 International Conference on Computing, Networking and Communications (ICNC)","author":"M Etemad","year":"2017","unstructured":"Etemad, M., Aazam, M., & St-Hilaire, M. (2017). Using DEVS for modeling and simulating a fog computing environment. In 2017 International Conference on Computing, Networking and Communications (ICNC) (pp. 849\u2013854). Piscataway: IEEE."},{"key":"19_CR13","first-page":"356","volume-title":"2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM)","author":"T N Gia","year":"2015","unstructured":"Gia, T. N., Jiang, M., Rahmani, A.-M., Westerlund, T., Liljeberg, P., & Tenhunen, H. (2015). Fog computing in healthcare internet-of-things: A case study on ECG feature extraction. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM) (pp. 356\u2013363). Piscataway: IEEE."},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.jnca.2018.09.019","volume":"125","author":"Z Guan","year":"2019","unstructured":"Guan, Z., Zhang, Y., Wu, L., Wu, J., Li, J., Ma, Y., & Hu, J. (2019). APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. Journal of Network and Computer Applications, 125, 82\u201392.","journal-title":"Journal of Network and Computer Applications"},{"issue":"9","key":"19_CR15","first-page":"1275","volume":"47","author":"H Gupta","year":"2017","unstructured":"Gupta, H., Vahid Dastjerdi, A., Ghosh, S. K., & Buyya, R. (2017). iFogSim: A toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments. Software: Practice and Experience, 47(9), 1275\u20131296.","journal-title":"Software: Practice and Experience"},{"key":"19_CR16","doi-asserted-by":"publisher","first-page":"6285719","DOI":"10.1155\/2018\/6285719","volume":"2018","author":"Y Huo","year":"2018","unstructured":"Huo, Y., Yong, C., & Lu, Y. (2018). Re-ADP: Real-time data aggregation with adaptive \u03c9-event differential privacy for fog computing. Wireless Communications and Mobile Computing, 2018, 6285719.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"1","key":"19_CR17","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/COMST.2014.2354398","volume":"17","author":"P Jesus","year":"2015","unstructured":"Jesus, P., Baquero, C., & Almeida, P. S. (2015). A survey of distributed data aggregation algorithms. IEEE Communications Surveys & Tutorials, 17(1), 381\u2013404.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"5","key":"19_CR18","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MNET.2015.7293300","volume":"29","author":"H Ke","year":"2015","unstructured":"Ke, H., Li, P., Guo, S., & Stojmenovic, I. (2015). Aggregation on the fly: Reducing traffic for big data in the cloud. IEEE Network, 29(5), 17\u201323.","journal-title":"IEEE Network"},{"issue":"6","key":"19_CR19","doi-asserted-by":"publisher","first-page":"10","DOI":"10.5120\/ijca2017913653","volume":"164","author":"D Lanka","year":"2017","unstructured":"Lanka, D., Veenadhari, C. L., & Suryanarayana, D. (2017). Application of fog computing in military operations. International Journal of Computer Applications, 164(6), 10\u201315.","journal-title":"International Journal of Computer Applications"},{"key":"19_CR20","unstructured":"Lantz, B., Heller, B., & McKeown, N. (2010). A network in a laptop: Rapid prototyping for software-defined networks. In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks (p. 19). New York: ACM."},{"key":"19_CR21","volume-title":"Yet another fog simulator (YAFS)","author":"I Lera","year":"2018","unstructured":"Lera, I., & Guerrero, C. (2018). Yet another fog simulator (YAFS). Retrieved January 8, 2018, from \nhttps:\/\/pypi.org\/project\/yafs\/"},{"key":"19_CR22","first-page":"47","volume-title":"Companion Proceedings of the 10th International Conference on Utility and Cloud Computing","author":"M M Lopes","year":"2017","unstructured":"Lopes, M. M., Higashino, W. A., Capretz, M. A., & Bittencourt, L. F. (2017). Myifogsim: A simulator for virtual machine migration in fog computing. In Companion Proceedings of the 10th International Conference on Utility and Cloud Computing (pp. 47\u201352). New York: ACM."},{"key":"19_CR23","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access, 5, 3302\u20133312.","journal-title":"IEEE Access"},{"key":"19_CR24","doi-asserted-by":"publisher","first-page":"3733","DOI":"10.1109\/TII.2018.2803782","volume":"14","author":"L Lyu","year":"2018","unstructured":"Lyu, L., Nandakumar, K., Rubinstein, B., Jin, J., Bedo, J., & Palaniswami, M. (2018). PPFA: Privacy preserving fog-enabled aggregation in smart grid. IEEE Transactions on Industrial Informatics, 14, 3733\u20133744.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"19_CR25","volume-title":"Modelling and simulation of fog and edge computing environments using iFogSim toolkit. Fog and edge computing: Principles and paradigms (pp. 1\u201335)","author":"R Mahmud","year":"2019","unstructured":"Mahmud, R., & Buyya, R. (2019). Modelling and simulation of fog and edge computing environments using iFogSim toolkit. Fog and edge computing: Principles and paradigms (pp. 1\u201335). London: Wiley."},{"key":"19_CR26","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-981-10-5861-5_5","volume-title":"Internet of everything","author":"R Mahmud","year":"2018","unstructured":"Mahmud, R., Kotagiri, R., & Buyya, R. (2018). Fog computing: A taxonomy, survey and future directions. In Internet of everything (pp. 103\u2013130). Berlin: Springer."},{"key":"19_CR27","unstructured":"Maio, V. D. M. (2018). FogTorchPI-extended project repository. Retrieved Accessed: January 8, 2018 from \nhttps:\/\/bitbucket.org\/vindem\/fogtorchpi-extended\/src"},{"key":"19_CR28","first-page":"1","volume-title":"2017 IEEE Fog World Congress (FWC)","author":"R Mayer","year":"2017","unstructured":"Mayer, R., Graser, L., Gupta, H., Saurez, E., & Ramachandran, U. (2017). EmuFog: Extensible and scalable emulation of large-scale fog computing infrastructures. In 2017 IEEE Fog World Congress (FWC) (pp. 1\u20136). Piscataway: IEEE."},{"issue":"4","key":"19_CR29","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1109\/JIOT.2017.2717845","volume":"4","author":"B Mei","year":"2017","unstructured":"Mei, B., Li, R., Cheng, W., Yu, J., & Cheng, X. (2017). Ultraviolet radiation measurement via smart devices. IEEE Internet of Things Journal, 4(4), 934\u2013944.","journal-title":"IEEE Internet of Things Journal"},{"issue":"6","key":"19_CR30","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MCC.2016.118","volume":"3","author":"Yannis Nikoloudakis","year":"2016","unstructured":"Nikoloudakis, Y., Panagiotakis, S., Markakis, E., Pallis, E., Mastorakis, G., Mavromoustakis, C. X., et al. (2016). A fog-based emergency system for smart enhanced living environments. IEEE Cloud Computing, (6), 54\u201362.","journal-title":"IEEE Cloud Computing"},{"key":"19_CR31","first-page":"1","volume-title":"2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG)","author":"F Y Okay","year":"2018","unstructured":"Okay, F. Y., & Ozdemir, S. (2018). A secure data aggregation protocol for fog computing based smart grids. In 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG) (pp. 1\u20136). Piscataway: IEEE."},{"key":"19_CR32","doi-asserted-by":"publisher","first-page":"63570","DOI":"10.1109\/ACCESS.2018.2877696","volume":"6","author":"T Qayyum","year":"2018","unstructured":"Qayyum, T., Malik, A. W., Khattak, M. A. K., Khalid, O., & Khan, S. U. (2018). FogNetSim++: A toolkit for modeling and simulation of distributed fog environment. IEEE Access, 6, 63570\u201363583.","journal-title":"IEEE Access"},{"key":"19_CR33","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.future.2017.02.014","volume":"78","author":"A M Rahmani","year":"2018","unstructured":"Rahmani, A. M., Gia, T. N., Negash, B., Anzanpour, A., Azimi, I., Jiang, M., et al. (2018). Exploiting smart e-health gateways at the edge of healthcare internet-of-things: A fog computing approach. Future Generation Computer Systems, 78, 641\u2013658.","journal-title":"Future Generation Computer Systems"},{"key":"19_CR34","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/ICIINFS.2009.5429896","volume-title":"2009 International Conference on Industrial and Information Systems (ICIIS)","author":"R Rout","year":"2009","unstructured":"Rout, R., Ghosh, S., & Chakrabarti, S. (2009). Network coding-aware data aggregation for a distributed wireless sensor network. In 2009 International Conference on Industrial and Information Systems (ICIIS) (pp. 32\u201336). Piscataway: IEEE."},{"key":"19_CR35","volume-title":"Fog computing in IoT","author":"A Tayal","year":"2018","unstructured":"Tayal, A. (2018). Fog computing in IoT. Retrieved January 8, 2018, from \nhttps:\/\/www.tetcos.com\/file-exchange.html"},{"key":"19_CR36","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.future.2017.02.032","volume":"78","author":"H Wang","year":"2018","unstructured":"Wang, H., Wang, Z., & Domingo-Ferrer, J. (2018). Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Generation Computer Systems, 78, 712\u2013719.","journal-title":"Future Generation Computer Systems"},{"key":"19_CR37","first-page":"1","volume-title":"Networking Conference, 2014 IFIP","author":"P Wette","year":"2014","unstructured":"Wette, P., Draxler, M., Schwabe, A., Wallaschek, F., Zahraee, M. H., & Karl, H. (2014). Maxinet: Distributed emulation of software-defined networks. In Networking Conference, 2014 IFIP (pp. 1\u20139). Piscataway: IEEE."},{"key":"19_CR38","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/HotWeb.2015.22","volume-title":"2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb)","author":"S Yi","year":"2015","unstructured":"Yi, S., Hao, Z., Qin, Z., & Li, Q. (2015). Fog computing: Platform and applications. In 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb) (pp. 73\u201378). Piscataway: IEEE."},{"key":"19_CR39","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/2757384.2757397","volume-title":"Proceedings of the 2015 Workshop on Mobile Big Data","author":"S Yi","year":"2015","unstructured":"Yi, S., Li, C., & Li, Q. (2015). A survey of fog computing: Concepts, applications and issues. In Proceedings of the 2015 Workshop on Mobile Big Data (pp. 37\u201342). New York: ACM."},{"key":"19_CR40","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1109\/IE.2014.54","volume-title":"2014 International Conference on Intelligent Environments (IE)","author":"J K Zao","year":"2014","unstructured":"Zao, J. K., Gan, T. T., You, C. K., M\u00e9ndez, S. J. R., Chung, C. E., Te Wang, Y., et al. (2014). Augmented brain computer interaction based on fog computing and linked data. In 2014 International Conference on Intelligent Environments (IE) (pp. 374\u2013377). Piscataway: IEEE."},{"issue":"5","key":"19_CR41","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1109\/TIFS.2016.2515513","volume":"11","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Chen, Q., & Zhong, S. (2016). Privacy-preserving data aggregation in mobile phone sensing. IEEE Transactions on Information Forensics and Security, 11(5), 980\u2013992.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"19_CR42","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/978-3-030-05063-4_44","volume-title":"International Conference on Algorithms and Architectures for Parallel Processing","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Zhao, J., Zheng, D., Deng, K., Ren, F., & Zheng, X. (2018). Privacy-aware data collection and aggregation in IoT enabled fog computing. In International Conference on Algorithms and Architectures for Parallel Processing (pp. 581\u2013590). Berlin: Springer."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:04:58Z","timestamp":1577775898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_19","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}