{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:21:05Z","timestamp":1772738465925,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030249069","type":"print"},{"value":"9783030249076","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_6","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"63-77","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Ensuring Data Integrity in Fog Computing Based Health-Care Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9661-7440","authenticated-orcid":false,"given":"Abdulwahab","family":"Alazeb","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1117-9328","authenticated-orcid":false,"given":"Brajendra","family":"Panda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Aazam, M., Hung, P.P., Huh, E.N.: Smart gateway based communication for cloud of things. In: 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/ISSNIP.2014.6827673"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Akrivopoulos, O., Chatzigiannakis, I., Tselios, C., Antoniou, A.: On the deployment of healthcare applications over fog computing infrastructure. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 288\u2013293. IEEE (2017)","DOI":"10.1109\/COMPSAC.2017.178"},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.eij.2016.11.001","volume":"18","author":"S Al-Janabi","year":"2017","unstructured":"Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., Shamshirband, S.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Inform. J. 18(2), 113\u2013122 (2017)","journal-title":"Egypt. Inform. J."},{"issue":"5","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TKDE.2002.1033782","volume":"14","author":"P Ammann","year":"2002","unstructured":"Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. IEEE Trans. Knowl. Data Eng. 14(5), 1167\u20131185 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"5s","key":"6_CR5","first-page":"174","volume":"16","author":"I Azimi","year":"2017","unstructured":"Azimi, I., et al.: Hich: Hierarchical fog-assisted computing architecture for healthcare IoT. ACM Trans. Embed. Comput. Syst. (TECS) 16(5s), 174 (2017)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"6_CR6","unstructured":"Bonomi, F.: Connected vehicles, the internet of things, and fog computing. In: The Eighth ACM International Workshop on Vehicular Inter-networking (VANET), Las Vegas, USA, pp. 13\u201315 (2011)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13\u201316. ACM (2012)","DOI":"10.1145\/2342509.2342513"},{"key":"6_CR8","unstructured":"CISCO: Fog computing and the internet of things: Extend the cloud to where the things are (2015)"},{"key":"6_CR9","unstructured":"IHS Markit: The internet of things: a movement, not a market (2017)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Kim, Y., Kim, D., Son, J., Wang, W., Noh, Y.: A new fog-cloud storage framework with transparency and auditability. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/ICC.2018.8422479"},{"issue":"19","key":"6_CR11","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1001\/jama.2017.2714","volume":"317","author":"DG Kirch","year":"2017","unstructured":"Kirch, D.G., Petelle, K.: Addressing the physician shortage: The peril of ignoring demography. Jama 317(19), 1947\u20131948 (2017)","journal-title":"Jama"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"9206","DOI":"10.1109\/ACCESS.2017.2704100","volume":"5","author":"FA Kraemer","year":"2017","unstructured":"Kraemer, F.A., Braten, A.E., Tamkittikhun, N., Palma, D.: Fog computing in healthcare-a review and discussion. IEEE Access 5, 9206\u20139222 (2017)","journal-title":"IEEE Access"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Kudo, T.: Fog computing with distributed database. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), pp. 623\u2013630. IEEE (2018)","DOI":"10.1109\/AINA.2018.00096"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot. IEEE Access 5, 3302\u20133312 (2017)","journal-title":"IEEE Access"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Madsen, H., Burtschy, B., Albeanu, G., Popentiu-Vladicescu, F.: Reliability in the utility computing era: Towards reliable fog computing. In: 2013 20th International Conference on Systems, Signals and Image Processing, pp. 43\u201346. IEEE (2013)","DOI":"10.1109\/IWSSIP.2013.6623445"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Panda, B., Haque, K.A.: Extended data dependency approach: a robust way of rebuilding database. In: Proceedings of the 2002 ACM symposium on Applied computing, pp. 446\u2013452. ACM (2002)","DOI":"10.1145\/508791.508875"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., Wen, S.: The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, pp. 1\u20138. IEEE (2014)","DOI":"10.15439\/2014F503"},{"key":"6_CR18","unstructured":"Zhang, B., et al.: The cloud is not enough: Saving IoT from the cloud. In: 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 2015) (2015)"},{"issue":"2","key":"6_CR19","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1108\/09685220610655870","volume":"14","author":"Y Zuo","year":"2006","unstructured":"Zuo, Y., Panda, B.: Distributed database damage assessment paradigm. Inf. Manag. Comput. Sec. 14(2), 116\u2013139 (2006)","journal-title":"Inf. Manag. Comput. Sec."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:03:57Z","timestamp":1562771037000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}