{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T10:11:23Z","timestamp":1770891083476,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030595050","type":"print"},{"value":"9783030595067","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59506-7_17","type":"book-chapter","created":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T23:07:55Z","timestamp":1602112075000},"page":"196-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Orchestration Security Challenges in the Fog Computing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7029-2035","authenticated-orcid":false,"given":"Nerijus","family":"\u0160atkauskas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4567-5023","authenticated-orcid":false,"given":"Algimantas","family":"Ven\u010dkauskas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0604-3004","authenticated-orcid":false,"given":"Nerijus","family":"Morkevi\u010dius","sequence":"additional","affiliation":[]},{"given":"Agnius","family":"Liutkevi\u010dius","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,8]]},"reference":[{"key":"17_CR1","unstructured":"OpenFog Consortium Architecture Working Group, et al.: OpenFog reference architecture for fog computing. In: OPFRA001, vol. 20817, p. 162 (2017)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J.\u00b8 Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13\u201316 (2012)","DOI":"10.1145\/2342509.2342513"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680\u2013698 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"A Yousefpour","year":"2019","unstructured":"Yousefpour, A., et al.: All one needs to know about fog computing and related edge computing paradigms: a complete survey. J. Syst. Archit. 98, 289\u2013330 (2019). \nhttps:\/\/doi.org\/10.1016\/j.sysarc.2019.02.009","journal-title":"J. Syst. Archit."},{"issue":"3","key":"17_CR5","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MCE.2019.2893674","volume":"8","author":"D Puthal","year":"2019","unstructured":"Puthal, D., Mohanty, S.P., Bhavake, S.A., Morgan, G., Ranjan, R.: Fog computing security challenges and future directions [energy and security]. IEEE Consum. Electron. Mag. 8(3), 92\u201396 (2019). \nhttps:\/\/doi.org\/10.1109\/MCE.2019.2893674","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"2","key":"17_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MIC.2017.36","volume":"21","author":"Z Wen","year":"2017","unstructured":"Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J., Rovatsos, M.: Fog orchestration for Internet of Things services. IEEE Internet Comput. 21(2), 16\u201324 (2017). \nhttps:\/\/doi.org\/10.1109\/MIC.2017.36","journal-title":"IEEE Internet Comput."},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Martin, B.A., et al.: OpenFog security requirements and approaches. In: 2017 IEEE Fog World Congress (FWC), October 2017, pp. 1\u20136. \nhttps:\/\/doi.org\/10.1109\/fwc.2017.8368537","DOI":"10.1109\/fwc.2017.8368537"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Bormann, C., Ersue, M., Ker\u00e4nen, A.: Terminology for Constrained-Node Networks. RFC Editor (2014)","DOI":"10.17487\/rfc7228"},{"issue":"10","key":"17_CR9","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266\u20132279 (2013)","journal-title":"Comput. Netw."},{"issue":"3","key":"17_CR10","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MNET.2017.1700271","volume":"32","author":"Y Jiang","year":"2017","unstructured":"Jiang, Y., Huang, Z., Tsang, D.H.: Challenges and solutions in fog computing orchestration. IEEE Netw. 32(3), 122\u2013129 (2017)","journal-title":"IEEE Netw."},{"key":"17_CR11","unstructured":"Liu, F., et al.: NIST cloud computing reference architecture: recommendations of the National Institute of Standards and Technology (Special Publication 500-292) (2012)"},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"de Brito, M.S., et al.: A service orchestration architecture for Fog-enabled infrastructures. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), May 2017, pp. 127\u2013132. \nhttps:\/\/doi.org\/10.1109\/fmec.2017.7946419","DOI":"10.1109\/fmec.2017.7946419"},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13174-018-0086-3","volume":"9","author":"K Velasquez","year":"2018","unstructured":"Velasquez, K., et al.: Fog orchestration for the Internet of Everything: state-of-the-art and research challenges. J. Internet Serv. Appl. 9(1), 1\u201323 (2018). \nhttps:\/\/doi.org\/10.1186\/s13174-018-0086-3","journal-title":"J. Internet Serv. Appl."},{"key":"17_CR14","doi-asserted-by":"publisher","unstructured":"Velasquez, K., et al.: Service orchestration in fog environments. In: 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), August 2017, pp. 329\u2013336. \nhttps:\/\/doi.org\/10.1109\/ficloud.2017.49","DOI":"10.1109\/ficloud.2017.49"},{"key":"17_CR15","unstructured":"Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG). ETSI NFV Work Group: Network Functions Virtualisation (NFV); Management and Orchestration (2013). \nhttps:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV\/001_099\/002\/01.01.01_60\/gs_nfv002v010101p.pdf\n\n. Accessed 17 February 2020"},{"issue":"6","key":"17_CR16","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MWC.2014.7000967","volume":"21","author":"J Liu","year":"2014","unstructured":"Liu, J., Zhao, T., Zhou, S., Cheng, Y., Niu, Z.: CONCERT: a cloud-based architecture for next-generation cellular systems. IEEE Wirel. Commun. 21(6), 14\u201322 (2014). \nhttps:\/\/doi.org\/10.1109\/MWC.2014.7000967","journal-title":"IEEE Wirel. Commun."},{"issue":"7","key":"17_CR17","doi-asserted-by":"publisher","first-page":"65","DOI":"10.3390\/sym8070065","volume":"8","author":"A Venckauskas","year":"2016","unstructured":"Venckauskas, A., Stuikys, V., Toldinas, J., Jusas, N.: A model-driven framework to develop personalized health monitoring. Symmetry-Basel 8(7), 65 (2016). \nhttps:\/\/doi.org\/10.3390\/sym8070065","journal-title":"Symmetry-Basel"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59506-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T23:11:33Z","timestamp":1602112293000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-59506-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030595050","9783030595067"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59506-7_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icist2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icist.ktu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}