{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:14:21Z","timestamp":1743124461637,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031379390"},{"type":"electronic","value":"9783031379406"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37940-6_2","type":"book-chapter","created":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T20:23:00Z","timestamp":1690057380000},"page":"12-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Energy Preserving ABE-Based Data Security Scheme for Fog Computing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0215-5756","authenticated-orcid":false,"given":"Sandeep","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3227-5036","authenticated-orcid":false,"given":"Ritu","family":"Garg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,23]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1016\/j.future.2016.10.028","volume":"78","author":"C Zuo","year":"2018","unstructured":"Zuo, C., Shao, J., Wei, G., Xie, M., Ji, M.: CCA-secure ABE with outsourced decryption for fog computing. Futur. Gener. Comput. Syst. 78, 730\u2013738 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"2_CR2","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/JIOT.2015.2388588","volume":"2","author":"N Kumar","year":"2015","unstructured":"Kumar, N., Misra, S., Rodrigues, J.J., Obaidat, M.S.: Coalition games for spatio-temporal big data in internet of vehicles environment: a comparative analysis. IEEE Internet Things J. 2(4), 310\u2013320 (2015)","journal-title":"IEEE Internet Things J."},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Iorga, M., Feldman, L., Barton, R., Martin, M.J., Goren, N. S., Mahmoudi, C.: Fog computing conceptual model (2018)","DOI":"10.6028\/NIST.SP.500-325"},{"issue":"11","key":"2_CR4","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2017.1700102","volume":"55","author":"R Chaudhary","year":"2017","unstructured":"Chaudhary, R., Kumar, N., Zeadally, S.: Network service chain-ing in fog and cloud computing for the 5G environment: data management and security challenges. IEEE Commun. Mag. 55(11), 114\u2013122 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1016\/j.future.2017.01.024","volume":"78","author":"D Koo","year":"2018","unstructured":"Koo, D., Hur, J.: Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Futur. Gener. Comput. Syst. 78, 739\u2013752 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"17","key":"2_CR6","doi-asserted-by":"publisher","first-page":"24595","DOI":"10.1007\/s11042-018-7008-z","volume":"78","author":"T Khalid","year":"2019","unstructured":"Khalid, T., Khan, A.N., Ali, M., Adeel, A., Shuja, J.: A fog-based security framework for intelligent traffic light control sys-tem. Multimedia Tools and Applications 78(17), 24595\u201324615 (2019)","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3390\/jsan8010015","volume":"8","author":"A Muthanna","year":"2019","unstructured":"Muthanna, A., et al.: Secure and reliable IoT networks using fog computing with software-defined networking and blockchain. J. Sens. Actuator Netw. 8(1), 15 (2019)","journal-title":"J. Sens. Actuator Netw."},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.comnet.2019.04.018","volume":"157","author":"M Abdel-Basset","year":"2019","unstructured":"Abdel-Basset, M., Manogaran, G., Mohamed, M.: A neutro-sophic theory-based security approach for fog and mobile-edge computing. Comput. Netw. 157, 122\u2013132 (2019)","journal-title":"Comput. Netw."},{"issue":"3","key":"2_CR9","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"B Dan","year":"2003","unstructured":"Dan, B., Matthew, F.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 457\u2013473. Springer, Berlin, Heidelberg (2005, May)","DOI":"10.1007\/11426639_27"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Annual international cryptology conference, pp. 213\u2013229. Springer, Berlin, Heidelberg (2001, August)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"2_CR12","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution (1996)"},{"issue":"3","key":"2_CR13","doi-asserted-by":"publisher","first-page":"1221","DOI":"10.1007\/s11277-016-3603-3","volume":"92","author":"P Jindal","year":"2017","unstructured":"Jindal, P., Singh, B.: Optimization of the security-performance tradeoff in RC4 encryption algorithm. Wireless Pers. Commun. 92(3), 1221\u20131250 (2017)","journal-title":"Wireless Pers. Commun."},{"issue":"20","key":"2_CR14","doi-asserted-by":"publisher","first-page":"19803","DOI":"10.1109\/JIOT.2022.3167832","volume":"9","author":"PK Deb","year":"2022","unstructured":"Deb, P.K., Mukherjee, A., Misra, S.: CEaaS: Constrained Encryption as a Service in Fog-Enabled IoT. IEEE Internet Things J. 9(20), 19803\u201319810 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"2_CR15","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1007\/s11277-021-09209-1","volume":"123","author":"N Yuvaraj","year":"2022","unstructured":"Yuvaraj, N., Raja, R.A., Karthikeyan, T., Praghash, K.: Improved authentication in secured multicast wireless sensor network (MWSN) using opposition frog leaping algorithm to resist man-in-middle attack. Wireless Pers. Commun. 123(2), 1715\u20131731 (2022)","journal-title":"Wireless Pers. Commun."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Verma, R., Dhanda, N., Nagar, V.: Enhancing Security with In-Depth Analysis of Brute-Force Attack on Secure Hashing Algorithms. In: Proceedings of Trends in Electronics and Health Informatics: TEHI 2021, pp. 513\u2013522. Springer Nature Singapore, Singapore (2022)","DOI":"10.1007\/978-981-16-8826-3_44"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37940-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T20:23:11Z","timestamp":1690057391000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37940-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031379390","9783031379406"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37940-6_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"23 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair & Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"464","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}