{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:52:53Z","timestamp":1774122773176,"version":"3.50.1"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319218366","type":"print"},{"value":"9783319218373","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21837-3_67","type":"book-chapter","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:40:31Z","timestamp":1438350031000},"page":"685-695","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":359,"title":["Security and Privacy Issues of Fog Computing: A Survey"],"prefix":"10.1007","author":[{"given":"Shanhe","family":"Yi","sequence":"first","affiliation":[]},{"given":"Zhengrui","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Qun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"key":"67_CR1","unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: NDSS (2002)"},{"key":"67_CR2","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Workshop on Mobile Cloud Computing. ACM (2012)","DOI":"10.1145\/2342509.2342513"},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"Bouzefrane, S., Mostefa, A.F.B., Houacine, F., Cagnon, H.: Cloudlets authentication in nfc-based mobile computing. In: MobileCloud. IEEE (2014)","DOI":"10.1109\/MobileCloud.2014.46"},{"issue":"1","key":"67_CR4","first-page":"222","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. TPDS 25(1), 222\u2013233 (2014)","journal-title":"TPDS"},{"key":"67_CR5","unstructured":"Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y.T.: Lt codes-based secure and reliable cloud storage service. In: INFOCOM. IEEE (2012)"},{"key":"67_CR6","doi-asserted-by":"crossref","unstructured":"Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS, vol. 14 (2014)","DOI":"10.14722\/ndss.2014.23264"},{"key":"67_CR7","doi-asserted-by":"crossref","unstructured":"Damiani, E., et al.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: CCS. ACM (2002)","DOI":"10.1145\/586110.586138"},{"issue":"18","key":"67_CR8","first-page":"1587","volume":"13","author":"HT Dinh","year":"2013","unstructured":"Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. WCMC 13(18), 1587\u20131611 (2013)","journal-title":"WCMC"},{"key":"67_CR9","doi-asserted-by":"crossref","unstructured":"Dsouza, C., Ahn, G.J., Taguinod, M.: Policy-driven security management for fog computing: preliminary framework and a case study. In: IRI. IEEE (2014)","DOI":"10.1109\/IRI.2014.7051866"},{"key":"67_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Encyclopedia of Cryptography and Security","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: Differential privacy. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. LNCS, vol. 2011. Springer, Heidelberg (2011)"},{"key":"67_CR11","unstructured":"ETSI: Mobile-edge computing (2014). http:\/\/goo.gl\/7NwTLE"},{"key":"67_CR12","doi-asserted-by":"crossref","unstructured":"Gao, Z., Zhu, H., Liu, Y., Li, M., Cao, Z.: Location privacy in database-driven cognitive radio networks: Attacks and countermeasures. In: INFOCOM. IEEE (2013)","DOI":"10.1109\/INFCOM.2013.6567084"},{"key":"67_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"R Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465\u2013482. Springer, Heidelberg (2010)"},{"key":"67_CR14","unstructured":"Gil Press: Idc: Top 10 technology predictions (2015). http:\/\/goo.gl\/zFujnE"},{"key":"67_CR15","doi-asserted-by":"crossref","unstructured":"Ha, K., Chen, Z., Hu, W., Richter, W., Pillai, P., Satyanarayanan, M.: Towards wearable cognitive assistance. In: Mobisys. ACM (2014)","DOI":"10.21236\/ADA591470"},{"key":"67_CR16","doi-asserted-by":"crossref","unstructured":"Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A measurement based rogue ap detection scheme. In: INFOCOM. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5062077"},{"issue":"11","key":"67_CR17","first-page":"1912","volume":"22","author":"H Han","year":"2011","unstructured":"Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A timing-based scheme for rogue ap detection. TPDS 22(11), 1912\u20131925 (2011)","journal-title":"TPDS"},{"issue":"2","key":"67_CR18","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"67_CR19","doi-asserted-by":"crossref","unstructured":"Klaedtke, F., Karame, G.O., Bifulco, R., Cui, H.: Access control for sdn controllers. In: HotSDN, vol. 14 (2014)","DOI":"10.1145\/2620728.2620773"},{"issue":"9","key":"67_CR20","first-page":"1621","volume":"23","author":"R Lu","year":"2012","unstructured":"Lu, R., et al.: Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. TPDS 23(9), 1621\u20131631 (2012)","journal-title":"TPDS"},{"issue":"2","key":"67_CR21","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., et al.: Openflow: enabling innovation in campus networks. ACM SIGCOMM CCR 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM CCR"},{"key":"67_CR22","doi-asserted-by":"crossref","unstructured":"McLaughlin, S., McDaniel, P., Aiello, W.: Protecting consumer privacy from electric load monitoring. In: CCS. ACM (2011)","DOI":"10.1145\/2046707.2046720"},{"issue":"1","key":"67_CR23","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi, C., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42\u201357 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"67_CR24","doi-asserted-by":"crossref","unstructured":"Novak, E., Li, Q.: Near-pri: Private, proximity based location sharing. In: INFOCOM. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6847922"},{"key":"67_CR25","doi-asserted-by":"crossref","unstructured":"Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: nearly practical verifiable computation. In: Security and Privacy. IEEE (2013)","DOI":"10.1109\/SP.2013.47"},{"issue":"10","key":"67_CR26","first-page":"1961","volume":"24","author":"Z Qin","year":"2013","unstructured":"Qin, Z., Li, Q., Chuah, M.C.: Defending against unidentifiable attacks in electric power grids. TPDS 24(10), 1961\u20131971 (2013)","journal-title":"TPDS"},{"key":"67_CR27","doi-asserted-by":"crossref","unstructured":"Qin, Z., Yi, S., Li, Q., Zamkov, D.: Preserving secondary users\u2019 privacy in cognitive radio networks. In: INFOCOM, 2014 Proceedings IEEE. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848004"},{"key":"67_CR28","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society. ACM (2011)","DOI":"10.1145\/2046556.2046564"},{"issue":"4","key":"67_CR29","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MPRV.2009.82","volume":"8","author":"M Satyanarayanan","year":"2009","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. Perv. Comput. 8(4), 14\u201323 (2009)","journal-title":"Perv. Comput."},{"issue":"3","key":"67_CR30","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MCOM.2015.7060484","volume":"53","author":"M Satyanarayanan","year":"2015","unstructured":"Satyanarayanan, M., et al.: An open ecosystem for mobile-cloud convergence. Commun. Mag. 53(3), 63\u201370 (2015)","journal-title":"Commun. Mag."},{"key":"67_CR31","doi-asserted-by":"crossref","unstructured":"Shi, Y., Abhilash, S., Hwang, K.: Cloudlet mesh for securing mobile clouds from intrusions and network attacks. In: Mobile Cloud 2015)","DOI":"10.1109\/MobileCloud.2015.15"},{"key":"67_CR32","unstructured":"Shin, S., Gu, G.: Cloudwatcher: network security monitoring using openflow in dynamic cloud networks. In: ICNP. IEEE (2012)"},{"key":"67_CR33","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Security and Privacy. IEEE (2000)"},{"key":"67_CR34","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: FedCSIS. IEEE (2014)","DOI":"10.15439\/2014F503"},{"issue":"6","key":"67_CR35","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24\u201331 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"67_CR36","series-title":"Lecture Notes in Computer Science","volume-title":"Secure Cloud Computing","author":"M Tsugawa","year":"2014","unstructured":"Tsugawa, M., et al.: Cloud computing security: what changes with software-defined networking? In: Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V., Wang, C. (eds.) Secure Cloud Computing. LNCS. Springer, Heidelberg (2014)"},{"issue":"2","key":"67_CR37","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1109\/TPWRS.2012.2224144","volume":"28","author":"J Valenzuela","year":"2013","unstructured":"Valenzuela, J., Wang, J., Bissinger, N.: Real-time intrusion detection in power system operations. IEEE Trans. Pow. Syst. 28(2), 1052\u20131062 (2013)","journal-title":"IEEE Trans. Pow. Syst."},{"issue":"5","key":"67_CR38","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2677046.2677052","volume":"44","author":"LM Vaquero","year":"2014","unstructured":"Vaquero, L.M., Rodero-Merino, L.: Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM CCR 44(5), 27\u201332 (2014)","journal-title":"ACM SIGCOMM CCR"},{"issue":"8","key":"67_CR39","first-page":"1467","volume":"23","author":"C Wang","year":"2012","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. TPDS 23(8), 1467\u20131479 (2012)","journal-title":"TPDS"},{"key":"67_CR40","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"67_CR41","doi-asserted-by":"crossref","unstructured":"Wei, W., Xu, F., Li, Q.: Mobishare: Flexible privacy-preserving location sharing in mobile online social networks. In: INFOCOM. IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195664"},{"key":"67_CR42","doi-asserted-by":"crossref","unstructured":"Willis, D.F., Dasgupta, A., Banerjee, S.: Paradrop: a multi-tenant platform for dynamically installed third party services on home gateways. In: SIGCOMM Workshop on Distributed Cloud Computing. ACM (2014)","DOI":"10.1145\/2627566.2627583"},{"issue":"4","key":"67_CR43","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s11280-011-0138-0","volume":"15","author":"K Yang","year":"2012","unstructured":"Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409\u2013428 (2012)","journal-title":"World Wide Web"},{"key":"67_CR44","unstructured":"Yap, K.K., et al.: Separating authentication, access and accounting: a case study with openwifi. Technical report, Open Networking Foundation (2011)"},{"key":"67_CR45","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"67_CR46","doi-asserted-by":"crossref","unstructured":"Zao, J.K., et al.: Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology. Frontiers in Human Neuroscience 8 (2014)","DOI":"10.3389\/fnhum.2014.00370"},{"issue":"1","key":"67_CR47","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q Zhang","year":"2010","unstructured":"Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7\u201318 (2010)","journal-title":"J. Internet Serv. Appl."},{"key":"67_CR48","unstructured":"Zhu, J., et al.: Improving web sites performance using edge servers in fog computing architecture. In: SOSE. IEEE (2013)"},{"issue":"3","key":"67_CR49","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21837-3_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T09:58:12Z","timestamp":1676973492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21837-3_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319218366","9783319218373"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21837-3_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}