{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:22:27Z","timestamp":1753888947473,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680588"},{"type":"electronic","value":"9789811680595"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_31","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"505-514","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Review of Data Integrity Attacks and Mitigation Methods in Edge Computing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9414-3464","authenticated-orcid":false,"given":"Poornima","family":"Mahadevappa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9500-1361","authenticated-orcid":false,"given":"Raja Kumar","family":"Murugesan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","first-page":"8284","DOI":"10.1109\/ACCESS.2017.2692960","volume":"5","author":"O Osanaiye","year":"2017","unstructured":"Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K.K.R., Dlodlo, M.: From cloud to fog computing: a review and a conceptual live VM migration framework. IEEE Access. 5, 8284\u20138300 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2692960","journal-title":"IEEE Access."},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.future.2018.07.049","volume":"90","author":"AA Mutlag","year":"2019","unstructured":"Mutlag, A.A., Abd Ghani, M.K., Arunkumar, N., Mohammed, M.A., Mohd, O.: Enabling technologies for fog computing in healthcare IoT systems. Futur. Gener. Comput. Syst. 90, 62\u201378 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.07.049","journal-title":"Futur. Gener. Comput. Syst."},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.future.2018.11.043","volume":"94","author":"J Pereira","year":"2019","unstructured":"Pereira, J., Ricardo, L., Lu\u00eds, M., Senna, C., Sargento, S.: Assessing the reliability of fog computing for smart mobility applications in VANETs. Futur. Gener. Comput. Syst. 94, 317\u2013332 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.11.043","journal-title":"Futur. Gener. Comput. Syst."},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MWC.2019.1700441","volume":"26","author":"Z Ning","year":"2019","unstructured":"Ning, Z., Huang, J., Wang, X.: Vehicular fog computing: enabling real-time traffic management for smart cities. IEEE Wirel. Commun. 26, 87\u201393 (2019). https:\/\/doi.org\/10.1109\/MWC.2019.1700441","journal-title":"IEEE Wirel. Commun."},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.future.2018.08.043","volume":"91","author":"N Verba","year":"2019","unstructured":"Verba, N., Chao, K.-M., Lewandowski, J., Shah, N., James, A., Tian, F.: Modeling industry 4.0 based fog computing environments for application analysis and deployment. Future Gener. Comput. Syst. 91, 48\u201360 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.08.043","journal-title":"Future Gener. Comput. Syst."},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"A Yousefpour","year":"2019","unstructured":"Yousefpour, A., et al.: All one needs to know about fog computing and related edge computing paradigms: a complete survey. J. Syst. Archit. 98, 289\u2013330 (2019). https:\/\/doi.org\/10.1016\/j.sysarc.2019.02.009","journal-title":"J. Syst. Archit."},{"key":"31_CR7","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-981-33-6835-4_36","volume-title":"Advances in Cyber Security","author":"P Mahadevappa","year":"2021","unstructured":"Mahadevappa, P., Murugesan, R.K.: Study of container-based virtualisation and threats in fog computing. In: Anbar, M., Abdullah, N., Manickam, S. (eds.) ACeS 2020. CCIS, vol. 1347, pp. 535\u2013549. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-6835-4_36"},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/COMST.2018.2814571","volume":"20","author":"M Mukherjee","year":"2018","unstructured":"Mukherjee, M., Shu, L., Wang, D.: Survey of fog computing: fundamental, network applications, and research challenges. IEEE Commun. Surv. Tutor. 20, 1826\u20131857 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2814571","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"152847","DOI":"10.1109\/ACCESS.2019.2948399","volume":"7","author":"J Gedeon","year":"2019","unstructured":"Gedeon, J., Brandherm, F., Egert, R., Grube, T., Muhlhauser, M.: What the fog? edge computing revisited: promises Applications and Future Challenges. IEEE Access 7, 152847\u2013152878 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2948399","journal-title":"IEEE Access"},{"key":"31_CR10","unstructured":"Mann, Z.A.: Data protection in fog computing through monitoring and adaptation. Infosys.tuwien.ac.atPaperpile (2018)"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"4946","DOI":"10.1109\/JIOT.2019.2897619","volume":"6","author":"D Liu","year":"2019","unstructured":"Liu, D., Yan, Z., Ding, W., Atiquzzaman, M.: A Survey on secure data analytics in edge computing. IEEE Internet Things J. 6, 4946\u20134967 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2897619","journal-title":"IEEE Internet Things J."},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"18209","DOI":"10.1109\/ACCESS.2018.2820162","volume":"6","author":"J Zhang","year":"2018","unstructured":"Zhang, J., Chen, B., Zhao, Y., Cheng, X., Hu, F.: Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access. 6, 18209\u201318237 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2820162","journal-title":"IEEE Access."},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"101937","DOI":"10.1016\/j.adhoc.2019.101937","volume":"94","author":"H Noura","year":"2019","unstructured":"Noura, H., Salman, O., Chehab, A., Couturier, R.: Preserving data security in distributed fog computing. Ad Hoc Netw. 94, 101937 (2019). https:\/\/doi.org\/10.1016\/j.adhoc.2019.101937","journal-title":"Ad Hoc Netw."},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3392156","volume":"4","author":"A Aral","year":"2020","unstructured":"Aral, A., Erol-Kantarci, M., Brandi\u0107, I.: Staleness control for edge data analytics. Proc. ACM Meas. Anal. Comput. Syst. 4, 1\u201324 (2020). https:\/\/doi.org\/10.1145\/3392156","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"key":"31_CR15","first-page":"21","volume":"10","author":"D Coss","year":"2014","unstructured":"Coss, D., Samonas, S.: The CIA strikes back: redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 10, 21\u201345 (2014)","journal-title":"J. Inf. Syst. Secur."},{"key":"31_CR16","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80, 973\u2013993 (2014). https:\/\/doi.org\/10.1016\/j.jcss.2014.02.005","journal-title":"J. Comput. Syst. Sci."},{"key":"31_CR17","doi-asserted-by":"publisher","unstructured":"Bosaeed, S., Katib, I., Mehmood, R.: A fog-augmented machine learning based sms spam detection and classification system. In: 2020 5th International Conference on Fog and Mobile Edge Computing FMEC 2020, pp. 325\u2013330 (2020). https:\/\/doi.org\/10.1109\/FMEC49853.2020.9144833","DOI":"10.1109\/FMEC49853.2020.9144833"},{"key":"31_CR18","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MNET.2018.1700406","volume":"32","author":"B Feng","year":"2018","unstructured":"Feng, B., Fu, Q., Dong, M., Guo, D., Li, Q.: Multistage and elastic spam detection in mobile social networks through deep learning. IEEE Netw. 32, 15\u201321 (2018). https:\/\/doi.org\/10.1109\/MNET.2018.1700406","journal-title":"IEEE Netw."},{"key":"31_CR19","doi-asserted-by":"publisher","unstructured":"Shi, Y., Abhilash, S., Hwang, K.: Cloudlet mesh for securing mobile clouds from intrusions and network attacks. Proc. - 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering MobileCloud 2015, pp. 109\u2013118 (2015). https:\/\/doi.org\/10.1109\/MobileCloud.2015.15","DOI":"10.1109\/MobileCloud.2015.15"},{"key":"31_CR20","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.3390\/s18082659","volume":"18","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., et al.: Privacy-preserving data aggregation against false data injection attacks in fog computing. Sensors. 18, 2659 (2018). https:\/\/doi.org\/10.3390\/s18082659","journal-title":"Sensors."},{"key":"31_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics7060089","volume":"7","author":"P Xun","year":"2018","unstructured":"Xun, P., Zhu, P., Zhang, Z., Cui, P., Xiong, Y.: Detectors on edge nodes against false data injection on transmission lines of smart grid. Electron. 7, 1\u201312 (2018). https:\/\/doi.org\/10.3390\/electronics7060089","journal-title":"Electron."},{"issue":"15-16","key":"31_CR22","doi-asserted-by":"publisher","first-page":"10851","DOI":"10.1007\/s11042-019-08558-1","volume":"79","author":"D Liu","year":"2020","unstructured":"Liu, D., Shen, J., Vijayakumar, P., Wang, A., Zhou, T.: Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security. Multimedia Tools Appl. 79(15\u201316), 10851\u201310870 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08558-1","journal-title":"Multimedia Tools Appl."},{"key":"31_CR23","doi-asserted-by":"publisher","unstructured":"Tran, N.N., Pota, H.R., Tran, Q.N., Hu, J.: Designing constraint-based false data injection attacks against the unbalanced distribution smart grids. IEEE Internet Things J. 1\u201314 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3056649","DOI":"10.1109\/JIOT.2021.3056649"},{"key":"31_CR24","unstructured":"Alazeb, A., et al.: Data Integrity Preservation Schemes in Smart Healthcare, 1\u201327 (2021)"},{"key":"31_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-030-24907-6_6","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"A Alazeb","year":"2019","unstructured":"Alazeb, A., Panda, B.: Ensuring data integrity in fog computing based health-care systems. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 63\u201377. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24907-6_6"},{"key":"31_CR26","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5121\/ijnsa.2018.10602","volume":"10","author":"A KashifMunir","year":"2018","unstructured":"KashifMunir, A., Mohammed, L.: Secure Third Party Auditor(TPA) for ensuring data integrity in fog computing. Int. J. Netw. Secur. Its Appl. 10, 13\u201324 (2018). https:\/\/doi.org\/10.5121\/ijnsa.2018.10602","journal-title":"Int. J. Netw. Secur. Its Appl."},{"key":"31_CR27","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232819","author":"FN Nwebonyi","year":"2018","unstructured":"Nwebonyi, F.N., Martins, R., Correia, M.E.: Reputation-based security system for edge computing. ACM Int. Conf. Proc. Ser. (2018). https:\/\/doi.org\/10.1145\/3230833.3232819","journal-title":"ACM Int. Conf. Proc. Ser."},{"key":"31_CR28","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1504\/IJGUC.2013.056252","volume":"4","author":"X Ye","year":"2013","unstructured":"Ye, X., Khoussainov, B.: Fine-grained access control for cloud computing. Int. J. Grid Util. Comput. 4, 160\u2013168 (2013). https:\/\/doi.org\/10.1504\/IJGUC.2013.056252","journal-title":"Int. J. Grid Util. Comput."}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:19:00Z","timestamp":1638451140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}