{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:49:59Z","timestamp":1772304599042,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19829-x","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:02:57Z","timestamp":1722243777000},"page":"21141-21174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fortified IoT-Fog framework for enhanced healthcare intelligence"],"prefix":"10.1007","volume":"84","author":[{"given":"Pawan Kumar","family":"Pal","sequence":"first","affiliation":[]},{"given":"Mayank","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Prashant Kumar","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,29]]},"reference":[{"key":"19829_CR1","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.chb.2018.12.009","volume":"100","author":"V Vijayakumar","year":"2019","unstructured":"Vijayakumar V, Malathi D, Subramaniyaswamy V, Saravanan P, Logesh R (2019) Fog computing-based intelligent healthcare system for the detection and prevention of mosquito-borne diseases. Comput Hum Behav 100:275\u2013285","journal-title":"Comput Hum Behav"},{"issue":"3","key":"19829_CR2","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1007\/s10586-021-03389-y","volume":"25","author":"HM Ali","year":"2022","unstructured":"Ali HM, Liu J, Bukhari SAC, Rauf HT (2022) Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare. Clust Comput 25(3):2143\u20132161","journal-title":"Clust Comput"},{"key":"19829_CR3","doi-asserted-by":"publisher","first-page":"44536","DOI":"10.1109\/ACCESS.2019.2908664","volume":"7","author":"R Saha","year":"2019","unstructured":"Saha R, Kumar G, Rai K, Thomas R, Lim SJ (2019) Privacy Ensured ${e} $-healthcare for fog-enhanced IoT based applications. IEEE Access 7:44536\u201344543","journal-title":"IEEE Access"},{"issue":"5","key":"19829_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2019.1800234","volume":"57","author":"W Tang","year":"2019","unstructured":"Tang W, Zhang K, Zhang D, Re J, Zhang Y, Shen X (2019) Fog-enabled smart health: Toward cooperative and secure healthcare service provision. IEEE Commun Mag 57(5):42\u201348","journal-title":"IEEE Commun Mag"},{"issue":"9","key":"19829_CR5","doi-asserted-by":"publisher","first-page":"3375","DOI":"10.3390\/s22093375","volume":"22","author":"C Tselios","year":"2022","unstructured":"Tselios C, Politis I, Amaxilatis D, Akrivopoulos O, Chatzigiannakis I, Panagiotakis S, Markakis EK (2022) Melding fog computing and IoT for deploying secure, response-capable healthcare services in 5G and beyond. Sensors 22(9):3375","journal-title":"Sensors"},{"issue":"5","key":"19829_CR6","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.ajic.2020.10.001","volume":"49","author":"ME Ardebili","year":"2021","unstructured":"Ardebili ME, Naserbakht M, Bernstein C, Alazmani-Noodeh F, Hakimi H, Ranjbar H (2021) Healthcare provider\u2019s experience of working during the COVID-19 pandemic: A qualitative study. Am J Infect Control 49(5):547\u2013554","journal-title":"Am J Infect Control"},{"key":"19829_CR7","doi-asserted-by":"publisher","unstructured":"Shuaib M, Alam S, Alam MS, Nasir MS (2021)\u00a0WITHDRAWN: Compliance with HIPAA and GDPR in blockchain-based electronic health record, 1(1). https:\/\/doi.org\/10.1016\/j.matpr.2021.03.059","DOI":"10.1016\/j.matpr.2021.03.059"},{"key":"19829_CR8","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.sintl.2021.100117","volume":"2","author":"A Haleem","year":"2021","unstructured":"Haleem A, Javaid M, Singh RP, Suman R (2021) Telemedicine for healthcare: Capabilities, features, barriers, and applications. Sensors International 2:100\u2013117","journal-title":"Sensors International"},{"issue":"4","key":"19829_CR9","doi-asserted-by":"publisher","first-page":"288","DOI":"10.26599\/BDMA.2019.9020007","volume":"2","author":"Y Yu","year":"2019","unstructured":"Yu Y, Li M, Liu L, Li Y, Wang J (2019) Clinical big data and deep learning: Applications, challenges, and future outlooks. Big Data Mining and Analytics 2(4):288\u2013305","journal-title":"Big Data Mining and Analytics"},{"key":"19829_CR10","doi-asserted-by":"publisher","first-page":"pp. 25","DOI":"10.1016\/B978-0-12-818438-7.00002-2","volume-title":"Artificial Intelligence in Healthcare","author":"A Bohr","year":"2020","unstructured":"Bohr A, Memarzadeh K (2020) The rise of artificial intelligence in healthcare applications. Artificial Intelligence in Healthcare. Academic Press, pp 25\u201360"},{"key":"19829_CR11","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.compbiomed.2020.104130","volume":"129","author":"C Thapa","year":"2021","unstructured":"Thapa C, Camtepe S (2021) Precision health data: Requirements, challenges and existing techniques for data security and privacy. Comput Biol Med 129:104\u2013130","journal-title":"Comput Biol Med"},{"issue":"3","key":"19829_CR12","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ipm.2021.102535","volume":"58","author":"K Miyachi","year":"2021","unstructured":"Miyachi K, Mackey TK (2021) hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design. Inf Process Manage 58(3):102\u2013535","journal-title":"Inf Process Manage"},{"key":"19829_CR13","doi-asserted-by":"crossref","unstructured":"Sharma K, Agrawal A, Pandey D, Khan RA, Dinkar SK (2022) RSA based encryption approach for preserving confidentiality of big data. Journal of King Saud University, Computer and Information Sciences 34(5):2088\u20132097","DOI":"10.1016\/j.jksuci.2019.10.006"},{"key":"19829_CR14","doi-asserted-by":"crossref","unstructured":"Liyanage M, Braeken A, Shahabuddin S, Ranaweera P (2023) Open RAN security: Challenges and opportunities.\u00a0J Netw Comput Appl\u00a0214:103621","DOI":"10.1016\/j.jnca.2023.103621"},{"key":"19829_CR15","doi-asserted-by":"publisher","first-page":"129551","DOI":"10.1109\/ACCESS.2019.2932609","volume":"7","author":"M Ayaz","year":"2019","unstructured":"Ayaz M, Ammad-Uddin M, Sharif Z, Mansour A, Aggoune EHM (2019) Internet-of-Things (IoT)-based smart agriculture: Toward making the fields talk. IEEE Access 7:129551\u2013129583","journal-title":"IEEE Access"},{"key":"19829_CR16","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.health.2022.100016","volume":"2","author":"V Chang","year":"2022","unstructured":"Chang V, Bhavani VR, Xu AQ, Hossain MA (2022) An artificial intelligence model for heart disease detection using machine learning algorithms. Health Analytics 2:100\u201316","journal-title":"Healthcare Analytics"},{"key":"19829_CR17","doi-asserted-by":"publisher","first-page":"75961","DOI":"10.1109\/ACCESS.2021.3081770","volume":"9","author":"TAN Abdali","year":"2021","unstructured":"Abdali TAN, Hassan R, Aman AHM, Nguyen QN (2021) Fog computing advancement: Concept, architecture, applications, advantages, and open issues. IEEE Access 9:75961\u201375980","journal-title":"IEEE Access"},{"key":"19829_CR18","doi-asserted-by":"publisher","first-page":"3127","DOI":"10.1016\/j.egyr.2022.01.193","volume":"8","author":"X Chen","year":"2022","unstructured":"Chen X (2022) Machine learning approach for a circular economy with waste recycling in smart cities. Energy Rep 8:3127\u20133140","journal-title":"Energy Rep"},{"key":"19829_CR19","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.autcon.2020.103441","volume":"122","author":"SA Bello","year":"2021","unstructured":"Bello SA, Oyedele LO, Akinade OO, Bilal M, Delgado JMD, Akanbi LA, Ajayi AO, Owolabi HA (2021) Cloud computing in the construction industry: Use cases, benefits and challenges. Autom Constr 122:103\u2013441","journal-title":"Autom Constr"},{"key":"19829_CR20","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.comcom.2020.08.021","volume":"162","author":"AAN Patwary","year":"2020","unstructured":"Patwary AAN, Fu A, Battula SK, Naha RK, Garg S, Mahanti A (2020) FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain. Comput Commun 162:212\u2013224","journal-title":"Comput Commun"},{"issue":"14","key":"19829_CR21","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1109\/JIOT.2021.3058946","volume":"8","author":"BS Egala","year":"2021","unstructured":"Egala BS, Pradhan AK, Badarla V, Mohanty SP (2021) Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet Things J 8(14):11717\u201311731","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"19829_CR22","doi-asserted-by":"publisher","first-page":"2513","DOI":"10.1109\/JIOT.2021.3063846","volume":"9","author":"Y Bao","year":"2021","unstructured":"Bao Y, Qiu W, Cheng X (2021) Secure and lightweight fine-grained searchable data sharing for IoT-oriented and cloud-assisted smart healthcare system. IEEE Internet Things J 9(4):2513\u20132526","journal-title":"IEEE Internet Things J"},{"key":"19829_CR23","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1007\/s10586-020-03190-3","volume":"24","author":"Y Liu","year":"2021","unstructured":"Liu Y, Zhang J, Zhan J (2021) Privacy protection for fog computing and the Internet of things data based on blockchain. Clust Comput 24:1331\u20131345","journal-title":"Clust Comput"},{"key":"19829_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2021.08.024","volume":"127","author":"A Razaque","year":"2022","unstructured":"Razaque A, Jararweh Y, Alotaibi B, Alotaibi M, Hariri S, Almiani M (2022) Energy-efficient and secure mobile fog-based cloud for the Internet of Things. Futur Gener Comput Syst 127:1\u201313","journal-title":"Futur Gener Comput Syst"},{"key":"19829_CR25","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.future.2019.10.043","volume":"104","author":"S Tuli","year":"2020","unstructured":"Tuli S, Basumatary N, Gill SS, Kahani M, Arya RC, Wander GS, Buyya R (2020) HealthFog: An ensemble deep learning-based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in integrated IoT and fog computing environments. Futur Gener Comput Syst 104:187\u2013200","journal-title":"Futur Gener Comput Syst"},{"issue":"21","key":"19829_CR26","doi-asserted-by":"publisher","first-page":"15762","DOI":"10.1109\/JIOT.2021.3052910","volume":"8","author":"AA Abdellatif","year":"2021","unstructured":"Abdellatif AA, Samara L, Mohamed A, Erbad A, Chiasserini CF, Guizani M, O\u2019Connor MD, Laughton J (2021) Medge-chain: Leveraging edge computing and blockchain for efficient medical data exchange. IEEE Internet Things J 8(21):15762\u201315775","journal-title":"IEEE Internet Things J"},{"key":"19829_CR27","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.future.2019.01.008","volume":"95","author":"S Pirbhulal","year":"2019","unstructured":"Pirbhulal S, Samuel OW, Wu W, Sangaiah AK, Li G (2019) A joint resource-aware and medical data security framework for wearable healthcare systems. Futur Gener Comput Syst 95:382\u2013391","journal-title":"Futur Gener Comput Syst"},{"key":"19829_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13755-019-0087-z","volume":"7","author":"H Ben Hassen","year":"2019","unstructured":"Ben Hassen H, Dghais W, Hamdi B (2019) An E-health system for monitoring elderly health based on Internet of Things and Fog computing.\u00a0Health Inf Sci Syst\u00a07:1\u20139","journal-title":"Health information science and systems"},{"key":"19829_CR29","doi-asserted-by":"crossref","unstructured":"Veeramakali T, Siva R, Sivakumar B, Senthil Mahesh PC, Krishnaraj N (2021) An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model. J Supercomput\u00a077(9):9576-9596","DOI":"10.1007\/s11227-021-03637-3"},{"key":"19829_CR30","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.procs.2019.11.087","volume":"160","author":"O Debauche","year":"2019","unstructured":"Debauche O, Mahmoudi S, Manneback P, Assila A (2019) Fog IoT for Health: A new Architecture for Patients and Elderly Monitoring.\u00a0Procedia Comput Sci\u00a0160:289\u2013297","journal-title":"Procedia Computer Science"},{"issue":"2","key":"19829_CR31","doi-asserted-by":"publisher","first-page":"5929","DOI":"10.1007\/s11042-023-15736-9","volume":"83","author":"M Kumar","year":"2024","unstructured":"Kumar M, Rai A, Surbhit KN (2024) Autonomic edge cloud-assisted framework for heart disease prediction using RF-LRG algorithm.\u00a0Multimed Tools Appl\u00a083(2):5929\u20135953","journal-title":"Multimedia Tools and Applications"},{"key":"19829_CR32","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.iotcps.2023.05.006","volume":"3","author":"M Kumar","year":"2023","unstructured":"Kumar M, Raj H, Chaurasia N, Gill SS (2023) Blockchain-inspired secure and reliable data exchange architecture for cyber-physical healthcare system 4.0. Internet of Things and Cyber-Physical Systems 3:309\u2013322","journal-title":"Internet of Things and Cyber-Physical Systems"},{"issue":"1","key":"19829_CR33","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s40860-020-00127-w","volume":"7","author":"SS Goel","year":"2021","unstructured":"Goel SS, Goel A, Kumar M, Molt\u00f3 G (2021) A review of Internet of Things: qualifying technologies and boundless horizon.\u00a0J Reliable Intell Environ\u00a07(1):23\u201333","journal-title":"Journal of Reliable Intelligent Environments"},{"key":"19829_CR34","doi-asserted-by":"publisher","first-page":"100674","DOI":"10.1016\/j.iot.2022.100674","volume":"21","author":"S Iftikhar","year":"2023","unstructured":"Iftikhar S, Gill SS, Song C, Xu M, Aslanpour MS, Toosi AN, Du J, Wu H, Ghosh S, Chowdhury D, Golec M (2023) AI-based fog and edge computing: A systematic review, taxonomy, and future directions. Internet of Things 21:100674","journal-title":"Internet of Things"},{"key":"19829_CR35","doi-asserted-by":"crossref","unstructured":"Raj H, Kumar M, Kumar P, Singh A, Verma OP (2022) Issues and challenges related to privacy and security in healthcare using IoT, fog, and cloud computing. Advanced healthcare systems: empowering physicians with IoT\u2010enabled technologies, pp 21\u201332","DOI":"10.1002\/9781119769293.ch2"},{"key":"19829_CR36","doi-asserted-by":"crossref","unstructured":"Wang Z, Yang Z, Azimi I, Rahmani AM (2024) Differential Private Federated Transfer Learning for Mental Health Monitoring in Everyday Settings: A Case Study on Stress Detection.\u00a0arXiv preprintarXiv:2402.10862.","DOI":"10.1109\/EMBC53108.2024.10782516"},{"key":"19829_CR37","first-page":"453","volume-title":"The International Conference on Information Networking 2014 (ICOIN2014)","author":"YS Lee","year":"2014","unstructured":"Lee YS, Alasaarela E, Lee H (2014) Secure key management scheme based on ECC algorithm for patient\u2019s medical information in the healthcare system. The International Conference on Information Networking 2014 (ICOIN2014). IEEE, pp 453\u2013457"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19829-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19829-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19829-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T13:08:58Z","timestamp":1751375338000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19829-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,29]]},"references-count":37,"journal-issue":{"issue":"19","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["19829"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19829-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,29]]},"assertion":[{"value":"4 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"All the authors involved in this manuscript give full consent for publication of this submitted article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"All the authors involved have agreed to participate in this submitted article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Authors declare that they have no conflict of interest.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}