{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T07:15:26Z","timestamp":1760426126063},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T00:00:00Z","timestamp":1678924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T00:00:00Z","timestamp":1678924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11277-023-10313-7","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:25:14Z","timestamp":1679876714000},"page":"909-933","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Enhancing Security Using Secure Authentication Model in Fog Computing Model"],"prefix":"10.1007","volume":"130","author":[{"given":"Kavuri K. S. V. A.","family":"Satheesh","sequence":"first","affiliation":[]},{"given":"T. Krishna","family":"Sree","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,16]]},"reference":[{"key":"10313_CR1","doi-asserted-by":"publisher","first-page":"13789","DOI":"10.1109\/ACCESS.2021.3052247","volume":"9","author":"J Zhao","year":"2021","unstructured":"Zhao, J., Zeng, P., & Choo, K. K. R. (2021). An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health. IEEE Access, 9, 13789\u201313799.","journal-title":"IEEE Access"},{"key":"10313_CR2","doi-asserted-by":"publisher","first-page":"28096","DOI":"10.1109\/ACCESS.2020.2969986","volume":"8","author":"T-Y Wu","year":"2020","unstructured":"Wu, T.-Y., Lee, Z., Obaidat, M. S., Kumari, S., Kumar, S., & Chen, C.-M. (2020). An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access, 8, 28096\u201328108.","journal-title":"IEEE Access"},{"key":"10313_CR3","doi-asserted-by":"publisher","first-page":"59559","DOI":"10.1109\/ACCESS.2019.2908919","volume":"7","author":"NA Nabeeh","year":"2019","unstructured":"Nabeeh, N. A., Abdel-Basset, M., El-Ghareeb, H. A., & Aboelfetouh, A. (2019). Neutrosophic multi-criteria decision making approach for IoT-based enterprises. IEEE Access, 7, 59559\u201359574.","journal-title":"IEEE Access"},{"issue":"9","key":"10313_CR4","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCOM.2018.1701140","volume":"56","author":"R Yu","year":"2018","unstructured":"Yu, R., Xue, G., Kilari, V. T., & Zhang, X. (2018). The fog of things paradigm: Road toward on-demand Internet of Things. IEEE Communications Magazine, 56(9), 48\u201354.","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"10313_CR5","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/MCOM.2018.1700299","volume":"56","author":"SMA Oteafy","year":"2018","unstructured":"Oteafy, S. M. A., & Hassanein, H. S. (2018). IoT in the fog: A roadmap for data-centric IoT development. IEEE Communications Magazine, 56(3), 157\u2013163.","journal-title":"IEEE Communications Magazine"},{"key":"10313_CR6","doi-asserted-by":"publisher","first-page":"176738","DOI":"10.1109\/ACCESS.2020.3025140","volume":"8","author":"L Li","year":"2020","unstructured":"Li, L., Wang, Z., & Li, N. (2020). Efficient attribute-based encryption outsourcing scheme with user and attribute revocation for fog-enabled IoT. IEEE Access, 8, 176738\u2013176749.","journal-title":"IEEE Access"},{"issue":"4","key":"10313_CR7","doi-asserted-by":"publisher","first-page":"2489","DOI":"10.1109\/COMST.2020.3011208","volume":"22","author":"K Tange","year":"2020","unstructured":"Tange, K., Donno, M. D., Fafoutis, X., & Dragoni, N. (2020). A systematic survey of industrial internet of things security: Requirements and fog computing opportunities. IEEE Communications Surveys and Tutorials, 22(4), 2489\u20132520.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"10313_CR8","doi-asserted-by":"publisher","first-page":"108196","DOI":"10.1016\/j.comnet.2021.108196","volume":"195","author":"S Tu","year":"2021","unstructured":"Tu, S., Waqas, M., Huang, F., Abbas, G., & Abbas, Z. H. (2021). A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing. Computer Networks, 195, 108196.","journal-title":"Computer Networks"},{"key":"10313_CR9","doi-asserted-by":"crossref","unstructured":"Puliafito, C., Mingozzi, E., & Anastasi, G. (2017). Fog computing for the internet of mobile things: Issues and challenges. In Smart computing (SMARTCOMP), 2017 IEEE international conference (pp. 1\u20136).","DOI":"10.1109\/SMARTCOMP.2017.7947010"},{"issue":"2","key":"10313_CR10","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/bdcc2020010","volume":"2","author":"H Atlam","year":"2018","unstructured":"Atlam, H., Walters, R., & Wills, G. (2018). Fog computing and the Internet of Things: A review. Big Data and Cognitive Computing, 2(2), 10.","journal-title":"Big Data and Cognitive Computing"},{"key":"10313_CR11","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.future.2018.01.059","volume":"83","author":"K Sha","year":"2018","unstructured":"Sha, K., Wei, W., Yang, T. A., Wang, Z., & Shi, W. (2018). On security challenges and open issues in internet of things. Future Generation Computer Systems, 83, 326\u2013337.","journal-title":"Future Generation Computer Systems"},{"key":"10313_CR12","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman, R., et al. (2018). Mobile edge computing, fog: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680\u2013698.","journal-title":"Future Generation Computer Systems"},{"key":"10313_CR13","doi-asserted-by":"publisher","first-page":"40240","DOI":"10.1109\/ACCESS.2019.2907319","volume":"7","author":"Y Li","year":"2019","unstructured":"Li, Y., Dong, Z., Sha, K., Jiang, C., Wan, J., & Wang, Y. (2019). Tmo: Time domain outsourcing attribute-based encryption scheme for data acquisition in edge computing. IEEE Access, 7, 40240\u201340257.","journal-title":"IEEE Access"},{"key":"10313_CR14","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing (pp. 13\u201316).","DOI":"10.1145\/2342509.2342513"},{"key":"10313_CR15","doi-asserted-by":"crossref","unstructured":"Roca, D., Milito, R., Nemirovsky, M., & Valero, M. (2018). Tackling IoT ultra large scale systems: Fog computing in support of hierarchical emergent behaviors. In Fog computing in the internet of things (pp. 33\u201348). Springer.","DOI":"10.1007\/978-3-319-57639-8_3"},{"key":"10313_CR16","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.future.2019.04.003","volume":"99","author":"K Fan","year":"2019","unstructured":"Fan, K., Xu, H., Gao, L., Li, H., & Yang, Y. (2019). Efficient and privacy preserving access control scheme for fog-enabled IoT. Future Generation Computer Systems, 99, 134\u2013142.","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"10313_CR17","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/JIOT.2015.2497712","volume":"3","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Dong, M., Ota, K., Wang, G., & Yang, L. T. (2016). Energy-efficient resource allocation for D2D communications underlaying cloud-ran-based LTE-A networks. IEEE Internet of Things Journal, 3(3), 428\u2013438.","journal-title":"IEEE Internet of Things Journal"},{"key":"10313_CR18","doi-asserted-by":"publisher","first-page":"11688","DOI":"10.1109\/ACCESS.2019.2890976","volume":"7","author":"D Li","year":"2019","unstructured":"Li, D., Liu, J., Wu, Q., & Guan, Z. (2019). Efficient CCA2 secure flexible and publicly-verifiable fine-grained access control in fog computing. IEEE Access, 7, 11688\u201311697.","journal-title":"IEEE Access"},{"key":"10313_CR19","doi-asserted-by":"publisher","first-page":"42593","DOI":"10.1109\/ACCESS.2021.3066212","volume":"9","author":"Y Ming","year":"2021","unstructured":"Ming, Y., He, B., & Wang, C. (2021). Efficient revocable multi-authority attribute-based encryption for cloud storage. IEEE Access, 9, 42593\u201342603.","journal-title":"IEEE Access"},{"key":"10313_CR20","doi-asserted-by":"publisher","first-page":"53576","DOI":"10.1109\/ACCESS.2021.3070907","volume":"9","author":"K Huang","year":"2021","unstructured":"Huang, K. (2021). Secure efficient revocable large universe multi-authority attribute-based encryption for cloud-aided IoT. IEEE Access, 9, 53576\u201353588.","journal-title":"IEEE Access"},{"key":"10313_CR21","doi-asserted-by":"publisher","first-page":"108029","DOI":"10.1016\/j.comnet.2021.108029","volume":"191","author":"Y Hei","year":"2021","unstructured":"Hei, Y., Liu, J., Feng, H., Li, D., Liu, Y., & Wu, Q. (2021). Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management. Computer Networks, 191, 108029.","journal-title":"Computer Networks"},{"key":"10313_CR22","doi-asserted-by":"crossref","unstructured":"Ling, J., Chen, J., Chen, J., & Gan, W. (2021). Multiauthority attribute-based encryption with traceable and dynamic policy updating. Security and Communication Networks, 2021.","DOI":"10.1155\/2021\/6661450"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10313-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10313-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10313-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T22:27:35Z","timestamp":1683757655000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10313-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,16]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["10313"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10313-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,16]]},"assertion":[{"value":"25 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}