{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:19:06Z","timestamp":1775254746304,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T00:00:00Z","timestamp":1556841600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s40860-019-00081-2","type":"journal-article","created":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T10:06:11Z","timestamp":1556877971000},"page":"209-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Security challenges in fog-computing environment: a systematic appraisal of current developments"],"prefix":"10.1007","volume":"5","author":[{"given":"Jimoh","family":"Yakubu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9196-9447","authenticated-orcid":false,"given":"Shafi\u2019i Muhammad","family":"Abdulhamid","sequence":"additional","affiliation":[]},{"given":"Haruna Atabo","family":"Christopher","sequence":"additional","affiliation":[]},{"given":"Haruna","family":"Chiroma","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Abdullahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,3]]},"reference":[{"key":"81_CR1","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.asoc.2017.08.048","volume":"61","author":"SM Abdulhamid","year":"2017","unstructured":"Abdulhamid SM, Latiff MS (2017) A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness. Appl Soft Comput 61:670\u2013680","journal-title":"Appl Soft Comput"},{"key":"81_CR2","unstructured":"Abbasi BZ, Shah MA (2017) Robust practices. In: Proceedings of the 23rd international conference on automation & computing, University of Hudders Field, Hudders Field, UK, 7\u20138 September 2017, pp 7\u20138"},{"key":"81_CR3","doi-asserted-by":"crossref","unstructured":"Arya D, Dave M (2017) Security-based service broker policy for fog computing environment. In: IEEE 8th ICCCNT 2017, Department of Computer Engineering","DOI":"10.1109\/ICCCNT.2017.8204036"},{"key":"81_CR4","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1016\/j.procs.2017.12.083","volume":"125","author":"RK Barik","year":"2018","unstructured":"Barik RK, Dubey AC, Tripathi A, Pratik T, Lenka K, Pratik T et al (2018) Mist data: leveraging mist computing for secure and scalable architecture for smart and connected health. Procedia Comput Sci 125:647\u2013653. \nhttps:\/\/doi.org\/10.1016\/j.procs.2017.12.083","journal-title":"Procedia Comput Sci"},{"key":"81_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2304-y","author":"RK Bedi","year":"2018","unstructured":"Bedi RK, Singh J, Gupta SK (2018) MWC: an efficient and secure multi-cloud storage approach to leverage augmentation of multi-cloud storage services on mobile devices using fog computing. J Supercomput. \nhttps:\/\/doi.org\/10.1007\/s11227-018-2304-y","journal-title":"J Supercomput"},{"key":"81_CR6","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.comnet.2017.10.002","volume":"130","author":"K Bilal","year":"2018","unstructured":"Bilal K, Khalid O, Erbad A, Khan SU (2018) Potentials, trends, and prospects in edge technologies: fog, cloudlet, mobile edge, and micro data centers. Comput Netw 130:94\u2013120. \nhttps:\/\/doi.org\/10.1016\/j.comnet.2017.10.002","journal-title":"Comput Netw"},{"issue":"2","key":"81_CR7","first-page":"36","volume":"5","author":"HA Christopher","year":"2018","unstructured":"Christopher HA, Yakubu J, Mohammed AD (2018) An architectural framework for ant lion optimization-based feature selection technique for cloud intrusion detection system using bayesian classifier. imanagers J Cloud Comput 5(2):36","journal-title":"imanagers J Cloud Comput"},{"key":"81_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2018.01.005","author":"PO Donovan","year":"2018","unstructured":"Donovan PO, Gallagher C, Bruton K, Sullivan DTJO (2018) A fog computing industrial cyber-physical system for embedded low-latency machine learning industry 4.0 applications. Manuf Lett. \nhttps:\/\/doi.org\/10.1016\/j.mfglet.2018.01.005","journal-title":"Manuf Lett"},{"key":"81_CR9","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/MCOM.2018.1700332","volume":"56","author":"A Ebebe","year":"2018","unstructured":"Ebebe A, Naveen C (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56:169\u2013175. \nhttps:\/\/doi.org\/10.1109\/MCOM.2018.1700332","journal-title":"IEEE Commun Mag"},{"key":"81_CR10","doi-asserted-by":"publisher","first-page":"10332","DOI":"10.1109\/ACCESS.2018.2799879","volume":"6","author":"AAA El-Latif","year":"2018","unstructured":"El-Latif AAA, Abd-El-Atty B, Hossain MS, Member S (2018) Secure quantum steganography protocol for fog cloud internet of things. IEEE Spec Sect Recent Adv Cloud Radio Access Netw 6:10332\u201310340. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2018.2799879","journal-title":"IEEE Spec Sect Recent Adv Cloud Radio Access Netw"},{"key":"81_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-64063-1_4","volume-title":"NEO 2016","author":"P. J. Escamilla-Ambrosio","year":"2017","unstructured":"Escamilla-Ambrosio PJ, Rodr\u00edguez-Mota A, Aguirre-Anaya E, Acosta-Bermejo R, Salinas-Rosales M (2018) Distributing computing in the internet of things\u202f: cloud, fog and edge computing overview, pp 87\u2013115. \nhttps:\/\/doi.org\/10.1007\/978-3-319-64063-1_4"},{"key":"81_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2793350","author":"J Fu","year":"2018","unstructured":"Fu J, Liu Y, Chao H, Member S, Bhargava BK (2018) Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans Ind Inform. \nhttps:\/\/doi.org\/10.1109\/TII.2018.2793350","journal-title":"IEEE Trans Ind Inform"},{"key":"81_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700250","author":"Y Guan","year":"2018","unstructured":"Guan Y, Shao J, Wei G, Xie M (2018) Data security and privacy in fog computing. IEEE Netw. \nhttps:\/\/doi.org\/10.1109\/MNET.2018.1700250","journal-title":"IEEE Netw"},{"key":"81_CR14","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"P Hu","year":"2017","unstructured":"Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27\u201342. \nhttps:\/\/doi.org\/10.1016\/j.jnca.2017.09.002","journal-title":"J Netw Comput Appl"},{"key":"81_CR15","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/MCOM.2017.1700322","volume":"55","author":"C Huang","year":"2017","unstructured":"Huang C, Lu R, Choo KR (2017) Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE Commun Mag 55:105\u2013111. \nhttps:\/\/doi.org\/10.1109\/MCOM.2017.1700322","journal-title":"IEEE Commun Mag"},{"key":"81_CR16","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1016\/j.future.2017.01.026","volume":"78","author":"Y Jiang","year":"2018","unstructured":"Jiang Y, Susilo W, Mu Y, Guo F (2018) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener Comput Syst 78:720\u2013729. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.01.026","journal-title":"Future Gener Comput Syst"},{"key":"81_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2764095","author":"J Kang","year":"2017","unstructured":"Kang J, Yu R, Huang X, Zhang Y, Member S (2017) Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans Intell Transp Syst. \nhttps:\/\/doi.org\/10.1109\/TITS.2017.2764095","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"81_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-017-0090-3","volume":"1","author":"S Khan","year":"2017","unstructured":"Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 1:1. \nhttps:\/\/doi.org\/10.1186\/s13677-017-0090-3","journal-title":"J Cloud Comput"},{"issue":"1","key":"81_CR19","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham B, Brereton OP, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering\u2014a systematic literature review. Inform Softw Technol 51(1):7\u201315","journal-title":"Inform Softw Technol"},{"key":"81_CR20","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1016\/j.future.2017.01.024","volume":"78","author":"D Koo","year":"2018","unstructured":"Koo D, Hur J (2018) Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener Comput Syst 78:739\u2013752. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.01.024","journal-title":"Future Gener Comput Syst"},{"key":"81_CR21","doi-asserted-by":"publisher","unstructured":"Kumar P, Zaidi N, Choudhury T (2017) Fog computing: common security issues and proposed countermeasures. In: Proceedings of the 5th international conference on system modeling and advancement in research trends, SMART 2016, pp 311\u2013315. \nhttps:\/\/doi.org\/10.1109\/SYSMART.2016.7894541","DOI":"10.1109\/SYSMART.2016.7894541"},{"key":"81_CR22","doi-asserted-by":"publisher","unstructured":"Lee K, Kim D, Ha D, Rajput U, Oh H (2015) On security and privacy issues of fog computing supported Internet of Things environment. In: 2015 International conference on the network of the future, NOF 2015. \nhttps:\/\/doi.org\/10.1109\/NOF.2015.7333287","DOI":"10.1109\/NOF.2015.7333287"},{"key":"81_CR23","doi-asserted-by":"publisher","first-page":"11278","DOI":"10.1109\/ACCESS.2018.2799543","volume":"6","author":"G Li","year":"2018","unstructured":"Li G (2018) Fog computing-enabled secure demand response for internet of energy against collusion attacks using consensus and ACE. IEEE Spec Sect Internet Energy Archit Cyber Secur Appl 6:11278\u201311288. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2018.2799543","journal-title":"IEEE Spec Sect Internet Energy Archit Cyber Secur Appl"},{"key":"81_CR24","unstructured":"Lisbon AA, Kavitha R (2017) A study on cloud and fog computing security issues and solutions. Int J Innov Res Adv Eng 3(4):2349\u20132163. \nhttp:\/\/ijirae.com\/volumes\/Vol4\/iss03\/03.MRAE10083.pdf"},{"key":"81_CR25","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1016\/j.future.2017.03.018","volume":"78","author":"X Liu","year":"2018","unstructured":"Liu X, Deng RH, Yang Y, Tran HN, Zhong S (2018) Hybrid privacy-preserving clinical decision support system in fog\u2013cloud computing. Future Gener Comput Syst 78:825\u2013837. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.03.018","journal-title":"Future Gener Comput Syst"},{"key":"81_CR26","series-title":"LNCS","first-page":"325","volume-title":"Euro-Par 2017 workshops","author":"F Lordan","year":"2018","unstructured":"Lordan F, Lezzi D, Ejarque J, Badia RM (2018) An architecture for programming distributed applications on fog to cloud systems, 2. In: Heras DB, Boug\u00e9 L (eds) Euro-Par 2017 workshops, vol 10659. LNCS. Springer International Publishing AG, Berlin, pp 325\u2013337"},{"issue":"4","key":"81_CR27","doi-asserted-by":"publisher","first-page":"3585","DOI":"10.1007\/s13369-018-3602-7","volume":"44","author":"SHH Madni","year":"2019","unstructured":"Madni SHH, Latiff MSA, Ali J (2019) Multi-objective-oriented cuckoo search optimization-based resource scheduling algorithm for clouds. Arab J Sci Eng 44(4):3585\u20133602","journal-title":"Arab J Sci Eng"},{"key":"81_CR28","doi-asserted-by":"publisher","unstructured":"Mahmud R, Koch FL, Buyya R (2018) Cloud\u2013fog interoperability in IoT-enabled healthcare solutions. In: ICDCN\u201918: 19th international conference on distributed computing and networking, January 4\u20137, 2018, Varanasi, India. ACM, New York, NY, USA, pp 4\u20137. \nhttps:\/\/doi.org\/10.1145\/3154273.3154347","DOI":"10.1145\/3154273.3154347"},{"key":"81_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_5","volume-title":"Internet of everything, internet of things","author":"R Mahmud","year":"2018","unstructured":"Mahmud R, Kotagiri R, Buyya R (2018) Fog computing : a taxonomy, survey and future directions. In: Di Martino B et al (eds) Internet of everything, internet of things. Springer Nature, Singapore. \nhttps:\/\/doi.org\/10.1007\/978-981-10-5861-5_5"},{"key":"81_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2018.02.010","author":"G Mart","year":"2018","unstructured":"Mart G (2018) Sustainable securing of medical cyber-physical systems for the healthcare of the future. Sustain Comput Inform Syst. \nhttps:\/\/doi.org\/10.1016\/j.suscom.2018.02.010","journal-title":"Sustain Comput Inform Syst"},{"key":"81_CR31","doi-asserted-by":"publisher","unstructured":"Modarresi A, Gangadhar S, Sterbenz JP (2017) A framework for improving network resilience using SDN and fog nodes. In: 2017 9th international workshop on resilient networks design and modeling (RNDM). \nhttps:\/\/doi.org\/10.1109\/RNDM.2017.8093036","DOI":"10.1109\/RNDM.2017.8093036"},{"key":"81_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.031","author":"B Mukherjee","year":"2018","unstructured":"Mukherjee B, Wang S, Lu W, Neupane RL, Dunn D, Ren Y et al (2018) Flexible IoT security middleware for end-to-end cloud\u2013fog communication. Future Gener Comput Syst. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.12.031","journal-title":"Future Gener Comput Syst"},{"key":"81_CR33","unstructured":"Neto ECP, Callou G, Aires F (2017) An algorithm to optimise the load distribution of fog environments. In: 2017 IEEE international conference on systems, man, and cybernetics (SMC), Banff Center, Banff, Canada, October 5\u20138, 2017, (October), pp 1292\u20131297"},{"key":"81_CR34","doi-asserted-by":"publisher","first-page":"11101","DOI":"10.1109\/ACCESS.2018.2803439","volume":"6","author":"AJV Neto","year":"2018","unstructured":"Neto AJV, Zhao Z, Rodrigues JJPC, Member S, Camboim HB, Braun T (2018) Fog-based crime-assistance in smart IoT transportation system. IEEE Access 6:11101\u201311111","journal-title":"IEEE Access"},{"key":"81_CR35","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2017","unstructured":"Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutor 20:601\u2013628. \nhttps:\/\/doi.org\/10.1109\/COMST.2017.2762345","journal-title":"IEEE Commun Surv Tutor"},{"key":"81_CR36","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.future.2017.02.014","volume":"78","author":"AM Rahmani","year":"2018","unstructured":"Rahmani AM, Nguyen T, Negash B, Anzanpour A (2018) Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Future Gener Comput Syst 78:641\u2013658. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.02.014","journal-title":"Future Gener Comput Syst"},{"key":"81_CR37","doi-asserted-by":"publisher","unstructured":"Rios R, Roman R, Onieva JA, Lopez J (2017) From SMOG to fog: a security perspective. In: 2017 2nd International conference on fog and mobile edge computing, FMEC 2017, pp 56\u201361. \nhttps:\/\/doi.org\/10.1109\/FMEC.2017.7946408","DOI":"10.1109\/FMEC.2017.7946408"},{"key":"81_CR38","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680\u2013698. \nhttps:\/\/doi.org\/10.1016\/j.future.2016.11.009","journal-title":"Future Gener Comput Syst"},{"key":"81_CR39","doi-asserted-by":"publisher","unstructured":"Santoro D, Zozin D, Pizzolli D, De Pellegrini F, Cretti S Create-net FBK, Cascata D (2017). Foggy\u202f: a platform for workload orchestration in a fog computing environment. In: 2017 IEEE 9th international conference on cloud computing technology and science, pp 9\u201312. \nhttps:\/\/doi.org\/10.1109\/CloudCom.2017.62","DOI":"10.1109\/CloudCom.2017.62"},{"key":"81_CR40","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","volume":"6","author":"PK Sharma","year":"2018","unstructured":"Sharma PK, Chen M, Park JH (2018) A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Spec Sect Intell Syst Internet Things 6:115\u2013124. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2017.2757955","journal-title":"IEEE Spec Sect Intell Syst Internet Things"},{"issue":"11","key":"81_CR41","doi-asserted-by":"publisher","first-page":"2586","DOI":"10.1109\/JSAC.2017.2760478","volume":"35","author":"SN Shirazi","year":"2017","unstructured":"Shirazi SN, Gouglidis A, Farshad A, Hutchison D (2017) The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J Select Areas Commun 35(11):2586\u20132595","journal-title":"IEEE J Select Areas Commun"},{"key":"81_CR42","unstructured":"Shropshire J (2014) Extending the cloud with fog\u202f: security challenges & opportunities. In: Americas conference on information systems, pp 1\u201310"},{"key":"81_CR43","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.cose.2017.08.016","volume":"74","author":"A Singh","year":"2018","unstructured":"Singh A, Sandhu R, Sood SK (2018) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur 74:340\u2013354. \nhttps:\/\/doi.org\/10.1016\/j.cose.2017.08.016","journal-title":"Comput Secur"},{"key":"81_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.008","author":"SK Sood","year":"2018","unstructured":"Sood SK, Mahajan I (2018) Fog-cloud based cyber-physical system for distinguishing, detecting and preventing mosquito borne diseases. Future Gener Comput Syst. \nhttps:\/\/doi.org\/10.1016\/j.future.2018.01.008","journal-title":"Future Gener Comput Syst"},{"key":"81_CR45","doi-asserted-by":"publisher","unstructured":"Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: Proceedings of the 2014 federated conference on computer science and information systems, vol 2, pp 1\u20138. \nhttps:\/\/doi.org\/10.15439\/2014F503","DOI":"10.15439\/2014F503"},{"key":"81_CR46","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1002\/cpe","volume":"28","author":"I Stojmenovic","year":"2016","unstructured":"Stojmenovic I, Wen S, Huang X, Luan H (2016) An overview of Fog computing and its security issues. Concurrency Comput Pract Exp 28:2991\u20133005. \nhttps:\/\/doi.org\/10.1002\/cpe","journal-title":"Concurrency Comput Pract Exp"},{"issue":"2","key":"81_CR47","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.sjbs.2017.09.010","volume":"25","author":"Y Sun","year":"2018","unstructured":"Sun Y, Lin F, Zhang N (2018) A security mechanism based on evolutionary game in fog computing. Saudi J Biol Sci 25(2):237\u2013241. \nhttps:\/\/doi.org\/10.1016\/j.sjbs.2017.09.010","journal-title":"Saudi J Biol Sci"},{"key":"81_CR48","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.future.2017.02.032","volume":"78","author":"H Wang","year":"2018","unstructured":"Wang H, Wang Z, Domingo-ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener Comput Syst 78:712\u2013719. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.02.032","journal-title":"Future Gener Comput Syst"},{"key":"81_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.031","author":"T Wang","year":"2017","unstructured":"Wang T, Zeng J, Lai Y, Cai Y, Tian H, Chen Y, Wang B (2017) Data collection from WSNs to the cloud based on mobile fog elements. Future Gener Comput Syst. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.07.031","journal-title":"Future Gener Comput Syst"},{"key":"81_CR50","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.future.2017.12.036","volume":"83","author":"T Wang","year":"2018","unstructured":"Wang T, Zhou J, Huang M, Alam Z, Liu A (2018) Fog-based storage technology to fight with cyber threat. Future Gener Comput Syst 83:208\u2013218. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.12.036","journal-title":"Future Gener Comput Syst"},{"key":"81_CR51","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/COMPSAC.2015.173","volume":"3","author":"Y Wang","year":"2015","unstructured":"Wang Y, Uehara T, Sasaki R (2015) Fog computing: issues and challenges in security and forensics. Proc Int Comput Softw Appl Conf 3:53\u201359. \nhttps:\/\/doi.org\/10.1109\/COMPSAC.2015.173","journal-title":"Proc Int Comput Softw Appl Conf"},{"key":"81_CR52","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5597-6","author":"C Xiong","year":"2018","unstructured":"Xiong C, Xiang R, Li Y, Han X, Du H (2018) Large-scale image-based fog detection based on cloud platform. Multimed Tools Appl. \nhttps:\/\/doi.org\/10.1007\/s11042-017-5597-6","journal-title":"Multimed Tools Appl"},{"key":"81_CR53","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1016\/j.future.2017.05.035","volume":"78","author":"R Yang","year":"2018","unstructured":"Yang R, Xu Q, Ho M, Yu Z, Wang H, Zhou L (2018) Position based cryptography with location privacy: a step for Fog computing. Future Gener Comput Syst 78:799\u2013806. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.05.035","journal-title":"Future Gener Comput Syst"},{"issue":"14","key":"81_CR54","doi-asserted-by":"publisher","first-page":"18249","DOI":"10.1007\/s11042-017-5288-3","volume":"77","author":"Qussai Yaseen","year":"2017","unstructured":"Yaseen Q, Aldwairi M, Jararweh Y, Brij MA (2017) Collusion attacks mitigation in internet of things\u202f: a fog based model. Springer Science\u2009+\u2009Business Media, LLC 2017, October. \nhttps:\/\/doi.org\/10.1007\/s11042-017-5288-3","journal-title":"Multimedia Tools and Applications"},{"key":"81_CR55","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-3-319-21837-3_67","volume-title":"Wireless Algorithms, Systems, and Applications","author":"Shanhe Yi","year":"2015","unstructured":"Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: 10th International conference on wireless algorithms, systems, and applications, pp 685\u2013695. \nhttps:\/\/doi.org\/10.1007\/978-3-319-21837-3_67"},{"key":"81_CR56","doi-asserted-by":"publisher","first-page":"27132","DOI":"10.1109\/ACCESS.2017.2766180","volume":"5","author":"S Zahra","year":"2017","unstructured":"Zahra S, Alam M, Javaid Q, Wahid A, Javaid N, Ur S et al (2017) Fog computing over IoT: a secure deployment and formal verification. IEEE special section on recent advances in computational intelligence paradigms for security and privacy for fog and mobile edge computing 5:27132\u201327144. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2017.2766180","journal-title":"IEEE special section on recent advances in computational intelligence paradigms for security and privacy for fog and mobile edge computing"},{"key":"81_CR57","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.future.2016.12.015","volume":"78","author":"P Zhang","year":"2018","unstructured":"Zhang P, Chen Z, Liu JK, Liang K, Liu H (2018) An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener Comput Syst 78:753\u2013762. \nhttps:\/\/doi.org\/10.1016\/j.future.2016.12.015","journal-title":"Future Gener Comput Syst"},{"key":"81_CR58","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2018.1700333","volume":"55","author":"P Zhang","year":"2018","unstructured":"Zhang P, Liu JK, Yu FR, Sookhak M, Au MH, Luo X (2018) Human-driven edge computing and communication: a survey on access control in fog computing. IEEE Commun Mag 55:144\u2013149. \nhttps:\/\/doi.org\/10.1109\/MCOM.2018.1700333","journal-title":"IEEE Commun Mag"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00081-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-019-00081-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00081-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T23:29:06Z","timestamp":1588375746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-019-00081-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,3]]},"references-count":58,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["81"],"URL":"https:\/\/doi.org\/10.1007\/s40860-019-00081-2","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,3]]},"assertion":[{"value":"13 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}