{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T00:08:47Z","timestamp":1771718927599,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s40860-021-00149-y","type":"journal-article","created":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T09:02:43Z","timestamp":1626598963000},"page":"193-210","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Prediction of quality of service of fog nodes for service recommendation in fog computing based on trustworthiness of users"],"prefix":"10.1007","volume":"8","author":[{"given":"Vijay L.","family":"Hallappanavar","sequence":"first","affiliation":[]},{"given":"Mahantesh N.","family":"Birje","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,18]]},"reference":[{"key":"149_CR1","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1007\/s11227-019-03076-1","volume":"76","author":"B Gaurav","year":"2019","unstructured":"Gaurav B, Manisha S, Deo Prakash V (2019) A framework for IoT service selection. J Supercomputing 76:2777\u20132814. https:\/\/doi.org\/10.1007\/s11227-019-03076-1","journal-title":"J Supercomputing"},{"key":"149_CR2","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.future.2018.12.005","volume":"94","author":"S Le","year":"2019","unstructured":"Le S, Hai D, Omar KH, Hussain FK, Alex XL (2019) A framework of cloud service selection with criteria interactions. Future Gener Comput Syst 94:749\u2013764. https:\/\/doi.org\/10.1016\/j.future.2018.12.005","journal-title":"Future Gener Comput Syst"},{"issue":"7","key":"149_CR3","doi-asserted-by":"publisher","first-page":"3261","DOI":"10.1016\/j.eswa.2013.11.010","volume":"41","author":"AG Mustansar","year":"2014","unstructured":"Mustansar AG, Adam P (2014) Leveraging clustering approaches to solve the Gray-sheep users problem in recommender systems. Expert Syst Appl 41(7):3261\u20133275. https:\/\/doi.org\/10.1016\/j.eswa.2013.11.010","journal-title":"Expert Syst Appl"},{"key":"149_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2949029","author":"W Xiaodong","year":"2019","unstructured":"Xiaodong W, Bruce G, Yongli R (2019) A fog-based recommender system. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/jiot.2019.2949029","journal-title":"IEEE Internet Things J"},{"key":"149_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s40860-018-0055-4","volume":"4","author":"A Palade","year":"2018","unstructured":"Palade A, Cabrera C, Li F et al (2018) Middleware for internet of things: an evaluation in a small-scale IoT environment. J Reliab Intell Environ 4:3\u201323. https:\/\/doi.org\/10.1007\/s40860-018-0055-4","journal-title":"J Reliab Intell Environ"},{"key":"149_CR6","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"Y Ashkan","year":"2019","unstructured":"Ashkan Y, Caleb F, Tam N, Krishna K, Fatemeh J, Amirreza N, Jian K, Jason PJ (2019) All one needs to know about fog computing and related edge computing paradigms: a complete survey. J Syst Archit 98:289\u2013330. https:\/\/doi.org\/10.1016\/j.sysarc.2019.02.009","journal-title":"J Syst Archit"},{"key":"149_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.future.2018.05.008","volume":"88","author":"Z PeiYun","year":"2018","unstructured":"PeiYun Z, MengChu Z, Giancarlo F (2018) Security and trust issues in fog computing: a survey. Future Gener Comput Syst 88:16\u201327. https:\/\/doi.org\/10.1016\/j.future.2018.05.008","journal-title":"Future Gener Comput Syst"},{"key":"149_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866491","author":"N Ranesh Kumar","year":"2018","unstructured":"Ranesh Kumar N, Saurabh G, Dimitrios G, Prem PJ, Longxiang G, Yong X, Rajiv R (2018) Fog computing: survey of trends, architectures, requirements and research directions. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2018.2866491","journal-title":"IEEE Access"},{"key":"149_CR9","doi-asserted-by":"publisher","unstructured":"Ranesh Kumar N, Saurabh G, Andrew C (2018) Fog computing architecture: survey and challenges, pp 1\u201326. https:\/\/doi.org\/10.1049\/PBPC025E_ch10","DOI":"10.1049\/PBPC025E_ch10"},{"key":"149_CR10","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s40860-019-00081-2","volume":"5","author":"J Yakubu","year":"2019","unstructured":"Yakubu J, Abdulhamid SM, Christopher HA et al (2019) Security challenges in fog-computing environment: a systematic appraisal of current developments. J Reliab Intell Environ 5:209\u2013233. https:\/\/doi.org\/10.1007\/s40860-019-00081-2","journal-title":"J Reliab Intell Environ"},{"key":"149_CR11","doi-asserted-by":"publisher","unstructured":"Lin Z, Ni W, Zhang H, Zhao M, Yang Y (2015) A K-medoids algorithm based method to alleviate the data sparsity in collaborative filtering. In: 34th proceedings of chinese control conference. IEEE, pp 4974\u20134979. https:\/\/doi.org\/10.1109\/ChiCC.2015.7260413","DOI":"10.1109\/ChiCC.2015.7260413"},{"key":"149_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.knosys.2014","volume":"74","author":"G Guibing","year":"2015","unstructured":"Guibing G, Jie Z, Neil Y (2015) Leveraging multiviews of trust and similarity to enhance clustering-based recommender systems. J Knowl Based Syst 74:14\u201327. https:\/\/doi.org\/10.1016\/j.knosys.2014","journal-title":"J Knowl Based Syst"},{"issue":"8","key":"149_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s17081744","volume":"17","author":"W Jun","year":"2017","unstructured":"Jun W, Zhou S, Shen W, Jianhua L (2017) Crowd sensing-enabling security service recommendation for social fog computing systems. J Sens 17(8):1\u201316. https:\/\/doi.org\/10.3390\/s17081744","journal-title":"J Sens"},{"key":"149_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02106-3","author":"R Geetanjali","year":"2020","unstructured":"Geetanjali R, Rajinder S, Hemraj S, Sivaram M, Vigneswaran D (2020) A trust computed framework for IoT devices and fog computing Environment. J Wirel Netw. https:\/\/doi.org\/10.1007\/s11276-019-02106-3","journal-title":"J Wirel Netw"},{"key":"149_CR15","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5636319","author":"A Manawa","year":"2018","unstructured":"Manawa A, Yuyu Y, Ghazaros B (2018) A modified Bayesian trustworthiness evaluation method to mitigate the effect of unfair ratings. Math Probl Eng. https:\/\/doi.org\/10.1155\/2018\/5636319","journal-title":"Math Probl Eng"},{"key":"149_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2792979","volume":"16","author":"M Zaki","year":"2016","unstructured":"Zaki M, Brahim M, Abdelmounaam R (2016) sCARE: reputation estimation for uncertain web services. ACM Trans Internet Technol 16:1\u201320. https:\/\/doi.org\/10.1145\/2792979","journal-title":"ACM Trans Internet Technol"},{"key":"149_CR17","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s40860-017-0038-x","volume":"3","author":"N Vithanwattana","year":"2017","unstructured":"Vithanwattana N, Mapp G, George C (2017) Developing a comprehensive information security framework for mHealth: a detailed analysis. J Reliab Intell Environ 3:21\u201339. https:\/\/doi.org\/10.1007\/s40860-017-0038-x","journal-title":"J Reliab Intell Environ"},{"issue":"3","key":"149_CR18","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/s10776-020-00491-7","volume":"27","author":"K Jasleen","year":"2020","unstructured":"Jasleen K, Agrawal A, Khan RA (2020) Security issues in Fog environment: a systematic literature review. Int J Wirel Inf Netw 27(3):467\u2013483. https:\/\/doi.org\/10.1007\/s10776-020-00491-7","journal-title":"Int J Wirel Inf Netw"},{"key":"149_CR19","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.knosys.2019.03.009","volume":"175","author":"D Jiangzhou","year":"2019","unstructured":"Jiangzhou D, Junpeng G, Yong W (2019) A novel K-medoids clustering recommendation algorithm based on probability distribution for collaborative filtering. J Knowl Based Syst 175:96\u2013106. https:\/\/doi.org\/10.1016\/j.knosys.2019.03.009","journal-title":"J Knowl Based Syst"},{"key":"149_CR20","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6669798","author":"G Liangmin","year":"2021","unstructured":"Liangmin G, Kaixuan L, Xiaoyao Z et al (2021) A service recommendation method based on requirements for the cloud environment. J Control Sci Eng. https:\/\/doi.org\/10.1155\/2021\/6669798","journal-title":"J Control Sci Eng"},{"key":"149_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2019.112900","volume":"140","author":"H Elena","year":"2020","unstructured":"Elena H, Guillermo H, Ana-Bel\u00e9n G, Sara R, Juan MC (2020) Fog computing architecture for personalized recommendation of banking products. Expert Syst Appl 140:1\u201320. https:\/\/doi.org\/10.1016\/j.eswa.2019.112900","journal-title":"Expert Syst Appl"},{"key":"149_CR22","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.future.2017.06.020","volume":"82","author":"W Hao","year":"2018","unstructured":"Hao W, Kun Y, Bo L, Binbin Z, Ching-Hsien H (2018) Collaborative QoS prediction with context-sensitive matrix factorization. Future Gener Comput Syst 82:669\u2013678. https:\/\/doi.org\/10.1016\/j.future.2017.06.020","journal-title":"Future Gener Comput Syst"},{"key":"149_CR23","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.eswa.2018.05.039","volume":"110","author":"X Ruibin","year":"2018","unstructured":"Ruibin X, Jian W, Neng Z, Yutao M (2018) Deep hybrid collaborative filtering for web service recommendation. Expert Syst Appl 110:191\u2013205. https:\/\/doi.org\/10.1016\/j.eswa.2018.05.039","journal-title":"Expert Syst Appl"},{"issue":"4","key":"149_CR24","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s40860-018-0069-y","volume":"4","author":"APK Sathish","year":"2018","unstructured":"Sathish APK, Madhumathi R, Pethuru RC et al (2018) A novel digital twin-centric approach for driver intention prediction and traffic congestion avoidance. J Reliab Intell Environ 4(4):199\u2013209. https:\/\/doi.org\/10.1007\/s40860-018-0069-y","journal-title":"J Reliab Intell Environ"},{"key":"149_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.071","author":"A Mohannad","year":"2017","unstructured":"Mohannad A, Peter B, Zahir T, Sahel A (2017) Context-aware multifaceted trust framework for evaluating trustworthiness of cloud providers. Future Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2017.09.071","journal-title":"Future Gener Comput Syst"},{"key":"149_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2953289","author":"KS Arun","year":"2020","unstructured":"Arun KS, Darshan VM, Gui-Bin B et al (2020) Energy-aware green adversary model for cyberphysical security in industrial system. IEEE Trans Ind Inf. https:\/\/doi.org\/10.1109\/TII.2019.2953289","journal-title":"IEEE Trans Ind Inf"},{"issue":"5","key":"149_CR27","doi-asserted-by":"publisher","first-page":"3322","DOI":"10.1109\/TII.2019.2953289","volume":"16","author":"KS Arun","year":"2019","unstructured":"Arun KS, Darshan VM, Tao H (2019) Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics. IEEE Trans Ind Inf 16(5):3322\u20133329. https:\/\/doi.org\/10.1109\/TII.2019.2953289","journal-title":"IEEE Trans Ind Inf"},{"key":"149_CR28","doi-asserted-by":"publisher","first-page":"2929","DOI":"10.1007\/s13369-019-04218-6","volume":"45","author":"N Rajganesh","year":"2020","unstructured":"Rajganesh N, Ramkumar T (2020) A service context-aware QoS prediction and recommendation of cloud infrastructure services. Arab J Sci Eng 45:2929\u20132943","journal-title":"Arab J Sci Eng"},{"key":"149_CR29","doi-asserted-by":"publisher","first-page":"43","DOI":"10.3390\/s18051556","volume":"174","author":"L Jian","year":"2019","unstructured":"Jian L, Youling C (2019) A personalized clustering-based and reliable trust-aware QoS prediction approach for cloud service recommendation in cloud manufacturing. J Knowledge Based Systems 174:43\u201356. https:\/\/doi.org\/10.3390\/s18051556","journal-title":"J Knowledge Based Systems"},{"key":"149_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.008","author":"W Yong","year":"2017","unstructured":"Yong W, Jiangzhou D, Jerry G, Pu Z (2017) A hybrid user similarity model for collaborative filtering. J Inf Sci. https:\/\/doi.org\/10.1016\/j.ins.2017.08.008","journal-title":"J Inf Sci"},{"key":"149_CR31","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1504\/IJCC.2017.083905","volume":"6","author":"NB Mahantesh","year":"2017","unstructured":"Mahantesh NB, Praveen SC, Goudar RH, Manisha TT (2017) Cloud computing review: concepts, technology, challenges and security. J Cloud Comput 6:32\u201357. https:\/\/doi.org\/10.1504\/IJCC.2017.083905","journal-title":"J Cloud Comput"},{"key":"149_CR32","doi-asserted-by":"crossref","unstructured":"Vijay LH, Mahantesh NB (2016) Trust management in cloud computing. In: Security solutions for hyperconnectivity and the internet of things, Chapter 7. IGI Global, pp 151\u2013183","DOI":"10.4018\/978-1-5225-0741-3.ch007"},{"key":"149_CR33","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.comcom.2017.05.013","volume":"109","author":"MT Eva","year":"2017","unstructured":"Eva MT, Xavi M, Jordi A, Admela J, Guang-Jie R, Jiafeng Z (2017) Do we all really know what a Fog Node is? Current trends towards an open definition. Comput Commun 109:117\u2013130. https:\/\/doi.org\/10.1016\/j.comcom.2017.05.013","journal-title":"Comput Commun"},{"key":"149_CR34","first-page":"1","volume":"11","author":"LH Vijay","year":"2021","unstructured":"Vijay LH, Mahantesh NB (2021) A reliable trust computing mechanism in fog computing. J Cloud Appl Comput 11:1\u201320","journal-title":"J Cloud Appl Comput"},{"key":"149_CR35","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s40860-016-0019-5","volume":"2","author":"D Preuveneers","year":"2016","unstructured":"Preuveneers D, Joosen W (2016) Semantic analysis and verification of context-driven adaptive applications in intelligent environments. J Reliable Intell Environ 2:53\u201373. https:\/\/doi.org\/10.1007\/s40860-016-0019-5","journal-title":"J Reliable Intell Environ"},{"key":"149_CR36","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/TSC.2010.52","volume":"4","author":"Z Zibin","year":"2011","unstructured":"Zibin Z, Hao M, Michael RL, Irwin K (2011) QoS-aware web service recommendation by collaborative filtering. IEEE Trans Serv Comput 4:140\u2013152. https:\/\/doi.org\/10.1109\/TSC.2010.52","journal-title":"IEEE Trans Serv Comput"},{"key":"149_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.09.033","author":"S Kai","year":"2016","unstructured":"Kai S, Bin X, Baoping L, Huaiqiang Z, Zongsheng Z (2016) TAP: A personalized trust-aware QoS prediction approach for web service recommendation. J Knowl Based Syst. https:\/\/doi.org\/10.1016\/j.knosys.2016.09.033","journal-title":"J Knowl Based Syst"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00149-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-021-00149-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00149-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T11:54:23Z","timestamp":1653306863000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-021-00149-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["149"],"URL":"https:\/\/doi.org\/10.1007\/s40860-021-00149-y","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,18]]},"assertion":[{"value":"4 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}