{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:45:33Z","timestamp":1740181533719,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,12,4]],"date-time":"2021-12-04T00:00:00Z","timestamp":1638576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,12,4]],"date-time":"2021-12-04T00:00:00Z","timestamp":1638576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s42979-021-00979-w","type":"journal-article","created":{"date-parts":[[2021,12,4]],"date-time":"2021-12-04T13:02:31Z","timestamp":1638622951000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["IoT Data Classifications for Smart Home Deployment"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3586-8112","authenticated-orcid":false,"given":"Ashish Virendra","family":"Chandak","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7197-4545","authenticated-orcid":false,"given":"Niranjan K.","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,4]]},"reference":[{"key":"979_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3077721","author":"BP Sahoo","year":"2021","unstructured":"Sahoo BP, Mohanty SP, Puthal D, Pillai P. Personal internet of things (PIoT): what is it exactly. IEEE Consum Electron Mag. 2021. https:\/\/doi.org\/10.1109\/MCE.2021.3077721","journal-title":"IEEE Consum Electron Mag"},{"key":"979_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.future.2018.07.049","volume":"90","author":"AA Mutlag","year":"2019","unstructured":"Mutlag AA, Abd Ghani MK, Arunkumar N, Mohammed MA, Mohd O. Enabling technologies for fog computing in healthcare IoT systems. Future Gener Comput Syst. 2019;90:62\u201378.","journal-title":"Future Gener Comput Syst"},{"key":"979_CR3","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S. Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC \u201912. New York, NY, USA: Association for Computing Machinery; 2012. p. 13\u20136.","DOI":"10.1145\/2342509.2342513"},{"key":"979_CR4","doi-asserted-by":"crossref","unstructured":"Chandak A, Ray NK. A review of load balancing in fog computing. In: International Conference on Information Technology (ICIT), vol. 2019, p. 460\u20135, 2019.","DOI":"10.1109\/ICIT48102.2019.00087"},{"issue":"6","key":"979_CR5","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MCE.2018.2851723","volume":"7","author":"F Lin","year":"2018","unstructured":"Lin F, Zhou Y, An X, You I, Choo K-KR. Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of internet of things devices. IEEE Consum Electron Mag. 2018;7(6):45\u201350.","journal-title":"IEEE Consum Electron Mag"},{"key":"979_CR6","first-page":"08","volume":"56","author":"P Zhang","year":"2017","unstructured":"Zhang P, Liu J, Yu F, Sookhak M, Au MH, Luo X. A survey on access control in fog computing. IEEE Commun Mag. 2017;56:08.","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"979_CR7","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOM.2018.1700795","volume":"56","author":"D Puthal","year":"2018","unstructured":"Puthal D, Obaidat MS, Nanda P, Prasad M, Mohanty SP, Zomaya AY. Secure and sustainable load balancing of edge data centers in fog computing. IEEE Commun Mag. 2018;56(5):60\u20135.","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"979_CR8","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCE.2021.3051813","volume":"10","author":"D Puthal","year":"2021","unstructured":"Puthal D, Mohanty SP, Wilson S, Choppali U. Collaborative edge computing for smart villages [energy and security]. IEEE Consum Electron Mag. 2021;10(3):68\u201371.","journal-title":"IEEE Consum Electron Mag"},{"key":"979_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/B978-0-12-805395-9.00004-6","volume-title":"Internet of things","author":"A Dastjerdi","year":"2016","unstructured":"Dastjerdi A, Gupta H, Calheiros R, Ghosh S, Buyya R. Fog computing: principles, architectures, and applications. In: Buyya R, Vahid Dastjerdi A, editors. Internet of things. Morgan Kaufmann; 2016. p. 61\u201375."},{"key":"979_CR10","doi-asserted-by":"crossref","unstructured":"Abubaker N, Dervishi L, Ayday E. Privacy-preserving fog computing paradigm. In: IEEE Conference on Communications and Network Security (CNS), vol. 2017, p. 502\u20139, 2017.","DOI":"10.1109\/CNS.2017.8228709"},{"issue":"3","key":"979_CR11","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1109\/JIOT.2018.2803201","volume":"5","author":"P Verma","year":"2018","unstructured":"Verma P, Sood SK. Fog assisted-IoT enabled patient health monitoring in smart homes. IEEE Int Things J. 2018;5(3):1789\u201396.","journal-title":"IEEE Int Things J"},{"key":"979_CR12","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jss.2019.04.058","volume":"154","author":"SS Gill","year":"2019","unstructured":"Gill SS, Garraghan P, Buyya R. Router: fog enabled cloud based intelligent resource management approach for smart home IoT devices. J Syst Softw. 2019;154:125\u201338.","journal-title":"J Syst Softw"},{"key":"979_CR13","doi-asserted-by":"crossref","unstructured":"Mokhtari G, Anvari-Moghaddam A, Zhang Q. A new layered architecture for future big data-driven smart homes, vol. 7. IEEE Access; 2019. p. 19002\u201319012.","DOI":"10.1109\/ACCESS.2019.2896403"},{"key":"979_CR14","doi-asserted-by":"crossref","unstructured":"Wang H, Gong J, Zhuang Y, Shen H, Lach J. Healthedge: task scheduling for edge computing with health emergency and human behavior consideration in smart homes. In: 2017 International Conference on Networking, Architecture, and Storage (NAS), p. 1\u20132, 2017.","DOI":"10.1109\/NAS.2017.8026861"},{"key":"979_CR15","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1007\/978-3-030-15032-7_99","volume-title":"Advanced information networking and applications","author":"G Myrizakis","year":"2020","unstructured":"Myrizakis G, Petrakis EGM. ihome: smart home management as a service in the cloud and the fog. In: Barolli L, Takizawa M, Xhafa F, Enokido T, editors. Advanced information networking and applications. Cham: Springer International Publishing; 2020. p. 1181\u201392."},{"key":"979_CR16","doi-asserted-by":"crossref","unstructured":"Maatoug A, Belalem G, Sa\u00efd M. Fog computing framework for location-based energy management in smart buildings. In: Multiagent and grid systems, vol. 15. 2019. p. 39\u201356.","DOI":"10.3233\/MGS-190301"},{"key":"979_CR17","doi-asserted-by":"publisher","first-page":"109","DOI":"10.3991\/ijim.v14i01.9762","volume":"14","author":"M Haj Qasem","year":"2020","unstructured":"Haj Qasem M, Abu Srhan A, Natouryeh H, Alzaghoul E. Fog computing framework for smart city design. Int J Interact Mobile Technol (iJIM). 2020;14:109.","journal-title":"Int J Interact Mobile Technol (iJIM)"},{"key":"979_CR18","doi-asserted-by":"crossref","unstructured":"Baghrous M, Ezzouhairi A, Benamar N. Towards autonomous farms based on fog computing. In: 2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM), 2019. p. 1\u20134.","DOI":"10.1109\/MENACOMM46666.2019.8988547"},{"key":"979_CR19","doi-asserted-by":"publisher","first-page":"102531","DOI":"10.1016\/j.jnca.2020.102531","volume":"153","author":"M Rahimi","year":"2020","unstructured":"Rahimi M, Songhorabadi M, Kashani MH. Fog-based smart homes: a systematic review. J Netw Comput Appl. 2020;153:102531.","journal-title":"J Netw Comput Appl"},{"key":"979_CR20","first-page":"249","volume-title":"Rule induction","author":"JW Grzymala-Busse","year":"2010","unstructured":"Grzymala-Busse JW. Rule induction. Boston: Springer US; 2010. p. 249\u201365."},{"key":"979_CR21","doi-asserted-by":"crossref","unstructured":"Qin B, Xia Y, Prabhakar S, Tu Y. A rule-based classification algorithm for uncertain data. In: 2009 IEEE 25th International Conference on Data Engineering, p. 1633\u20131640, 2009.","DOI":"10.1109\/ICDE.2009.164"},{"issue":"12","key":"979_CR22","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/JSAC.2016.2611964","volume":"34","author":"Y Mao","year":"2016","unstructured":"Mao Y, Zhang J, Letaief KB. Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J Sel Areas Commun. 2016;34(12):3590\u2013605.","journal-title":"IEEE J Sel Areas Commun"},{"key":"979_CR23","first-page":"02","volume":"5","author":"S Misra","year":"2016","unstructured":"Misra S, Sarkar S. Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. IET Netw. 2016;5:02.","journal-title":"IET Netw"},{"key":"979_CR24","first-page":"1","volume":"2018","author":"X Xu","year":"2018","unstructured":"Xu X, Fu S, Cai Q, Tian W, Liu W, Dou W, Sun X, Liu A. Dynamic resource allocation for load balancing in fog environment. Wirel Commun Mob Comput. 2018;2018:1\u201315.","journal-title":"Wirel Commun Mob Comput"},{"key":"979_CR25","doi-asserted-by":"crossref","unstructured":"Puthal D, Mir ZH, Filali F, Menouar H. Cross-layer architecture for congestion control in vehicular ad-hoc networks. In: 2013 International Conference on Connected Vehicles and Expo (ICCVE). IEEE; 2013. p. 887\u2013892.","DOI":"10.1109\/ICCVE.2013.6799921"},{"key":"979_CR26","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/ACCESS.2017.2765702","volume":"6","author":"C-T Lin","year":"2017","unstructured":"Lin C-T, Prasad M, Chung C-H, Puthal D, El-Sayed H, Sankar S, Wang Y-K, Singh J, Sangaiah AK. IoT-based wireless polysomnography intelligent system for sleep monitoring. IEEE Access. 2017;6:405\u201314.","journal-title":"IEEE Access"},{"issue":"3","key":"979_CR27","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCC.2016.63","volume":"3","author":"D Puthal","year":"2016","unstructured":"Puthal D, Nepal S, Ranjan R, Chen J. Threats to networking cloud and edge datacenters in the internet of things. IEEE Cloud Comput. 2016;3(3):64\u201371.","journal-title":"IEEE Cloud Comput"},{"key":"979_CR28","doi-asserted-by":"crossref","unstructured":"Sahu AK, Sharma S, Puthal D. Lightweight multi-party authentication and key-agreement protocol in IoT based e-healthcare service. ACM Trans Multimed Comput Commun Appl (TOMM). 2021.","DOI":"10.1145\/3398039"},{"key":"979_CR29","doi-asserted-by":"crossref","unstructured":"Adhikari M, Munusamy A, Hazra A, Menon VG, Anavangot V, Puthal D. Security and privacy in edge-centric intelligent internet of vehicles: issues and remedies. IEEE Consum Electron Mag. 2021.","DOI":"10.1109\/MCE.2021.3116415"},{"key":"979_CR30","doi-asserted-by":"crossref","unstructured":"Ghane S, Jolfaei A, Kulik L, Ramamohanarao K, Puthal D. Preserving privacy in the internet of connected vehicles. IEEE Trans Intell Transp Syst. 2020.","DOI":"10.1109\/TITS.2020.2964410"},{"key":"979_CR31","doi-asserted-by":"crossref","unstructured":"Chandak AV, Ray NK, Puthal D. Performance analysis of classifier techniques at the edge node. In: 2021 IEEE International Symposium on Smart Electronic Systems. IEEE; 2021.","DOI":"10.1109\/iSES52644.2021.00103"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00979-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-021-00979-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00979-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T04:49:12Z","timestamp":1673930952000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-021-00979-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,4]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["979"],"URL":"https:\/\/doi.org\/10.1007\/s42979-021-00979-w","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"type":"print","value":"2662-995X"},{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2021,12,4]]},"assertion":[{"value":"9 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"95"}}