{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T20:46:52Z","timestamp":1778359612498,"version":"3.51.4"},"reference-count":97,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2200673"],"award-info":[{"award-number":["2200673"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2200673"],"award-info":[{"award-number":["2200673"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2200673"],"award-info":[{"award-number":["2200673"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2200673"],"award-info":[{"award-number":["2200673"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-024-00064-7","type":"journal-article","created":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T01:43:32Z","timestamp":1732758212000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Exploring secure and private data aggregation techniques for the internet of things: a comprehensive review"],"prefix":"10.1007","volume":"4","author":[{"given":"Dagmawit Tadesse","family":"Aga","sequence":"first","affiliation":[]},{"given":"Rakesh","family":"Chintanippu","sequence":"additional","affiliation":[]},{"given":"Rawshan Ara","family":"Mowri","sequence":"additional","affiliation":[]},{"given":"Madhuri","family":"Siddula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"key":"64_CR1","unstructured":"OpenEdgeConsortium, About - the who, what, and how. https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/."},{"key":"64_CR2","volume-title":"IOT vulnerabilities and attacks: silex malware case study","author":"BI Mukhtar","year":"2023","unstructured":"Mukhtar BI, Elsayed MS, Jurcut AD, Azer MA. IOT vulnerabilities and attacks: silex malware case study. Basel: Multidisciplinary Digital Publishing Institute; 2023."},{"key":"64_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100312","volume":"38","author":"MM Ogonji","year":"2020","unstructured":"Ogonji MM, Okeyo G, Wafula JM. A survey on privacy and security of internet of things. Comput Sci Rev. 2020;38: 100312. https:\/\/doi.org\/10.1016\/j.cosrev.2020.100312.","journal-title":"Comput Sci Rev"},{"key":"64_CR4","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5724168","volume-title":"A review of security and privacy concerns in the internet of things (IOT)","author":"M Aqeel","year":"2022","unstructured":"Aqeel M, Ali F, Iqbal MW, Rana TA, Arif M, Auwul MR. A review of security and privacy concerns in the internet of things (IOT). London: Hindawi; 2022."},{"key":"64_CR5","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.future.2021.02.013","volume":"119","author":"K Sarwar","year":"2021","unstructured":"Sarwar K, Yongchareon S, Yu J, Rehman S. Lightweight, divide-and-conquer privacy-preserving data aggregation in fog computing. Future Gener Comput Syst. 2021;119:188\u201399.","journal-title":"Future Gener Comput Syst"},{"key":"64_CR6","unstructured":"A guide to edge iot analytics. https:\/\/www.ibm.com\/blogs\/internet-of-things\/edge-iot-analytics\/."},{"key":"64_CR7","doi-asserted-by":"publisher","unstructured":"Muniswamaiah M, Agerwala T, Tappert CC. A survey on cloudlets, mobile edge, and fog computing. In: 2021 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). 2021;pp. 139\u2013142. https:\/\/doi.org\/10.1109\/CSCloud-EdgeCom52276.2021.00034.","DOI":"10.1109\/CSCloud-EdgeCom52276.2021.00034"},{"key":"64_CR8","volume-title":"Internet of things: converging technologies for smart environments and integrated ecosystems","author":"O Vermesan","year":"2013","unstructured":"Vermesan O, Friess P. Internet of things: converging technologies for smart environments and integrated ecosystems. Denmark: River Publishers; 2013."},{"issue":"3","key":"64_CR9","doi-asserted-by":"publisher","first-page":"4755","DOI":"10.1109\/JIOT.2018.2874473","volume":"6","author":"X Li","year":"2018","unstructured":"Li X, Liu S, Wu F, Kumari S, Rodrigues JJ. Privacy preserving data aggregation scheme for mobile edge computing assisted iot applications. IEEE Internet Things J. 2018;6(3):4755\u201363.","journal-title":"IEEE Internet Things J"},{"key":"64_CR10","unstructured":"MS Windows NT Kernel Description. https:\/\/aggregate.digital\/products\/solutions\/remote-monitoring.html."},{"issue":"3","key":"64_CR11","doi-asserted-by":"publisher","first-page":"1948","DOI":"10.1109\/TII.2020.2995228","volume":"17","author":"C Guo","year":"2020","unstructured":"Guo C, Tian P, Choo K-KR. Enabling privacy-assured fog-based data aggregation in e-healthcare systems. IEEE Trans Ind Inform. 2020;17(3):1948\u201357.","journal-title":"IEEE Trans Ind Inform"},{"key":"64_CR12","doi-asserted-by":"publisher","unstructured":"Bajpai A, Maurya A, Yadav A. A hybrid approach for enhancing data aggregation security in the internet of medical things. In: 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT). 2023;pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCCNT56998.2023.10306533.","DOI":"10.1109\/ICCCNT56998.2023.10306533"},{"key":"64_CR13","doi-asserted-by":"publisher","unstructured":"Naaz Z, Joshi G, Sharma V. Secure and efficient edge computing framework for iot. In: 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT). 2023;pp. 1\u20135. https:\/\/doi.org\/10.1109\/ICCCNT56998.2023.10307200.","DOI":"10.1109\/ICCCNT56998.2023.10307200"},{"issue":"4","key":"64_CR14","doi-asserted-by":"publisher","first-page":"6480","DOI":"10.1109\/JSYST.2023.3310485","volume":"17","author":"S Pan","year":"2023","unstructured":"Pan S, Zhang Y, Wang S. A secure aggregate authentication scheme with efficient revocation for iot-based primary healthcare service. IEEE Syst J. 2023;17(4):6480\u201391. https:\/\/doi.org\/10.1109\/JSYST.2023.3310485.","journal-title":"IEEE Syst J"},{"issue":"1","key":"64_CR15","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1109\/TII.2022.3192037","volume":"19","author":"H Liu","year":"2023","unstructured":"Liu H, Gu T, Shojafar M, Alazab M, Liu Y. Opera: Optional dimensional privacy-preserving data aggregation for smart healthcare systems. IEEE Trans Ind Inform. 2023;19(1):857\u201366. https:\/\/doi.org\/10.1109\/TII.2022.3192037.","journal-title":"IEEE Trans Ind Inform"},{"key":"64_CR16","doi-asserted-by":"publisher","first-page":"62998","DOI":"10.1109\/ACCESS.2023.3288332","volume":"11","author":"S Fugkeaw","year":"2023","unstructured":"Fugkeaw S, Wirz L, Hak L. Secure and lightweight blockchain-enabled access control for fog-assisted iot cloud based electronic medical records sharing. IEEE Access. 2023;11:62998\u20133012. https:\/\/doi.org\/10.1109\/ACCESS.2023.3288332.","journal-title":"IEEE Access"},{"issue":"6","key":"64_CR17","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MWC.2017.1800094","volume":"25","author":"J Du","year":"2018","unstructured":"Du J, Jiang C, Gelenbe E, Xu L, Li J, Ren Y. Distributed data privacy preservation in iot applications. IEEE Wirel Commun. 2018;25(6):68\u201376. https:\/\/doi.org\/10.1109\/MWC.2017.1800094.","journal-title":"IEEE Wirel Commun"},{"key":"64_CR18","first-page":"1","volume-title":"A cooperative scheduling scheme of local cloud and internet cloud for delay-aware mobile cloud computing","author":"T Zhao","year":"2015","unstructured":"Zhao T, Zhou S, Guo X, Zhao Y, Niu Z. A cooperative scheduling scheme of local cloud and internet cloud for delay-aware mobile cloud computing. IEEE: Piscataway; 2015. p. 1\u20136."},{"key":"64_CR19","doi-asserted-by":"publisher","first-page":"44536","DOI":"10.1109\/ACCESS.2019.2908664","volume":"7","author":"R Saha","year":"2019","unstructured":"Saha R, Kumar G, Rai MK, Thomas R, Lim S-J. Privacy ensured healthcare for fog-enhanced iot based applications. IEEE Access. 2019;7:44536\u201343. https:\/\/doi.org\/10.1109\/ACCESS.2019.2908664.","journal-title":"IEEE Access"},{"key":"64_CR20","doi-asserted-by":"publisher","unstructured":"All one needs to know about fog computing and related edge computing paradigms: A complete survey. Journal of Systems Architecture. 2019;98, 289\u2013330. https:\/\/doi.org\/10.1016\/j.sysarc.2019.02.009.","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"64_CR21","doi-asserted-by":"publisher","unstructured":"Okay FY, Ozdemir S. A secure data aggregation protocol for fog computing based smart grids. In: 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG 2018). 2018;pp. 1\u20136. https:\/\/doi.org\/10.1109\/CPE.2018.8372598.","DOI":"10.1109\/CPE.2018.8372598"},{"issue":"1","key":"64_CR22","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","volume":"5","author":"N Abbas","year":"2018","unstructured":"Abbas N, Zhang Y, Taherkordi A, Skeie T. Mobile edge computing: a survey. IEEE Internet Things J. 2018;5(1):450\u201365. https:\/\/doi.org\/10.1109\/JIOT.2017.2750180.","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"64_CR23","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MCOM.2018.1701231","volume":"56","author":"B Chen","year":"2018","unstructured":"Chen B, Wan J, Celesti A, Li D, Abbas H, Zhang Q. Edge computing in iot-based manufacturing. IEEE Commun Mag. 2018;56(9):103\u20139. https:\/\/doi.org\/10.1109\/MCOM.2018.1701231.","journal-title":"IEEE Commun Mag"},{"key":"64_CR24","doi-asserted-by":"publisher","unstructured":"Vhora F, Gandhi J. A comprehensive survey on mobile edge computing: Challenges, tools, applications. In: 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC). 2020;pp. 49\u201355. https:\/\/doi.org\/10.1109\/ICCMC48092.2020.ICCMC-0009.","DOI":"10.1109\/ICCMC48092.2020.ICCMC-0009"},{"issue":"11","key":"64_CR25","doi-asserted-by":"publisher","first-page":"8707","DOI":"10.1109\/JIOT.2020.3045653","volume":"8","author":"A Ghubaish","year":"2020","unstructured":"Ghubaish A, Salman T, Zolanvari M, Unal D, Al-Ali A, Jain R. Recent advances in the internet-of-medical-things (iomt) systems security. IEEE Internet Things J. 2020;8(11):8707\u201318.","journal-title":"IEEE Internet Things J"},{"key":"64_CR26","unstructured":"MS Windows NT Kernel Description. https:\/\/smarthealthit.org\/an-app-platform-for-healthcare\/who-is-using-smart\/#:~:text=Some%20of%20the%20health%20systems,Healthcare%2C%20and%20University%20of%20Utah Accessed: 2010-09-30"},{"issue":"5","key":"64_CR27","doi-asserted-by":"publisher","first-page":"4016","DOI":"10.1109\/JIOT.2020.2978286","volume":"7","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhao Y, Wu J, Chen B. Lvpda: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled iot. IEEE Internet Things J. 2020;7(5):4016\u201327. https:\/\/doi.org\/10.1109\/JIOT.2020.2978286.","journal-title":"IEEE Internet Things J"},{"key":"64_CR28","unstructured":"MS Windows NT Kernel Description. https:\/\/smart-grid.utilitiestechoutlook.com\/vendors\/top-smart-grid-solution-companies.html. Accessed: 2010-09-30"},{"key":"64_CR29","unstructured":"MS Windows NT Kernel Description. https:\/\/medium.com\/@energycioinsights\/top-10-smart-grid-services-companies-a3cc67f828e6. Accessed: 2010-09-30"},{"key":"64_CR30","unstructured":"MS Windows NT Kernel Description. https:\/\/www.duke-energy.com\/homel. Accessed: 2010-09-30"},{"key":"64_CR31","unstructured":"MS Windows NT Kernel Description. https:\/\/en.wikipedia.org\/wiki\/Smart_city\/. Accessed: 2010-09-30"},{"key":"64_CR32","doi-asserted-by":"publisher","unstructured":"Asad B, Saxena N, Katos V. Analysis of the security and privacy risks and challenges in smart cities\u2019 traffic light system. In: 3rd Smart Cities Symposium (SCS 2020). 2020;vol. 2020, pp. 226\u2013232. https:\/\/doi.org\/10.1049\/icp.2021.0940.","DOI":"10.1049\/icp.2021.0940"},{"key":"64_CR33","unstructured":"MS Windows NT Kernel Description. https:\/\/www.twi-global.com\/technical-knowledge\/faqs\/what-is-a-smart-city#Examples. Accessed on 30 sep 2010."},{"key":"64_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.001","author":"W Ding","year":"2018","unstructured":"Ding W, Jing X, Yang L. A survey on data fusion in internet of things: towards secure and privacy-preserving fusion. Inform Fusion. 2018. https:\/\/doi.org\/10.1016\/j.inffus.2018.12.001.","journal-title":"Inform Fusion"},{"issue":"1","key":"64_CR35","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/MITS.2019.2898973","volume":"13","author":"D Hahn","year":"2021","unstructured":"Hahn D, Munir A, Behzadan V. Security and privacy issues in intelligent transportation systems: classification and challenges. IEEE Intell Transp Syst Mag. 2021;13(1):181\u201396. https:\/\/doi.org\/10.1109\/MITS.2019.2898973.","journal-title":"IEEE Intell Transp Syst Mag"},{"key":"64_CR36","unstructured":"MS Windows NT Kernel Description. https:\/\/www.digi.com\/blog\/post\/introduction-to-smart-transportation-benefits. Accessed on 30 Sep 2010."},{"key":"64_CR37","doi-asserted-by":"publisher","unstructured":"Ali W, Dustgeer G, Awais M, Shah MA. Iot based smart home: Security challenges, security requirements and solutions. In: 2017 23rd International Conference on Automation and Computing (ICAC). 2017;pp. 1\u20136. https:\/\/doi.org\/10.23919\/IConAC.2017.8082057.","DOI":"10.23919\/IConAC.2017.8082057"},{"key":"64_CR38","unstructured":"MS Windows NT Kernel Description. https:\/\/www.diysmarthomehub.com\/smart-home-maker-company-in-united-states\/. Accessed on 30 Sep 2010."},{"issue":"3","key":"64_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-019-1508-6","volume":"63","author":"C Xu","year":"2020","unstructured":"Xu C, Xie X, Zhu L, Sharif K, Zhang C, Du X, Guizani M. Ppls: a privacy-preserving location-sharing scheme in mobile online social networks. Sci China Inform Sci. 2020;63(3):1\u201311.","journal-title":"Sci China Inform Sci"},{"key":"64_CR40","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.future.2017.04.031","volume":"78","author":"S Tonyali","year":"2018","unstructured":"Tonyali S, Akkaya K, Saputro N, Uluagac AS, Nojoumian M. Privacy-preserving protocols for secure and reliable data aggregation in iot-enabled smart metering systems. Future Gener Comput Syst. 2018;78:547\u201357. https:\/\/doi.org\/10.1016\/j.future.2017.04.031.","journal-title":"Future Gener Comput Syst"},{"key":"64_CR41","doi-asserted-by":"crossref","unstructured":"Hu C, Luo J, Pu Y, Yu J, Zhao R, Huang H, Xiang T. An efficient privacy-preserving data aggregation scheme for iot. In: International Conference on Wireless Algorithms, Systems, and Applications. 2018;pp. 164\u2013176. Springer.","DOI":"10.1007\/978-3-319-94268-1_14"},{"key":"64_CR42","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3985232","author":"Y Pu","year":"2019","unstructured":"Pu Y, Luo J, Hu C, Yu J, Zhao R, Huang H, Xiang T. Two secure privacy-preserving data aggregation schemes for iot. Wirel Commun Mobile Comput. 2019. https:\/\/doi.org\/10.1155\/2019\/3985232.","journal-title":"Wirel Commun Mobile Comput"},{"issue":"3","key":"64_CR43","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/TII.2018.2809672","volume":"15","author":"Y Liu","year":"2018","unstructured":"Liu Y, Guo W, Fan C-I, Chang L, Cheng C. A practical privacy-preserving data aggregation (3pda) scheme for smart grid. IEEE Trans Ind Inform. 2018;15(3):1767\u201374.","journal-title":"IEEE Trans Ind Inform"},{"key":"64_CR44","doi-asserted-by":"publisher","unstructured":"Xie X, Chen Y-C. Decentralized data aggregation: A new secure framework based on lightweight cryptographic algorithms. In: 2021 IEEE Conference on Dependable and Secure Computing (DSC) 2021;pp. 1\u20132. https:\/\/doi.org\/10.1109\/DSC49826.2021.9346260.","DOI":"10.1109\/DSC49826.2021.9346260"},{"key":"64_CR45","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5594159","author":"FA Almalki","year":"2021","unstructured":"Almalki FA, Soufiene BO. Eppda: an efficient and privacy-preserving data aggregation scheme with authentication and authorization for iot-based healthcare applications. Wirel Commun Mobile Comput. 2021. https:\/\/doi.org\/10.1155\/2021\/5594159.","journal-title":"Wirel Commun Mobile Comput"},{"issue":"10","key":"64_CR46","doi-asserted-by":"publisher","first-page":"10650","DOI":"10.1109\/JIOT.2020.3006523","volume":"7","author":"M Kumar","year":"2020","unstructured":"Kumar M, Chand S. A secure and efficient cloud-centric internet-of-medical-things-enabled smart healthcare system with public verifiability. IEEE Internet Things J. 2020;7(10):10650\u20139.","journal-title":"IEEE Internet Things J"},{"key":"64_CR47","doi-asserted-by":"publisher","unstructured":"Seliem M, Elgazzar K. Biomt: Blockchain for the internet of medical things. In: 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). 2019;pp. 1\u20134. https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812784.","DOI":"10.1109\/BlackSeaCom.2019.8812784"},{"issue":"3","key":"64_CR48","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/IOTM.0001.2000087","volume":"3","author":"H-N Dai","year":"2020","unstructured":"Dai H-N, Imran M, Haider N. Blockchain-enabled internet of medical things to combat covid-19. IEEE Internet Things Mag. 2020;3(3):52\u20137. https:\/\/doi.org\/10.1109\/IOTM.0001.2000087.","journal-title":"IEEE Internet Things Mag"},{"issue":"3","key":"64_CR49","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/IOTM.0001.2000123","volume":"3","author":"F Al-Turjman","year":"2020","unstructured":"Al-Turjman F, Deebak B. Privacy-aware energy-efficient framework using the internet of medical things for covid-19. IEEE Internet Things Mag. 2020;3(3):64\u20138. https:\/\/doi.org\/10.1109\/IOTM.0001.2000123.","journal-title":"IEEE Internet Things Mag"},{"issue":"5","key":"64_CR50","doi-asserted-by":"publisher","first-page":"8714","DOI":"10.1109\/JIOT.2019.2923261","volume":"6","author":"W Tang","year":"2019","unstructured":"Tang W, Ren J, Deng K, Zhang Y. Secure data aggregation of lightweight e-healthcare iot devices with fair incentives. IEEE Internet Things J. 2019;6(5):8714\u201326. https:\/\/doi.org\/10.1109\/JIOT.2019.2923261.","journal-title":"IEEE Internet Things J"},{"key":"64_CR51","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.future.2019.01.058","volume":"98","author":"Z Guan","year":"2019","unstructured":"Guan Z, Lv Z, Du X, Wu L, Guizani M. Achieving data utility-privacy tradeoff in internet of medical things: a machine learning approach. Future Gener Comput Syst. 2019;98:60\u20138. https:\/\/doi.org\/10.1016\/j.future.2019.01.058.","journal-title":"Future Gener Comput Syst"},{"key":"64_CR52","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.jnca.2018.09.019","volume":"125","author":"Z Guan","year":"2019","unstructured":"Guan Z, Zhang Y, Wu L, Wu J, Li J, Ma Y, Hu J. Appa: an anonymous and privacy preserving data aggregation scheme for fog-enhanced iot. J Netw Comput Appl. 2019;125:82\u201392.","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"64_CR53","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2019.1700859","volume":"57","author":"L Zhu","year":"2019","unstructured":"Zhu L, Li M, Zhang Z, Xu C, Zhang R, Du X, Guizani N. Privacy-preserving authentication and data aggregation for fog-based smart grid. IEEE Commun Mag. 2019;57(6):80\u20135.","journal-title":"IEEE Commun Mag"},{"key":"64_CR54","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu R, Heung K, Lashkari AH, Ghorbani AA. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot. IEEE Access. 2017;5:3302\u201312.","journal-title":"IEEE Access"},{"key":"64_CR55","doi-asserted-by":"crossref","unstructured":"Huang C, Liu D, Ni J, Lu R, Shen X. Reliable and privacy-preserving selective data aggregation for fog-based iot. In: 2018 IEEE International Conference on Communications (ICC). 2018;pp. 1\u20136. IEEE.","DOI":"10.1109\/ICC.2018.8422445"},{"key":"64_CR56","doi-asserted-by":"publisher","unstructured":"Appa: An anonymous and privacy-preserving data aggregation scheme for fog-enhanced iot. Journal of Network and Computer Applications. 2019;125, 82\u201392. https:\/\/doi.org\/10.1016\/j.jnca.2018.09.019.","DOI":"10.1016\/j.jnca.2018.09.019"},{"key":"64_CR57","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3023588","author":"X Wang","year":"2020","unstructured":"Wang X, Garg S, Lin H, Kaddoum G, Hu J, Hossain MS. A secure data aggregation strategy in edge computing and blockchain empowered internet of things. IEEE Internet Things J. 2020. https:\/\/doi.org\/10.1109\/JIOT.2020.3023588.","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"64_CR58","doi-asserted-by":"publisher","first-page":"4016","DOI":"10.1109\/JIOT.2020.2978286","volume":"7","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhao Y, Wu J, Chen B. Lvpda: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled iot. IEEE Internet Things J. 2020;7(5):4016\u201327.","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"64_CR59","doi-asserted-by":"publisher","first-page":"58","DOI":"10.23919\/JCC.2020.08.005","volume":"17","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhang Q, Ji S, Bai W. Pvf-da: Privacy-preserving, verifiable and fault-tolerant data aggregation in mec. China Commun. 2020;17(8):58\u201369.","journal-title":"China Commun"},{"key":"64_CR60","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101713","volume":"106","author":"P Zeng","year":"2020","unstructured":"Zeng P, Pan B, Choo K-KR, Liu H. Mmda: multidimensional and multidirectional data aggregation for edge computing-enhanced iot. J Syst Arch. 2020;106: 101713. https:\/\/doi.org\/10.1016\/j.sysarc.2020.101713.","journal-title":"J Syst Arch"},{"key":"64_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106504","volume":"81","author":"M Gheisari","year":"2020","unstructured":"Gheisari M, Wang G, Chen S. An edge computing-enhanced internet of things framework for privacy-preserving in smart city. Comput Electr Eng. 2020;81: 106504. https:\/\/doi.org\/10.1016\/j.compeleceng.2019.106504.","journal-title":"Comput Electr Eng"},{"key":"64_CR62","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.jnca.2017.08.006","volume":"97","author":"B Pourghebleh","year":"2017","unstructured":"Pourghebleh B, Navimipour NJ. Data aggregation mechanisms in the internet of things: a systematic review of the literature and recommendations for future research. J Netw Comput Appl. 2017;97:23\u201334. https:\/\/doi.org\/10.1016\/j.jnca.2017.08.006.","journal-title":"J Netw Comput Appl"},{"key":"64_CR63","doi-asserted-by":"crossref","unstructured":"Hassanlou M, Sun Y, Fang F. Minimizing response time of iot-based traffic information system through decentralized server system;2020.","DOI":"10.24251\/HICSS.2020.644"},{"key":"64_CR64","doi-asserted-by":"crossref","unstructured":"Catalano D, Gennaro R, Howgrave-Graham N, Nguyen PQ. Paillier\u2019s cryptosystem revisited. In: Proceedings of the 8th ACM Conference on Computer and Communications Security. 2001;pp. 206\u2013214.","DOI":"10.1145\/501983.502012"},{"key":"64_CR65","unstructured":"MS Windows NT Kernel Description. https:\/\/inform.tmforum.org\/internet-of-everything\/2016\/09\/iot-isnt-secure-people-wont-use\/"},{"key":"64_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/7142048","volume":"2021","author":"SK Dwivedi","year":"2021","unstructured":"Dwivedi SK, Roy P, Karda C, Agrawal S, Amin R. Blockchain-based internet of things and industrial iot: a comprehensive survey. Secur Commun Netw. 2021;2021:1\u201321.","journal-title":"Secur Commun Netw"},{"key":"64_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2021.127021","volume":"302","author":"SMH Bamakan","year":"2021","unstructured":"Bamakan SMH, Moghaddam SG, Manshadi SD. Blockchain-enabled pharmaceutical cold chain: applications, key challenges, and future trends. J Clean Prod. 2021;302: 127021.","journal-title":"J Clean Prod"},{"issue":"7","key":"64_CR68","doi-asserted-by":"publisher","first-page":"2452","DOI":"10.3390\/s21072452","volume":"21","author":"F Loukil","year":"2021","unstructured":"Loukil F, Ghedira-Guegan C, Boukadi K, Benharkat A-N. Privacy-preserving iot data aggregation based on blockchain and homomorphic encryption. Sensors. 2021;21(7):2452.","journal-title":"Sensors"},{"key":"64_CR69","doi-asserted-by":"crossref","unstructured":"Agrawal R, Srikant R. Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data. 2000;pp. 439\u2013450.","DOI":"10.1145\/342009.335438"},{"issue":"3","key":"64_CR70","first-page":"1","volume":"17","author":"J Wang","year":"2021","unstructured":"Wang J, Wu L, Zeadally S, Khan MK, He D. Privacy-preserving data aggregation against malicious data mining attack for iot-enabled smart grid. ACM Trans Sensor Netw (TOSN). 2021;17(3):1\u201325.","journal-title":"ACM Trans Sensor Netw (TOSN)"},{"key":"64_CR71","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S. Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. 2012;pp. 13\u201316.","DOI":"10.1145\/2342509.2342513"},{"issue":"5","key":"64_CR72","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/JSAC.2016.2545559","volume":"34","author":"F Jalali","year":"2016","unstructured":"Jalali F, Hinton K, Ayre R, Alpcan T, Tucker RS. Fog computing may help to save energy in cloud computing. IEEE J Sel Areas Commun. 2016;34(5):1728\u201339.","journal-title":"IEEE J Sel Areas Commun"},{"issue":"12","key":"64_CR73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0647-6","volume":"40","author":"MM Rathore","year":"2016","unstructured":"Rathore MM, Ahmad A, Paul A, Wan J, Zhang D. Real-time medical emergency response system: exploiting iot and big data for public health. J Med Syst. 2016;40(12):1\u201310.","journal-title":"J Med Syst"},{"key":"64_CR74","doi-asserted-by":"crossref","unstructured":"Zhang J, Zhao Y, Wu J, Chen B. Lpda-ec: a lightweight privacy-preserving data aggregation scheme for edge computing. In: 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). 2018;pp. 98\u2013106. IEEE.","DOI":"10.1109\/MASS.2018.00024"},{"key":"64_CR75","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.comnet.2018.11.026","volume":"148","author":"J Hou","year":"2019","unstructured":"Hou J, Qu L, Shi W. A survey on internet of things security from data perspectives. Comput Netw. 2019;148:295\u2013306. https:\/\/doi.org\/10.1016\/j.comnet.2018.11.026.","journal-title":"Comput Netw"},{"issue":"1","key":"64_CR76","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1080\/10580530.2020.1746982","volume":"38","author":"R Dantu","year":"2021","unstructured":"Dantu R, Dissanayake I, Nerur S. Exploratory analysis of internet of things (iot) in healthcare: a topic modelling & co-citation approaches. Inform Syst Manag. 2021;38(1):62\u201378.","journal-title":"Inform Syst Manag"},{"issue":"8","key":"64_CR77","doi-asserted-by":"publisher","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia X, He D, Kumar N, Choo K-KR. Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel Netw. 2019;25(8):4737\u201350.","journal-title":"Wirel Netw"},{"issue":"10","key":"64_CR78","doi-asserted-by":"publisher","first-page":"2967","DOI":"10.1109\/TPDS.2016.2516983","volume":"27","author":"X Yang","year":"2016","unstructured":"Yang X, Ren X, Lin J, Yu W. On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems. IEEE Trans Parallel Distrib Syst. 2016;27(10):2967\u201383. https:\/\/doi.org\/10.1109\/TPDS.2016.2516983.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"64_CR79","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TII.2017.2687618","volume":"13","author":"H Huang","year":"2017","unstructured":"Huang H, Gong T, Ye N, Wang R, Dou Y. Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Trans Ind Inform. 2017;13(3):1227\u201337.","journal-title":"IEEE Trans Ind Inform"},{"key":"64_CR80","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.future.2017.02.032","volume":"78","author":"H Wang","year":"2018","unstructured":"Wang H, Wang Z, Domingo-Ferrer J. Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener Comput Syst. 2018;78:712\u20139.","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"64_CR81","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.fcij.2017.11.004","volume":"3","author":"I Ali","year":"2018","unstructured":"Ali I, Khan E, Sabir S. Privacy-preserving data aggregation in resource-constrained sensor nodes in internet of things: a review. Future Comput Inform J. 2018;3(1):41\u201350.","journal-title":"Future Comput Inform J"},{"key":"64_CR82","first-page":"3","volume":"1","author":"Y Yuehong","year":"2016","unstructured":"Yuehong Y, Zeng Y, Chen X, Fan Y. The internet of things in healthcare: an overview. J Ind Inform Integr. 2016;1:3\u201313.","journal-title":"J Ind Inform Integr"},{"key":"64_CR83","doi-asserted-by":"publisher","first-page":"16849","DOI":"10.1109\/ACCESS.2021.3052850","volume":"9","author":"A Ullah","year":"2021","unstructured":"Ullah A, Azeem M, Ashraf H, Alaboudi AA, Humayun M, Jhanjhi N. Secure healthcare data aggregation and transmission in iot-a survey. IEEE Access. 2021;9:16849\u201365.","journal-title":"IEEE Access"},{"issue":"2","key":"64_CR84","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/MCOM.2018.1700364","volume":"56","author":"E Luo","year":"2018","unstructured":"Luo E, Bhuiyan MZA, Wang G, Rahman MA, Wu J, Atiquzzaman M. Privacyprotector: privacy-protected patient data collection in iot-based healthcare systems. IEEE Commun Mag. 2018;56(2):163\u20138.","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"64_CR85","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang Y, Wu L, Yin G, Li L, Zhao H. A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 2017;4(5):1250\u20138.","journal-title":"IEEE Internet Things J"},{"key":"64_CR86","doi-asserted-by":"crossref","unstructured":"Sharon RS, Manoj RJ. E-health care data sharing into the cloud based on deduplication and file hierarchical encryption. In: 2017 International Conference on Information Communication and Embedded Systems (ICICES). 2017;pp. 1\u20136. IEEE.","DOI":"10.1109\/ICICES.2017.8070739"},{"key":"64_CR87","doi-asserted-by":"crossref","unstructured":"Dang TD, Hoang D. A data protection model for fog computing. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC). 2017;pp. 32\u201338. IEEE.","DOI":"10.1109\/FMEC.2017.7946404"},{"issue":"3","key":"64_CR88","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.dcan.2016.07.001","volume":"2","author":"D Wu","year":"2016","unstructured":"Wu D, Yang B, Wang R. Scalable privacy-preserving big data aggregation mechanism. Digit Commun Netw. 2016;2(3):122\u20139.","journal-title":"Digit Commun Netw"},{"key":"64_CR89","doi-asserted-by":"crossref","unstructured":"Al-Khafajiy M, Webster L, Baker T, Waraich A. Towards fog driven iot healthcare: challenges and framework of fog computing in healthcare. In: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems. 2018;pp. 1\u20137.","DOI":"10.1145\/3231053.3231062"},{"key":"64_CR90","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comnet.2019.03.006","volume":"153","author":"MM Dhanvijay","year":"2019","unstructured":"Dhanvijay MM, Patil SC. Internet of things: a survey of enabling technologies in healthcare and its applications. Comput Netw. 2019;153:113\u201331.","journal-title":"Comput Netw"},{"issue":"8","key":"64_CR91","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0983-9","volume":"42","author":"AS Albahri","year":"2018","unstructured":"Albahri AS, Zaidan A, Albahri OS, Zaidan B, Alsalem M. Real-time fault-tolerant mhealth system: comprehensive review of healthcare services, opens issues, challenges and methodological aspects. J Med Syst. 2018;42(8):1\u201356.","journal-title":"J Med Syst"},{"issue":"1","key":"64_CR92","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/TDSC.2014.2316816","volume":"12","author":"M Rezvani","year":"2015","unstructured":"Rezvani M, Ignjatovic A, Bertino E, Jha S. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans Dependable Secure Comput. 2015;12(1):98\u2013110. https:\/\/doi.org\/10.1109\/TDSC.2014.2316816.","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"12","key":"64_CR93","doi-asserted-by":"publisher","first-page":"4443","DOI":"10.1002\/dac.4443","volume":"33","author":"A Srivastava","year":"2020","unstructured":"Srivastava A, Gupta S, Quamara M, Chaudhary P, Aski VJ. Future iot-enabled threats and vulnerabilities: State of the art, challenges, and future prospects. Int J Commun Syst. 2020;33(12):4443.","journal-title":"Int J Commun Syst"},{"key":"64_CR94","first-page":"1","volume-title":"Collusion attacks in internet of things: detection and mitigation using a fog based model","author":"Q Yaseen","year":"2017","unstructured":"Yaseen Q, Jararweh Y, Al-Ayyoub M, Al Dwairi M. Collusion attacks in internet of things: detection and mitigation using a fog based model. Piscataway: IEEE; 2017. p. 1\u20135."},{"issue":"4","key":"64_CR95","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1002\/ett.2993","volume":"27","author":"BO Soufiene","year":"2016","unstructured":"Soufiene BO, Bahattab AA, Trad A, Youssef H. Lightweight and confidential data aggregation in healthcare wireless sensor networks. Trans Emerg Telecommun Technol. 2016;27(4):576\u201388.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"64_CR96","doi-asserted-by":"crossref","unstructured":"Mahmud R, Koch FL, Buyya R. Cloud-fog interoperability in iot-enabled healthcare solutions. In: Proceedings of the 19th International Conference on Distributed Computing and Networking. 2018;pp. 1\u201310.","DOI":"10.1145\/3154273.3154347"},{"issue":"1","key":"64_CR97","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-016-0389-x","volume":"17","author":"KY Yigzaw","year":"2017","unstructured":"Yigzaw KY, Michalas A, Bellika JG. Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation. BMC Med Inform Decis Mak. 2017;17(1):1\u201319.","journal-title":"BMC Med Inform Decis Mak"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00064-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-024-00064-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00064-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T03:19:26Z","timestamp":1732763966000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-024-00064-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"references-count":97,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["64"],"URL":"https:\/\/doi.org\/10.1007\/s43926-024-00064-7","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"11 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"28"}}