{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:29:30Z","timestamp":1762608570574,"version":"3.37.3"},"reference-count":201,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Brazilian National Council for Scientific and Technological Development","award":["313036\/2020-9"],"award-info":[{"award-number":["313036\/2020-9"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s10586-021-03496-w","type":"journal-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:04:44Z","timestamp":1641513884000},"page":"1111-1154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures"],"prefix":"10.1007","volume":"25","author":[{"given":"Siddhant","family":"Jain","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2124-9388","authenticated-orcid":false,"given":"Shashank","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"K. K.","family":"Sreelakshmi","sequence":"additional","affiliation":[]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"3496_CR1","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1016\/j.future.2015.07.012","volume":"56","author":"H Ning","year":"2016","unstructured":"Ning, H., Liu, H., Ma, J., Yang, L.T., Huang, R.: Cybermatics: cyber-physical-social-thinking hyperspace-based science and technology. Future Gener. Comput. Syst. 56, 504\u2013522 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"3496_CR2","doi-asserted-by":"crossref","first-page":"2789","DOI":"10.1109\/TVT.2016.2585591","volume":"66","author":"Z He","year":"2017","unstructured":"He, Z., Cai, Z., Yu, J., Wang, X., Sun, Y., Li, Y.: Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Trans. Veh. Technol. 66(3), 2789\u20132800 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"3496_CR3","unstructured":"Luan, T.H., et al.: Fog computing: focusing on mobile users at the edge. ArXiv Preprint, Tech. Rep. (2016). https:\/\/arxiv.org\/pdf\/1502.01815.pdf"},{"issue":"1","key":"3496_CR4","first-page":"2","volume":"15","author":"G Luo","year":"2017","unstructured":"Luo, G., Pan, Y.: ZTE communications special issue on cloud computing, fog computing, and dew computing. ZTE Commun. 15(1), 2 (2017)","journal-title":"ZTE Commun."},{"key":"3496_CR5","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0090-3","author":"S Khan","year":"2017","unstructured":"Khan, S., Parkinson, S., Qin, Y.: Fog computing security: a review of current applications and security solutions. J. Cloud Comput. Adv. Syst. Appl. (2017). https:\/\/doi.org\/10.1186\/s13677-017-0090-3","journal-title":"J. Cloud Comput. Adv. Syst. Appl."},{"key":"3496_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2749422","author":"M Mukherjee","year":"2017","unstructured":"Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M.A., Choudhury, N., Kumar, V.: Security and privacy in fog computing: challenges. IEEE Access (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2749422","journal-title":"IEEE Access"},{"issue":"10","key":"3496_CR7","doi-asserted-by":"crossref","first-page":"4519","DOI":"10.1109\/TII.2018.2793350","volume":"14","author":"J-S Fu","year":"2018","unstructured":"Fu, J.-S., Liu, Y., Chao, H.-C., Bhargava, B.K., Zhang, Z.-J.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Ind. Inf. 14(10), 4519\u20134528 (2018)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"3496_CR8","doi-asserted-by":"crossref","unstructured":"Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: Proc. Workshop Mobile Big Data, Hangzhou, China, pp. 37\u201342. (2015)","DOI":"10.1145\/2757384.2757397"},{"issue":"4","key":"3496_CR9","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MCOM.2017.7901470","volume":"55","author":"M Chiang","year":"2017","unstructured":"Chiang, M., Ha, S., Risso, F., Zhang, T., Chih-Lin, I.: Clarifying fog computing and networking: 10 questions and answers. IEEE Commun. Mag. 55(4), 18\u201320 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"3496_CR10","doi-asserted-by":"crossref","first-page":"1826","DOI":"10.1109\/COMST.2018.2814571","volume":"20","author":"M Mukherjee","year":"2018","unstructured":"Mukherjee, M., Shu, L., Wang, D.: Survey of fog computing: fundamental, network applications, and research challenges. IEEE Commun. Surv. Tutor. 20(3), 1826\u20131857 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"3496_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3057266","volume":"50","author":"C Perera","year":"2017","unstructured":"Perera, C., Qin, Y., Estrella, J.C., Reiff-Marganiec, S., Vasilakos, A.V.: Fog computing for sustainable smart cities: a survey. ACM Comput. Surv. (CSUR) 50(3), 1\u201343 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"3496_CR12","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/S1005-8885(16)60021-3","volume":"23","author":"K Kai","year":"2016","unstructured":"Kai, K., Cong, W., Tao, L.: Fog computing for vehicular ad-hoc networks: Paradigms, scenarios, and issues. J. China Univ. Posts Telecommun. 23(2), 56\u201396 (2016)","journal-title":"J. China Univ. Posts Telecommun."},{"issue":"4","key":"3496_CR13","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MNET.2016.7513863","volume":"30","author":"M Peng","year":"2016","unstructured":"Peng, M., Yan, S., Zhang, K., Wang, C.: Fog-computing-based radio access networks: issues and challenges. IEEE Netw. 30(4), 46\u201353 (2016)","journal-title":"IEEE Netw."},{"issue":"4","key":"3496_CR14","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MCOM.2017.1600893","volume":"55","author":"Y-J Ku","year":"2017","unstructured":"Ku, Y.-J., et al.: 5G radio access network design with the fog paradigm: confluence of communications and computing. IEEE Commun. Mag. 55(4), 46\u201352 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"3496_CR15","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang, M., Zhang, T.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3(6), 854\u2013864 (2016)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"3496_CR16","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1109\/CC.2017.7839768","volume":"14","author":"Z Li","year":"2017","unstructured":"Li, Z., Zhou, X., Liu, Y., Xu, H., Miao, L.: A non-cooperative differential game-based security model in fog computing. China Commun. 14(1), 180\u2013189 (2017)","journal-title":"China Commun."},{"key":"3496_CR17","doi-asserted-by":"crossref","unstructured":"Mahmud, R., Buyya, R.: Fog computing: a taxonomy, survey and future directions. (2016). arXiv:1611.05539","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"3496_CR18","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"A Yousefpour","year":"2019","unstructured":"Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., Jalali, F., Niakanlahiji, A., Kong, J., Jue, J.P.: All one needs to know about fog computing and related edge computing paradigms: a complete survey. J. Syst. Architect. 98, 289\u2013330 (2019)","journal-title":"J. Syst. Architect."},{"key":"3496_CR19","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.future.2016.02.020","volume":"64","author":"SR Moosavia","year":"2016","unstructured":"Moosavia, S.R., Gia, T.N., Nigussie, E., Rahmania, A.M., Virtanen, S., Tenhunena, H., Isoaho, J.: End-to-end security scheme for mobility enabled healthcare Internet of things. Future Gener. Comput. Syst. 64, 108\u2013124 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"3496_CR20","first-page":"1","volume-title":"2018 18th International Conference on Computational Science And Applications (ICCSA)","author":"I Odun-Ayo","year":"2018","unstructured":"Odun-Ayo, I., Ananya, M., Agono, F., Goddy-Worlu, R.: Cloud computing architecture: a critical analysis. In: 2018 18th International Conference on Computational Science And Applications (ICCSA), pp. 1\u20137. IEEE, Piscataway (2018)"},{"key":"3496_CR21","unstructured":"OpenFogConsortium: Openfog reference architecture for fog computing, 2017. https:\/\/www.openfogconsortium.org\/ra\/. Accessed Feb 2017"},{"key":"3496_CR22","unstructured":"Zhang, T.: Fog computing brings new business opportunities and disruptions. Blog, TechTarget. http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Fog-computing-brings-new-business-opportunities-and-disruptions. Accessed Oct 2020"},{"issue":"4","key":"3496_CR23","first-page":"38","volume":"27","author":"GH Forman","year":"1994","unstructured":"Forman, G.H., Zahorjan, J.: The challenges of mobile computing. Computer (Long Beach Calif) 27(4), 38\u201347 (1994)","journal-title":"Computer (Long Beach Calif)"},{"key":"3496_CR24","unstructured":"NIST: Mobile cloud computing. Technical Report, National Institute of Standards and Technology. https:\/\/www.nist.gov\/programs-projects\/mobile-cloud-computing. Accessed Oct 2020"},{"key":"3496_CR25","doi-asserted-by":"crossref","first-page":"1037","DOI":"10.1109\/ICCONS.2017.8250623","volume-title":"2017 International Conference on Intelligent Computing and Control Systems (ICICCS)","author":"C Arun","year":"2017","unstructured":"Arun, C., Prabu, K.: Applications of mobile cloud computing: a survey. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 1037\u20131041. IEEE, Piscataway (2017)"},{"issue":"16","key":"3496_CR26","doi-asserted-by":"crossref","first-page":"2572","DOI":"10.1002\/wcm.2709","volume":"16","author":"I Yaqoob","year":"2016","unstructured":"Yaqoob, I., Ahmed, E., Gani, A., Mokhtar, S., Imran, M., Guizani, S.: Mobile ad hoc cloud: a survey. Wirel. Commun. Mob. Comput. 16(16), 2572\u20132589 (2016)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"3496_CR27","unstructured":"OpenEdgeConsortium: About\u2014the who, what, and how. Technical report, OpenEdge computing. http:\/\/openedgecomputing.org\/about.html. Accessed Oct 2020"},{"key":"3496_CR28","unstructured":"Reale, A.: A guide to edge iot analytics. Blog, International Business Machines. https:\/\/www.ibm.com\/blogs\/internet-of-things\/edge-iot-analytics. Accessed Nov 2020"},{"key":"3496_CR29","first-page":"7","volume-title":"Proceedings of the Second ACM\/IEEE Symposium on Edge Computing","author":"P Hao","year":"2017","unstructured":"Hao, P., Bai, Y., Zhang, X., Zhang, Y.: Edgecourier: an edge-hosted personal service for low-bandwidth document synchronization in mobile cloud storage services. In: Proceedings of the Second ACM\/IEEE Symposium on Edge Computing, p. 7. ACM, New York (2017)"},{"key":"3496_CR30","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1016\/j.procs.2015.05.010","volume":"52","author":"B Negash","year":"2015","unstructured":"Negash, B., Rahmani, A.M., Westerlund, T., Liljeberg, P., Tenhunen, H.: LISA: Lightweight internet of things service bus architecture. Procedia Comput. Sci. 52, 436\u2013443 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"3496_CR31","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/ICFEC.2017.14","volume-title":"2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC)","author":"PMP Silva","year":"2017","unstructured":"Silva, P.M.P., Rodrigues, J., Silva, J., Martins, R., Lopes, L., Silva, F.: Using edge-clouds to reduce load on traditional wifi infrastructures and improve quality of experience. In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp. 61\u201367. IEEE, Piscataway (2017)"},{"key":"3496_CR32","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/2987354.2987364","volume-title":"Proceedings of the Eighth Wireless of the Students, by the Students, and for the Students Workshop","author":"A Salem","year":"2016","unstructured":"Salem, A., Nadeem, T.: Lamen: leveraging resources on anonymous mobile edge nodes. In: Proceedings of the Eighth Wireless of the Students, by the Students, and for the Students Workshop, pp. 15\u201317. ACM, New York (2016)"},{"key":"3496_CR33","doi-asserted-by":"crossref","first-page":"8835","DOI":"10.1109\/ACCESS.2017.2704444","volume":"5","author":"R Morabito","year":"2017","unstructured":"Morabito, R.: Virtualization on internet of things edge devices with container technologies: a performance evaluation. IEEE Access 5, 8835\u20138850 (2017)","journal-title":"IEEE Access"},{"key":"3496_CR34","first-page":"723","volume":"6","author":"PP Ray","year":"2017","unstructured":"Ray, P.P.: An introduction to dew computing: definition, concept and implications. IEEE Access 6, 723\u2013737 (2017)","journal-title":"IEEE Access"},{"key":"3496_CR35","unstructured":"Pan, Y., Thulasiraman, P., Wang, Y.: Overview of cloudlet, fog computing, edge computing, and dew computing. In: Proc. 3rd Int. Workshop Dew Comput., pp. 20\u201323. (2018)"},{"issue":"6","key":"3496_CR36","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/JIOT.2016.2557459","volume":"3","author":"S Abdelwahab","year":"2016","unstructured":"Abdelwahab, S., Hamdaoui, B., Guizani, M., Znati, T.: Cloud of things for sensing-as-a-service: architecture, algorithms, and use case. IEEE Internet Things J. 3(6), 1099\u20131112 (2016)","journal-title":"IEEE Internet Things J."},{"key":"3496_CR37","unstructured":"Fu, T., Malik, S.A., Joshi, G., Nagaraj, A.: Apparatus, systems, and methods for distributed application orchestration and deployment.\u201d U.S. Patent 9,684,502, issued June 20, 2017"},{"key":"3496_CR38","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.future.2018.05.008","volume":"88","author":"P Zhang","year":"2018","unstructured":"Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in fog computing: a survey. Future Gener. Comput. Syst. 88, 16\u201327 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"3496_CR39","unstructured":"Fortino, G., Russo, W., Savaglio, C., Viroli, M., Zhou, M.: Modeling opportunistic IoT services in open IoT ecosystems, In: 17th Workshop from Objects to Agents, WOA 2017, pp. 90\u201395, Scilla, Italy (2017)"},{"issue":"8","key":"3496_CR40","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MCOM.2017.1600885","volume":"55","author":"CC Byers","year":"2017","unstructured":"Byers, C.C.: Architectural imperatives for fog computing: use cases, requirements, and architectural techniques for fog-enabled IoT networks. IEEE Commun. Mag. 55(8), 14\u201320 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"3496_CR41","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MIC.2017.36","volume":"21","author":"Z Wen","year":"2017","unstructured":"Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J., Rovatsos, M.: Fog orchestration for internet of things services. IEEE Internet Comput. 21(2), 16\u201324 (2017)","journal-title":"IEEE Internet Comput."},{"key":"3496_CR42","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.jnca.2016.10.013","volume":"81","author":"G Aloi","year":"2017","unstructured":"Aloi, G., Caliciuri, G., Fortino, G., Gravina, R., Pace, P., Russo, W., Savaglio, C.: Enabling IoT interoperability through opportunistic smartphone-based mobile gateways. J. Netw. Comput. Appl. 81, 74\u201384 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"3496_CR43","doi-asserted-by":"crossref","unstructured":"Sarma, B., Kumar, G., Kumar, R. and Tuithung, T.: Fog computing: an enhanced performance analysis emulation framework for IoT with load balancing smart gateway architecture. In: 2019 International Conference on Communication and Electronics Systems (ICCES), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/ICCES45898.2019.9002172"},{"key":"3496_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2793350","author":"J Fu","year":"2018","unstructured":"Fu, J., Liu, Y., Chao, H.C., Bhargava, B., Zhang, Z.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Ind. Inf. (2018). https:\/\/doi.org\/10.1109\/TII.2018.2793350","journal-title":"IEEE Trans. Ind. Inf."},{"key":"3496_CR45","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2363240","author":"KC Okafor","year":"2017","unstructured":"Okafor, K.C., Achumba, I.E., Chukwudebe, G.A., Ononiwu, G.C.: Leveraging fog computing for scalable IoT datacenter using spine-leaf network topology. J. Electr. Comput. Eng. (2017). https:\/\/doi.org\/10.1155\/2017\/2363240","journal-title":"J. Electr. Comput. Eng."},{"key":"3496_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.04.002","author":"B Kang","year":"2017","unstructured":"Kang, B., Choo, H.: An experimental study of a reliable IoT gateway. ICT Express (2017). https:\/\/doi.org\/10.1016\/j.icte.2017.04.002","journal-title":"ICT Express"},{"key":"3496_CR47","doi-asserted-by":"crossref","unstructured":"Gazis, V., G\u00f6rtz, M., Huber, M., Leonardi, A., Mathioudakis, K., Wiesmaier, A., Zeiger, F., Vasilomanolakis, E.: A survey of technologies for the Internet of things. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, pp. 1090\u20131095","DOI":"10.1109\/IWCMC.2015.7289234"},{"key":"3496_CR48","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.comnet.2018.07.020","volume":"143","author":"O Salman","year":"2018","unstructured":"Salman, O., Elhajj, I., Chehab, A., Kayssi, A.: IoT survey: an SDN and fog computing perspective. Comput. Netw. 143, 221\u2013246 (2018)","journal-title":"Comput. Netw."},{"key":"3496_CR49","doi-asserted-by":"crossref","unstructured":"Datta, S.K., Bonnet C., Haerri, J.: Fog computing architecture to enable consumer centric internet of things services. In: 2015 International Symposium on Consumer Electronics (ISCE), Madrid, Spain, p. 1","DOI":"10.1109\/ISCE.2015.7177778"},{"issue":"5","key":"3496_CR50","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1109\/TPDS.2019.2960018","volume":"31","author":"Y Hassanzadeh-Nazarabadi","year":"2019","unstructured":"Hassanzadeh-Nazarabadi, Y., K\u00fcp\u00e7\u00fc, A., Ozkasap, O.: Decentralized utility-and locality-aware replication for heterogeneous DHT-based P2P cloud storage systems. IEEE Trans. Parallel Distrib. Syst. 31(5), 1183\u20131193 (2019)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"3496_CR51","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1007\/s11277-015-2639-0","volume":"87","author":"C Vallati","year":"2016","unstructured":"Vallati, C., Mingozzi, E., Tanganelli, G., Buonaccorsi, N., Valdambrini, N., Zonidis, N., Mart\u00ednez, B., et al.: Betaas: a platform for development and execution of machine-to-machine applications in the internet of things. Wirel. Personal Commun. 87(3), 1071\u20131091 (2016)","journal-title":"Wirel. Personal Commun."},{"key":"3496_CR52","doi-asserted-by":"crossref","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K.E., Kim, B.-G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964\u2013975 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"3496_CR53","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/COMST.2017.2771153","volume":"20","author":"C Mouradian","year":"2017","unstructured":"Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R.H., Morrow, M.J., Polakos, P.A.: A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 20(1), 416\u2013464 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"3496_CR54","first-page":"48","volume":"8","author":"S Agarwal","year":"2016","unstructured":"Agarwal, S., Yadav, S., Yadav, A.K.: An efficient architecture and algorithm for resource provisioning in fog computing. Int. J. Inf. Eng. Electron. Bus. 8(1), 48\u201361 (2016)","journal-title":"Int. J. Inf. Eng. Electron. Bus."},{"issue":"2","key":"3496_CR55","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCC.2017.25","volume":"4","author":"A Kapsalis","year":"2017","unstructured":"Kapsalis, A., Kasnesis, P., Venieris, I.S., Kaklamani, D.I., Patrikakis, C.Z.: A cooperative fog approach for effective workload balancing. IEEE Cloud Comput. 4(2), 36\u201345 (2017)","journal-title":"IEEE Cloud Comput."},{"key":"3496_CR56","first-page":"271","volume-title":"Proceedings of the IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus","author":"V Cardellini","year":"2015","unstructured":"Cardellini, V., Grassi, V., Presti, F.L., Nardelli, M.: On QoS-aware scheduling of data stream applications over fog computing infrastructures. In: Proceedings of the IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, pp. 271\u2013276. IEEE, Piscataway (2015)"},{"key":"3496_CR57","doi-asserted-by":"crossref","unstructured":"Krishnan, Y.N., Bhagwat, C.N., Utpat, A.P.: Fog computing\u2014network based cloud computing. In: Proc. 2nd Int. Conf. Electron. Commun. Syst. (ICECS), Coimbatore, India, pp. 250\u2013251. (2015)","DOI":"10.1109\/ECS.2015.7124902"},{"key":"3496_CR58","doi-asserted-by":"crossref","unstructured":"Slabicki M., Grochla, K.: Performance evaluation of CoAP, SNMP and NETCONF protocols in fog computing architecture. In: Proc. IEEE\/IFIP Netw. Oper. Manag. Symp. (NOMS), Istanbul, Turkey, pp. 1315\u20131319. (2016)","DOI":"10.1109\/NOMS.2016.7503010"},{"key":"3496_CR59","doi-asserted-by":"crossref","unstructured":"Giang, N.K., Blackstock, M., Lea, R., Leung, V.C.M., Developing IoT applications in the fog: a distributed dataflow approach. In: Proc. 5th Int. Conf. Internet Things (IOT), Seoul, South Korea, pp. 155\u2013162. (2015)","DOI":"10.1109\/IOT.2015.7356560"},{"key":"3496_CR60","doi-asserted-by":"crossref","unstructured":"Hong, K., Lillethun, D., Ramachandran, U., Ottenw\u00e4lder, B., Koldehofe, B.: Mobile fog: a programming model for large-scale applications on the Internet of Things. In: Proc. 2nd ACM SIGCOMM Workshop Mobile Cloud Comput., Hong Kong, pp. 15\u201320. (2013)","DOI":"10.1145\/2491266.2491270"},{"key":"3496_CR61","doi-asserted-by":"crossref","unstructured":"Yangui, S. et al.: A platform as-a-service for hybrid cloud\/fog environments. In: Proc. IEEE int. Symp. Local Metropolitan Area Netw. (LANMAN), Rome, Italy, pp. 1\u20137. (2016)","DOI":"10.1109\/LANMAN.2016.7548853"},{"issue":"5","key":"3496_CR62","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2015.122","volume":"48","author":"M Zhanikeev","year":"2015","unstructured":"Zhanikeev, M.: A cloud visitation platform to facilitate cloud federation and fog computing. Computer 48(5), 80\u201383 (2015)","journal-title":"Computer"},{"issue":"2","key":"3496_CR63","first-page":"121","volume":"185","author":"V Stantchev","year":"2015","unstructured":"Stantchev, V., Barnawi, A., Ghulam, S., Schubert, J., Tamm, G.: Smart items, fog and cloud computing as enablers of servitization in healthcare. Sens. Transducers 185(2), 121\u2013128 (2015)","journal-title":"Sens. Transducers"},{"key":"3496_CR64","doi-asserted-by":"crossref","unstructured":"Gia, T.N., et al.: Fog computing in healthcare internet of things: a case study on ECG feature extraction. In: Proc. IEEE int. Conf. Comput. Inf. Technol. Ubiquitous comput. Commun. Depend. Auton. Secure Comput. Pervasive Intell. Comput. (CIT\/IUCC\/DASC\/PICOM), pp. 356\u2013363. (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.51"},{"key":"3496_CR65","doi-asserted-by":"crossref","unstructured":"Zao, J.K. et al.: Augmented brain computer interaction based on fog computing and linked data. In: Proc. int. Conf. Intell. Environ. (IE), Shanghai, China, pp. 374\u2013377. (2014)","DOI":"10.1109\/IE.2014.54"},{"key":"3496_CR66","doi-asserted-by":"crossref","unstructured":"Fratu, O., Pena, C., Craciunescu, R., Halunga, S.: Fog computing system for monitoring mild dementia and COPD patients\u2014Romanian case study. In: Proc. 12th INT. CONF. TELECOMMUN. Modern Satellite Cable Broadcast. Services (SIKS), Ni\u0161, Serbia, pp. 123\u2013128. (2015)","DOI":"10.1109\/TELSKS.2015.7357752"},{"key":"3496_CR67","doi-asserted-by":"crossref","unstructured":"Masip-Bruin, X., Mar\u00edn-Tordera, E., Alonso, A., Garcia, J.: Fog-to-cloud computing (F2C): the key technology enabler for dependable e-health services deployment. In: Proc. Mediterranean ad hoc netw. Workshop (Med Hoc Net), pp. 1\u20135. (2016)","DOI":"10.1109\/MedHocNet.2016.7528425"},{"key":"3496_CR68","doi-asserted-by":"crossref","unstructured":"Monteiro, A., Dubey, H., Mahler, L., Yang, Q., Mankodiya, K.: Fit: a fog computing device for speech tele-treatments. In: Proc. IEEE Int. Conf. Smart Comput. (SMARTCOMP), St. Louis, MO, USA, pp. 1\u20133. (2016)","DOI":"10.1109\/SMARTCOMP.2016.7501692"},{"key":"3496_CR69","doi-asserted-by":"crossref","unstructured":"Dubey, H. et al.: Fog data: enhancing telehealth big data through fog computing, In: Proc. ASE BigData Soc. Informat., New York, NY, USA, pp. 1\u20136. (2015)","DOI":"10.1145\/2818869.2818889"},{"issue":"6","key":"3496_CR70","doi-asserted-by":"crossref","first-page":"3860","DOI":"10.1109\/TVT.2016.2532863","volume":"65","author":"X Hou","year":"2016","unstructured":"Hou, X., et al.: Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans. Veh. Technol. 65(6), 3860\u20133873 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"3496_CR71","doi-asserted-by":"crossref","unstructured":"Truong, N.B., Lee, G.M., Ghamri-Doudane, Y.: Software defined networking-based vehicular adhoc network with fog computing. In: Proc. IFIP\/IEEE Int. Symp. Integr. Netw. Manag. (IM), Ottawa, ON, Canada, pp. 1202\u20131207. (2015)","DOI":"10.1109\/INM.2015.7140467"},{"key":"3496_CR72","doi-asserted-by":"crossref","unstructured":"Li, J., Jin, J., Yuan, D., Palaniswami, M., Moessner, K.: EHOPES: data-centered fog platform for smart living. In: Proc. Int. Telecommun. Netw. Appl. Conf. (ITNAC), Sydney, NSW, Australia, pp. 308\u2013313. (2015)","DOI":"10.1109\/ATNAC.2015.7366831"},{"key":"3496_CR73","doi-asserted-by":"crossref","unstructured":"Brzoza-Woch, R., Konieczny, M., Nawrocki, P., Szydlo, T., Zielinski, K.: Embedded systems in the application of fog computing\u2014levee monitoring use case. In: Proc. 11th IEEE Symp. Ind. Embedded Syst. (SIES), Krak\u00f3w, Poland, pp. 1\u20136. (2016)","DOI":"10.1109\/SIES.2016.7509437"},{"key":"3496_CR74","doi-asserted-by":"crossref","unstructured":"Aazam, M., Huh, E.-N., E-HAMC: leveraging fog computing for emergency alert service. In: Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops (PerCom Workshops), St. Louis, MO, USA, pp. 518\u2013523. (2015)","DOI":"10.1109\/PERCOMW.2015.7134091"},{"key":"3496_CR75","doi-asserted-by":"crossref","unstructured":"Gazis, V. et al.: Components of fog computing in an industrial internet of things context. In: Proc. 12th Annu. IEEE Int. Conf. Sens. Commun. Netw. Workshops (SECON Workshops), Seattle, WA, USA, pp. 1\u20136. (2015)","DOI":"10.1109\/SECONW.2015.7328144"},{"key":"3496_CR76","doi-asserted-by":"crossref","unstructured":"Xu, Y., Mahendran, V., Radhakrishnan, S.: Towards SDN-based fog computing: MQTT broker virtualization for effective and reliable delivery. In: Proc. 8th Int. Conf. Commun. Syst. Netw. (COMSNETS), Bengaluru, India, pp. 1\u20136. (2016)","DOI":"10.1109\/COMSNETS.2016.7439974"},{"key":"3496_CR77","first-page":"355","volume-title":"Towards a Pan-European Telecommunication Service Infrastructure\u2014IS&N \u201994","author":"H Berndt","year":"1994","unstructured":"Berndt, H., Graubmann, P., Wakano, M.: Service specification concepts in TINA-C. In: Kugler, H.-J., Mullery, A., Niebert, N. (eds.) Towards a Pan-European Telecommunication Service Infrastructure\u2014IS&N \u201994, pp. 355\u2013366. Springer, Heidelberg (1994)"},{"issue":"3","key":"3496_CR78","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1007\/s11277-015-2779-2","volume":"87","author":"S Kyriazakos","year":"2016","unstructured":"Kyriazakos, S., et al.: eWALL: An intelligent caring home environment offering personalized context-aware applications based on advanced sensing. Wirel. Pers. Commun. 87(3), 1093\u20131111 (2016)","journal-title":"Wirel. Pers. Commun."},{"key":"3496_CR79","doi-asserted-by":"crossref","unstructured":"Abedin, S.F., Alam, M.G.R., Tran, N.H., Hong, C.S.: A fog based system model for cooperative IoT node pairing using matching theory. In: Proc. 17th Asia\u2013Pac. Netw. Oper. Manag. Symp. (APNOMS), Busan, South Korea, pp. 309\u2013314. (2015)","DOI":"10.1109\/APNOMS.2015.7275445"},{"key":"3496_CR80","doi-asserted-by":"crossref","unstructured":"Nishio, T., Shinkuma, R., Takahashi, T., Mandayam, N.B., Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud. In: Proc. 1st Int. Workshop Mobile Cloud Comput. Netw., Bengaluru, India, pp. 19\u201326. (2013)","DOI":"10.1145\/2492348.2492354"},{"issue":"12","key":"3496_CR81","doi-asserted-by":"crossref","first-page":"3702","DOI":"10.1109\/TC.2016.2536019","volume":"65","author":"D Zeng","year":"2016","unstructured":"Zeng, D., Gu, L., Guo, S., Cheng, Z., Yu, S.: Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system. IEEE Trans. Comput. 65(12), 3702\u20133712 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"3496_CR82","unstructured":"Intharawijitr, K., Iida, K., Koga, H.: Analysis of fog model considering computing and communication latency in 5G cellular networks. In: Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops (PerCom Workshops), Sydney, NSW, Australia, pp. 1\u20134."},{"issue":"3","key":"3496_CR83","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/CC.2016.7445510","volume":"13","author":"S Ningning","year":"2016","unstructured":"Ningning, S., Chao, G., Xingshuo, A., Qiang, Z.: Fog computing dynamic load balancing mechanism based on graph repartitioning. China Commun. 13(3), 156\u2013164 (2016)","journal-title":"China Commun."},{"issue":"4","key":"3496_CR84","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCOM.2017.1600894","volume":"55","author":"S Li","year":"2017","unstructured":"Li, S., Maddah-Ali, M.A., Avestimehr, A.S.: Coding for distributed fog computing. IEEE Commun. Mag. 55(4), 34\u201340 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"3496_CR85","unstructured":"Do, C.T. et al.: A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing. In: Proc. Int. Conf. Inf. Netw. (ICOIN), pp. 324\u2013329."},{"key":"3496_CR86","doi-asserted-by":"crossref","unstructured":"Chen, D., Schedler, S., Kuehn, V.: Backhaul traffic balancing and dynamic content-centric clustering for the downlink of fog radio access network. In: Proc. IEEE 17th Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC), Edinburgh, U.K., pp. 1\u20135. (2016)","DOI":"10.1109\/SPAWC.2016.7536735"},{"issue":"2","key":"3496_CR87","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1049\/iet-net.2015.0034","volume":"5","author":"S Sarkar","year":"2016","unstructured":"Sarkar, S., Misra, S.: Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. IET Netw. 5(2), 23\u201329 (2016)","journal-title":"IET Netw."},{"key":"3496_CR88","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/TCC.2015.2485206","volume":"6","author":"S Sarkar","year":"2015","unstructured":"Sarkar, S., Chatterjee, S., Misra, S.: Assessment of the suitability of fog computing in the context of Internet of Things. IEEE Trans. Cloud Comput. 6, 46\u201359 (2015)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"3496_CR89","doi-asserted-by":"crossref","unstructured":"Deng, R., Lu, R., Lai, C., Luan, T.H.: Towards power consumption delay tradeoff by workload allocation in cloud-fog computing. In: Proc. IEEE Int. Conf. Commun. (ICC), London, U.K., pp. 3909\u20133914. (2015)","DOI":"10.1109\/ICC.2015.7248934"},{"issue":"1","key":"3496_CR90","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/TETC.2015.2508382","volume":"5","author":"L Gu","year":"2017","unstructured":"Gu, L., Zeng, D., Guo, S., Barnawi, A., Xiang, Y.: Cost efficient resource management in fog computing supported medical cyber-physical system. IEEE Trans. Emerg. Top. Comput. 5(1), 108\u2013119 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"3496_CR91","unstructured":"Cao, Y., Chen, S., Hou, P., Brown, D.: FAST: a fog computing assisted distributed analytics system to monitor fall for stroke mitigation. In: Proc. IEEE Int. Conf. Netw. Archit. Storage (NAS), Boston, MA, USA, pp. 2\u201311. (2015)"},{"key":"3496_CR92","doi-asserted-by":"crossref","unstructured":"Mei, B., Cheng, W., Cheng, X.: Fog computing based ultraviolet radiation measurement via smartphones. In: Proc. 3rd IEEE Workshop Hot Topics Web Syst. Technol. (HotWeb), Washington, DC, USA, pp. 79\u201384. (2015)","DOI":"10.1109\/HotWeb.2015.16"},{"key":"3496_CR93","unstructured":"Kim, O.T.T., Tri, N.D., Nguyen, V.D., Tran, N.H., Hong, C.S.: A shared parking model in vehicular network using fog and cloud environment. In: Proc. 17th Asia\u2013Pac. Netw. Oper. Manag. Symp. (APNOMS), Busan, South Korea, pp. 321\u2013326. (2015)"},{"key":"3496_CR94","doi-asserted-by":"crossref","unstructured":"Lin Y., Shen, H.: Cloud fog: towards high quality of experience in cloud gaming. In: Proc. 44th Int. Conf. Parallel Process., Beijing, China, pp. 500\u2013509. (2015)","DOI":"10.1109\/ICPP.2015.59"},{"issue":"4","key":"3496_CR95","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MCOM.2017.1600830","volume":"55","author":"M Tang","year":"2017","unstructured":"Tang, M., Gao, L., Pang, H., Huang, J., Sun, L.: Optimizations and economics of crowdsourced mobile streaming. IEEE Commun. Mag. 55(4), 21\u201327 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"3496_CR96","doi-asserted-by":"crossref","unstructured":"Fuerst, A., Ali-Eldin, A., Shenoy, P., Sharma, P.: Cloud-scale VM deflation for running interactive applications on transient servers.\u00a0(2020). arXiv preprint arXiv:2006.00508","DOI":"10.1145\/3369583.3392675"},{"key":"3496_CR97","doi-asserted-by":"crossref","unstructured":"Terp\u00e1k, J., Horov\u010d\u00e1k, P., Luk\u00e1\u010d, M.: Mathematical models creation using orchestration and choreography of web services. In: 2016 17th International Carpathian Control Conference (ICCC), pp. 739\u2013742. IEEE (2016)","DOI":"10.1109\/CarpathianCC.2016.7501193"},{"issue":"2","key":"3496_CR98","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"TR Gruber","year":"1993","unstructured":"Gruber, T.R.: A translation approach to portable ontology specifications. Knowl. Acquis. 5(2), 199\u2013220 (1993)","journal-title":"Knowl. Acquis."},{"key":"3496_CR99","doi-asserted-by":"crossref","unstructured":"Yongsiriwit, K., Sellami, M., Gaaloul, W.: A semantic framework supporting cloud resource descriptions interoperability. In: Proc. IEEE 9th Int. Conf. Cloud Comput. (CLOUD), San Francisco, CA, USA, pp. 585\u2013592. (2016)","DOI":"10.1109\/CLOUD.2016.0083"},{"key":"3496_CR100","doi-asserted-by":"crossref","unstructured":"Raza, M.R., Varol, A.: QoS parameters for viable SLA in cloud. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS), pp. 1\u20135. IEEE (2020)","DOI":"10.1109\/ISDFS49300.2020.9116311"},{"key":"3496_CR101","doi-asserted-by":"crossref","unstructured":"Zaheer, F.-E., Xiao, J., Boutaba, R.: Multi-provider service negotiation and contracting in network virtualization. In: Proc. IEEE Netw. Oper. Manag. Symp. (NOMS), Osaka, Japan, pp. 471\u2013478. (2010)","DOI":"10.1109\/NOMS.2010.5488487"},{"key":"3496_CR102","unstructured":"Delta Cloud. Delta Cloud-Many Clouds. One Api. No Problem.[Online]. Available: https:\/\/deltacloud.apache.org\/. Accessed 28 Feb 2017"},{"key":"3496_CR103","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1093\/comjnl\/bxu132","volume":"59","author":"S Yangui","year":"2014","unstructured":"Yangui, S., Tata, S.: An OCCI compliant model for PaaS resources description and provisioning. Comput. J. 59, 308\u2013324 (2014)","journal-title":"Comput. J."},{"key":"3496_CR104","doi-asserted-by":"crossref","unstructured":"Sellami, R., Vedrine, M., Bhiri, S., Defude, B.: Automating resources discovery for multiple data stores cloud applications. In: Proc. 5th Int. Conf. Cloud Comput. Services Sci. (CLOSER), Lisbon, Portugal, pp. 397\u2013405. (2015)","DOI":"10.5220\/0005446103970405"},{"issue":"1","key":"3496_CR105","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/COMST.2015.2491361","volume":"18","author":"D Naboulsi","year":"2016","unstructured":"Naboulsi, D., Fiore, M., Ribot, S., Stanica, R.: Large-scale mobile traffic analysis: a survey. IEEE Commun. Surv. Tutor. 18(1), 124\u2013161 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3496_CR106","doi-asserted-by":"crossref","unstructured":"Dhole, A., Thomas, M.V., Chandrasekaran, K.: An efficient trust-based game-theoretic approach for cloud federation formation. In: Proc. 3rd Int. Conf. Adv. Comput. Commun. Syst. (ICACCS), vol. 1. Coimbatore, India, pp. 1\u20136. (2016)","DOI":"10.1109\/ICACCS.2016.7586330"},{"issue":"10","key":"3496_CR107","doi-asserted-by":"crossref","first-page":"1973","DOI":"10.3390\/app9101973","volume":"9","author":"J-S Pan","year":"2019","unstructured":"Pan, J.-S., Dao, T.-K.: A compact bat algorithm for unequal clustering in wireless sensor networks. Appl. Sci. 9(10), 1973 (2019)","journal-title":"Appl. Sci."},{"key":"3496_CR108","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.jnca.2019.04.014","volume":"138","author":"S Mondal","year":"2019","unstructured":"Mondal, S., Das, G., Wong, E.: Cost-optimal cloudlet placement frameworks over fiber-wireless access networks for low-latency applications. J. Netw. Comput. Appl. 138, 27\u201338 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"3496_CR109","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09491-1","author":"M Ghobaei-Arani","year":"2019","unstructured":"Ghobaei-Arani, M., Souri, A., Rahmanian, A.A.: Resource management approaches in fog computing: a comprehensive review. J. Grid Comput. (2019). https:\/\/doi.org\/10.1007\/s10723-019-09491-1","journal-title":"J. Grid Comput."},{"issue":"4","key":"3496_CR110","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1109\/TNSM.2016.2592241","volume":"13","author":"S Secci","year":"2016","unstructured":"Secci, S., Raad, P., Gallard, P.: Linking virtual machine mobility to user mobility. IEEE Trans. Netw. Serv. Manage. 13(4), 927\u2013940 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"5","key":"3496_CR111","doi-asserted-by":"crossref","first-page":"1728","DOI":"10.1109\/JSAC.2016.2545559","volume":"34","author":"F Jalali","year":"2016","unstructured":"Jalali, F., Hinton, K., Ayre, R., Alpcan, T., Tucker, R.S.: Fog computing may help to save energy in cloud computing. IEEE J. Sel. Areas Commun. 34(5), 1728\u20131739 (2016)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"3496_CR112","unstructured":"OpenFog Consortium. https:\/\/www.openfogconsortium.org. Accessed Oct 2020"},{"issue":"8","key":"3496_CR113","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/CC.2015.7224698","volume":"12","author":"J Su","year":"2015","unstructured":"Su, J., Lin, F., Zhou, X., Lu, X.: Steiner tree based optimal resource caching scheme in fog computing. China Commun. 12(8), 161\u2013168 (2015)","journal-title":"China Commun."},{"issue":"9","key":"3496_CR114","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MC.2020.2996212","volume":"53","author":"O Bouachir","year":"2020","unstructured":"Bouachir, O., et al.: Blockchain and fog computing for cyberphysical systems: the case of smart industry. Computer 53(9), 36\u201345 (2020). https:\/\/doi.org\/10.1109\/MC.2020.2996212","journal-title":"Computer"},{"key":"3496_CR115","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/978-981-13-2285-3_50","volume-title":"Emerging Trends in Expert Applications and Security","author":"K Lakhwani","year":"2019","unstructured":"Lakhwani, K., Gianey, H., Agarwal, N., Gupta, S.: Development of IoT for smart agriculture a review. In: Emerging Trends in Expert Applications and Security, pp. 425\u2013432. Springer, Singapore (2019)"},{"key":"3496_CR116","doi-asserted-by":"crossref","first-page":"554","DOI":"10.3389\/fpls.2019.00554","volume":"10","author":"Q Qiu","year":"2019","unstructured":"Qiu, Q., Sun, Na., Bai, He., Wang, N., Fan, Z., Wang, Y., Meng, Z., Li, B., Cong, Y.: Field-based high-throughput phenotyping for Maize plant using 3D LiDAR point cloud generated with a \u201cPhenomobile.\u201d Front. Plant Sci. 10, 554 (2019)","journal-title":"Front. Plant Sci."},{"key":"3496_CR117","first-page":"50","volume-title":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","author":"ZH Soh","year":"2019","unstructured":"Soh, Z.H., Husa, M.A., Abdullah, S.A., Shafie, M.A.: Smart waste collection monitoring and alert system via IoT. In: 2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE), pp. 50\u201354. IEEE, Piscataway (2019)"},{"issue":"6","key":"3496_CR118","first-page":"1171","volume":"3","author":"R Deng","year":"2016","unstructured":"Deng, R., Lu, R., Lai, C., Luan, T.H., Liang, H.: Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet Things J. 3(6), 1171\u20131181 (2016)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"3496_CR119","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/MWC.2019.1800440","volume":"26","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Chen, H., Zhao, Y., Ma, Z., Xu, Y., Huang, H., Yin, H., Wu, D.O.: Improving cloud gaming experience through mobile edge computing. IEEE Wirel. Commun. 26(4), 178\u2013183 (2019)","journal-title":"IEEE Wirel. Commun."},{"key":"3496_CR120","unstructured":"GamingAnywhere. http:\/\/gaminganywhere.org\/. Accessed 20 Mar 2017"},{"key":"3496_CR121","unstructured":"ETSI\u2013Intelligent Transport. http:\/\/www.etsi.org\/technologies-clusters\/technologies\/intelligent-transport. Accessed 20 Mar 2017"},{"key":"3496_CR122","first-page":"100213","volume":"22","author":"V Kumar","year":"2020","unstructured":"Kumar, V., Ahmad, M., Mishra, D., Kumari, S., Khan, M.K.: RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Veh. Commun. 22, 100213 (2020)","journal-title":"Veh. Commun."},{"key":"3496_CR123","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/TCC.2016.2551747","volume":"7","author":"M Shojafar","year":"2016","unstructured":"Shojafar, M., Cordeschi, N., Baccarelli, E.: Energy-efficient adaptive resource management for real-time vehicular cloud services. IEEE Trans. Cloud Comput. 7, 196\u2013209 (2016)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"3496_CR124","doi-asserted-by":"crossref","unstructured":"Giang, N.K., Leung, V.C., Lea, R.: On developing smart transportation applications in fog computing paradigm. In: Proc. 6th ACM Symp. Develop. Anal. Intell. Veh. Netw. Appl. (DIVANet), pp. 91\u201398. (2016)","DOI":"10.1145\/2989275.2989286"},{"issue":"2","key":"3496_CR125","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/JIOT.2015.2471260","volume":"3","author":"MA Al Faruque","year":"2016","unstructured":"Al Faruque, M.A., Vatanparvar, K.: Energy management-as-a-service over fog computing platform. IEEE Internet Things J. 3(2), 161\u2013169 (2016)","journal-title":"IEEE Internet Things J."},{"key":"3496_CR126","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.jss.2019.04.058","volume":"154","author":"SS Gill","year":"2019","unstructured":"Gill, S.S., Garraghan, P., Buyya, R.: ROUTER: fog enabled cloud based intelligent resource management approach for smart home IoT devices. J. Syst. Softw. 154, 125\u2013138 (2019)","journal-title":"J. Syst. Softw."},{"key":"3496_CR127","doi-asserted-by":"crossref","first-page":"7004","DOI":"10.1109\/TII.2019.2952412","volume":"16","author":"R Mahmud","year":"2019","unstructured":"Mahmud, R., Toosi, A.N., Ramamohanarao, K., Buyya, R.: Context-aware placement of industry 4.0 applications in fog computing environments. IEEE Trans. Ind. Inform. 16, 7004\u20137013 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"3496_CR128","doi-asserted-by":"crossref","unstructured":"Mukherjee, M., Shu, L., Wang, D., Li, K., Chen, Y.: Poster abstract: a fog computing-based framework to reduce traffic overhead in large-scale industrial applications. In: Proc. IEEE INFOCOM, Atlanta, GA, USA, pp. 1\u20132. (2017)","DOI":"10.1109\/INFCOMW.2017.8116534"},{"key":"3496_CR129","doi-asserted-by":"crossref","unstructured":"Bruneo, D. et al.: Stack4Things as a fog computing platform for smart city applications. In: Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, pp. 848\u2013853. (2016)","DOI":"10.1109\/INFCOMW.2016.7562195"},{"issue":"4","key":"3496_CR130","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3390\/jsan9040059","volume":"9","author":"F De Vita","year":"2020","unstructured":"De Vita, F., Bruneo, D.: Leveraging Stack4Things for federated learning in intelligent cyber physical systems. J. Sens. Actuator Netw. 9(4), 59 (2020)","journal-title":"J. Sens. Actuator Netw."},{"key":"3496_CR131","doi-asserted-by":"crossref","unstructured":"Chen, N., Chen, Y., Song, S., Huang, C.-T., Ye, X.: Poster abstract: Smart urban surveillance using fog computing. In: Proc. IEEE\/ACM Symp. Edge Comput. (SEC), pp. 95\u201396. (2016)","DOI":"10.1109\/SEC.2016.25"},{"key":"3496_CR132","volume-title":"V2V Influence on M2M and H2H Traffics During Emergency Scenarios","author":"AH El Fawal","year":"2019","unstructured":"El Fawal, A.H., Mansour, A., Najem, M.: V2V Influence on M2M and H2H Traffics During Emergency Scenarios. IGI Global, Hershey (2019)"},{"key":"3496_CR133","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compeleceng.2018.08.015","volume":"72","author":"A Kumari","year":"2018","unstructured":"Kumari, A., Tanwar, S., Tyagi, S., Kumar, N.: Fog computing for healthcare 4.0 environment: opportunities and challenges. Comput. Electr. Eng. 72, 1\u201313 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"3496_CR134","doi-asserted-by":"crossref","unstructured":"Vora, J., Tanwar, S., Tyagi, S., Kumar, N., Rodrigues, J.J.P.C.: FAAL: fog computing-based patient monitoring system for ambient assisted living. In: Proceedings of the IEEE 19th International Conference on E-health Networking, Applications and Services (Healthcom), pp. 1\u20136. (2017)","DOI":"10.1109\/HealthCom.2017.8210825"},{"key":"3496_CR135","doi-asserted-by":"crossref","first-page":"21","DOI":"10.3390\/s19010021","volume":"19","author":"F Wu","year":"2018","unstructured":"Wu, F., Wu, T., Yuce, M.: An internet-of-things (IoT) network system for connected safety and health monitoring applications. Sensors 19, 21 (2018)","journal-title":"Sensors"},{"key":"3496_CR136","doi-asserted-by":"crossref","unstructured":"Ullah, U., Sehr, I., Akbar, M., Ning, H.: FoG assisted secure de-duplicated data dissemination in smart healthcare IoT. In: Proc. IEEE Int. Conf. Smart Internet Things (SmartIoT), Xi\u2019an, China, pp. 166\u2013171. (2018)","DOI":"10.1109\/SmartIoT.2018.00038"},{"key":"3496_CR137","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1016\/j.future.2017.02.014","volume":"78","author":"AM Rahmani","year":"2018","unstructured":"Rahmani, A.M., et al.: Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Future Gener. Comput. Syst. 78, 641\u2013658 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"3496_CR138","unstructured":"Siddique, A., Hasan, O., Khalid, F., Shafique, M.: ApproxCS: near-sensor approximate compressed sensing for IoT-healthcare systems. (2018). arXiv: 1811.07330v1."},{"key":"3496_CR139","doi-asserted-by":"crossref","unstructured":"Rias, R.N.B., Akbar, M.S., Aazam, M.: Fog-supported internet of things (IoTs) architecture for remote patient monitoring systems using wireless body area sensor networks. In: Proc. IEEE DASC\/PiCom\/DataCom\/CyberSciTech, Athens, Greece, pp. 462\u2013466. (2018)","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00092"},{"key":"3496_CR140","doi-asserted-by":"crossref","unstructured":"Jangra, P., Gupta, M.: A design of real-time ulti-layered smart healthcare monitoring framework using IoT. In: Proc. Int. Conf. Intell. Adv. Syst. (ICIAS), Kuala Lumpur, Malaysia, pp. 1\u20135. (2018)","DOI":"10.1109\/ICIAS.2018.8540606"},{"key":"3496_CR141","doi-asserted-by":"crossref","first-page":"32258","DOI":"10.1109\/ACCESS.2018.2846609","volume":"6","author":"T Muhammed","year":"2018","unstructured":"Muhammed, T., Mehmood, R., Albeshri, A., Katib, I.: UbeHealth: a personalized ubiquitous cloud and edge-enabled networked healthcare system for smart cities. IEEE Access 6, 32258\u201332285 (2018)","journal-title":"IEEE Access"},{"key":"3496_CR142","doi-asserted-by":"crossref","unstructured":"George, A., Dhanasekaran, H., Chittiappa, J.P., Challagundla, L.A., Nikkam, S.S., Abuzaghleh, O., Internet of things in health care using fog computing. In: Proc. IEEE Long Island Syst. Appl. Technol. Conf. (LISAT), Farmingdale, NY, USA, pp. 1\u20136. (2018)","DOI":"10.1109\/LISAT.2018.8378012"},{"key":"3496_CR143","doi-asserted-by":"crossref","unstructured":"Azimi, I., Takalo-Mattila, J., Azanpour, A., Rahmani, A.M., Soininen, J., Liljeberg, P.: Empowering healthcare IoT systems with hierarchical edge-based deep learning. In: Proc. IEEE\/ACM Int. Conf. Connected Health Appl. Syst. Eng. Technol. (CHASE), Washington DC, USA, pp. 63\u201368. (2018)","DOI":"10.1145\/3278576.3278597"},{"key":"3496_CR144","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103635","author":"H Elayan","year":"2021","unstructured":"Elayan, H., Aloqaily, M., Guizani, M.: Sustainability of healthcare data analysis IoT-based systems using deep federated learning. IEEE Internet of Things J. (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3103635","journal-title":"IEEE Internet of Things J."},{"issue":"3","key":"3496_CR145","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MWC.001.2000345","volume":"28","author":"V Hayyolalam","year":"2021","unstructured":"Hayyolalam, V., Aloqaily, M., \u00d6zkasap, \u00d6., Guizani, M.: Edge intelligence for empowering IoT-based healthcare systems. IEEE Wirel. Commun. 28(3), 6\u201314 (2021). https:\/\/doi.org\/10.1109\/MWC.001.2000345","journal-title":"IEEE Wirel. Commun."},{"key":"3496_CR146","doi-asserted-by":"crossref","unstructured":"Peralta, G., Iglesias-Urkia, M., Barcelo, M., Gomez, R., Moran, A., Bilbao, J.: Fog computing based efficient iot scheme for the industry 4.0. In: Proceedings of the IEEE International Workshop of Electronics, Control, Measurement, Signals and Their Application to Mechatronics (ECMSM), pp. 1\u20136. (2017)","DOI":"10.1109\/ECMSM.2017.7945879"},{"key":"3496_CR147","doi-asserted-by":"crossref","unstructured":"Akrivopoulos, O., Chatzigiannakis, I., Tselios, C., Antoniou, A.: On the deployment of healthcare applications over fog computing infrastructure. In: Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), pp. 288\u201393. (2017)","DOI":"10.1109\/COMPSAC.2017.178"},{"key":"3496_CR148","unstructured":"He, D., Kumar, N., Wang, H., Wang, L., Choo, K.K.R., Vinel, A.: A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. In: Proceedings of the IEEE Transactions on Dependable and Secure Computing, pp. 1\u20132. (2016)"},{"issue":"3","key":"3496_CR149","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/3382770","volume":"21","author":"M Al-Khafajiy","year":"2021","unstructured":"Al-Khafajiy, M., Otoum, S., Baker, T., Asim, M., Maamar, Z., Aloqaily, M., Taylor, M., Randles, M.: Intelligent control and security of fog resources in healthcare systems via a cognitive fog model. ACM Trans. Internet Technol. 21(3), 23 (2021). https:\/\/doi.org\/10.1145\/3382770","journal-title":"ACM Trans. Internet Technol."},{"key":"3496_CR150","doi-asserted-by":"crossref","first-page":"8418","DOI":"10.1109\/ACCESS.2016.2631546","volume":"4","author":"AM Elmisery","year":"2016","unstructured":"Elmisery, A.M., Rho, S., Botvich, D.: A fog based middleware for automated compliance with OECD privacy principles in internet of healthcare things. IEEE Access 4, 8418\u20138441 (2016)","journal-title":"IEEE Access"},{"key":"3496_CR151","doi-asserted-by":"crossref","unstructured":"Tasic, J., Gusev, M., Ristov, S.: A medical cloud. In: Proceedings of the 9th international convention on information and communication technology, electronics and microelectronics (MIPRO), p. 400\u2013405. (2016)","DOI":"10.1109\/MIPRO.2016.7522176"},{"key":"3496_CR152","doi-asserted-by":"crossref","unstructured":"Ramalho, F., Neto, A., Santos, K., Filho, J.B., Agoulmine, N.: Enhancing e-health smart applications: a fog-enable. In: Proc. 17th HealthCom, Boston, MA, USA, pp. 323\u2013328. (2015)","DOI":"10.1109\/HealthCom.2015.7454519"},{"key":"3496_CR153","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.compeleceng.2016.08.012","volume":"61","author":"O Anya","year":"2017","unstructured":"Anya, O., Tawfik, H.: Designing for practice-based context-awareness in ubiquitous e-health environments. Comput. Electr. Eng. 61, 312\u2013326 (2017)","journal-title":"Comput. Electr. Eng."},{"issue":"8","key":"3496_CR154","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MC.2016.245","volume":"49","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet of things realize its potential. Computers 49(8), 112\u2013116 (2016)","journal-title":"Computers"},{"key":"3496_CR155","doi-asserted-by":"crossref","unstructured":"Ni, J., Lin, X., Zhang, K., Shen, X.: Privacy-preserving real-time navigation system using vehicular crowdsourcing. In: Proc. IEEE VTC Fall, Montreal, QC, Canada, pp. 1\u20135. (2016)","DOI":"10.1109\/VTCFall.2016.7881177"},{"key":"3496_CR156","unstructured":"Gupta, H., Nath, S.B., Chakraborty, S., Ghosh, S.K.: SDFog: a software defined computing architecture for QoS aware service orchestration over edge devices. ArXiv Preprint, Tech. Rep. (2017). https:\/\/arxiv.org\/pdf\/1609.01190.pdf"},{"issue":"5","key":"3496_CR157","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MC.2016.145","volume":"49","author":"W Shi","year":"2016","unstructured":"Shi, W., Dustdar, S.: The promise of edge computing. Computers 49(5), 78\u201381 (2016)","journal-title":"Computers"},{"key":"3496_CR158","unstructured":"Zhang, T.: Fog boosts capabilities to add more things securely to the internet, Cisco Blogs, San Jose, CA, USA (2016)"},{"key":"3496_CR159","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.future.2016.09.015","volume":"70","author":"E Ahmed","year":"2017","unstructured":"Ahmed, E., Rehmani, M.H.: Mobile edge computing: opportunities, solutions, and challenges. Future Gener. Comput. Syst. 70, 59\u201363 (2017)","journal-title":"Future Gener. Comput. Syst."},{"key":"3496_CR160","unstructured":"Zhang, T.: Malware defense is a team sport, best played by collaborative fog nodes, Cisco Blogs, San Jose, CA, USA (2016)"},{"issue":"5","key":"3496_CR161","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"3496_CR162","doi-asserted-by":"crossref","first-page":"4924","DOI":"10.1109\/TWC.2017.2703901","volume":"16","author":"C Wang","year":"2017","unstructured":"Wang, C., Liang, C., Yu, F.R., Chen, Q., Tang, L.: Computation offloading and resource allocation in wireless cellular networks with mobile edge computing. IEEE Trans. Wirel. Commun. 16(8), 4924\u20134938 (2017)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"10","key":"3496_CR163","first-page":"4268","volume":"64","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Sheng, M., Wang, X., Wang, L., Li, J.: Mobile-edge computing: Partial computation offloading using dynamic voltage scaling. IEEE Trans. Commun. 64(10), 4268\u20134282 (2016)","journal-title":"IEEE Trans. Commun."},{"key":"3496_CR164","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman, R., Lopez, J., Manbo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680\u2013698 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"3496_CR165","doi-asserted-by":"crossref","unstructured":"Ni, J., Lin, X., Zhang, K., Yu, Y.: Secure and deduplicated spatial crowdsourcing: A fog-based approach. In: Proc. Globecom, Washington, DC, USA, pp. 1\u20136. (2016)","DOI":"10.1109\/GLOCOM.2016.7842248"},{"key":"3496_CR166","doi-asserted-by":"crossref","unstructured":"Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In:\u00a0Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1465\u20131482. (2017)","DOI":"10.1145\/3133956.3133980"},{"issue":"1","key":"3496_CR167","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2017","unstructured":"Ni, J., Zhang, K., Lin, X., Shen, X.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601\u2013628 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"3496_CR168","doi-asserted-by":"crossref","first-page":"1117","DOI":"10.1109\/JIOT.2017.2670570","volume":"4","author":"Y Huo","year":"2017","unstructured":"Huo, Y., Hu, C., Qi, X., Jing, T.: LoDPD: a location difference-based proximity detection protocol for fog computing. IEEE Internet Things J. 4(5), 1117\u20131124 (2017)","journal-title":"IEEE Internet Things J."},{"key":"3496_CR169","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1016\/j.future.2017.05.035","volume":"78","author":"R Yang","year":"2018","unstructured":"Yang, R., et al.: Position based cryptography with location privacy: a step for fog computing. Future Gener. Comput. Syst. 78, 799\u2013806 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"3496_CR170","doi-asserted-by":"crossref","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2016","unstructured":"Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751\u20132763 (2016)","journal-title":"IEEE Access"},{"issue":"10","key":"3496_CR171","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1002\/cpe.3485","volume":"28","author":"I Stojmenovic","year":"2016","unstructured":"Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurr. Comput. Pract. Exp. 28(10), 2991\u20133005 (2016)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"3496_CR172","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.jss.2019.04.050","volume":"154","author":"S Tuli","year":"2019","unstructured":"Tuli, S., Mahmud, R., Tuli, S., Buyya, R.: Fogbus: a blockchain-based lightweight framework for edge and fog computing. J. Syst. Softw. 154, 22\u201336 (2019)","journal-title":"J. Syst. Softw."},{"key":"3496_CR173","unstructured":"University, C.M. Elijah: cloudlet infrastructure for mobile computing. GitHub (2017)"},{"key":"3496_CR174","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03218-w","author":"P Pereira","year":"2020","unstructured":"Pereira, P., Araujo, J., Torquato, M., Dantas, J., Melo, C., Maciel, P.: Stochastic performance model for web server capacity planning in fog computing. J. Supercomput. (2020). https:\/\/doi.org\/10.1007\/s11227-020-03218-w","journal-title":"J. Supercomput."},{"key":"3496_CR175","doi-asserted-by":"crossref","unstructured":"Aldwairi, M., Hasan, M., Balbahaith, Z.: Detection of drive-by download attacks using machine learning approach. In: Cognitive Analytics: Concepts, Methodologies, Tools, and Applications, pp. 1598\u20131611. IGI Global (2020)","DOI":"10.4018\/978-1-7998-2460-2.ch082"},{"key":"3496_CR176","doi-asserted-by":"crossref","unstructured":"Heuser, S., Negro, M., Pendyala, P.K., Sadeghi, A.R.: Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (2016)","DOI":"10.1007\/978-3-662-54970-4_15"},{"key":"3496_CR177","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.procs.2016.03.028","volume":"79","author":"P Singh","year":"2016","unstructured":"Singh, P., Tiwari, P., Singh, S.: Analysis of malicious behavior of android apps. Proced. Comput Sci 79, 215\u2013221 (2016)","journal-title":"Proced. Comput Sci"},{"key":"3496_CR178","doi-asserted-by":"crossref","unstructured":"Sucasas, V., Mantas, G., Radwan, A., Rodriguez, J.: An Oauth2-based protocol with strong user privacy preservation for smart city mobile e-health apps. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICC.2016.7511598"},{"key":"3496_CR179","doi-asserted-by":"crossref","unstructured":"Ge, X., Pan, Y., Fan, Y., Fang, C.: AMDroid: android malware detection using function call graphs. In: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 71\u201377. IEEE (2019)","DOI":"10.1109\/QRS-C.2019.00027"},{"issue":"1","key":"3496_CR180","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/TSC.2015.2491281","volume":"9","author":"V Chang","year":"2016","unstructured":"Chang, V., Ramachandran, M.: Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9(1), 138\u2013152 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"3496_CR181","doi-asserted-by":"crossref","unstructured":"Huang, Y., Debnath, J., Iorga, M., Kumar, A., Xie, B.: CSAT: a user-interactive cyber security architecture tool based on NIST-compliance security controls for risk management. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0697\u20130707. IEEE (2019)","DOI":"10.1109\/UEMCON47517.2019.8993090"},{"key":"3496_CR182","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.csi.2015.06.007","volume":"44","author":"Y Mao","year":"2016","unstructured":"Mao, Y., Li, J., Chen, M.R., Liu, J., Xie, C., Zhan, Y.: Fully secure fuzzy identity-based encryption for secure iot communications. Comput. Stand. Interfaces 44, 117\u2013122 (2016)","journal-title":"Comput. Stand. Interfaces"},{"key":"3496_CR183","doi-asserted-by":"crossref","unstructured":"Azzabi, T., Farhat, H., Sahli, N.: A survey on wireless sensor networks security issues and military specificities. In: 2017 International Conference on Advanced Systems and Electric Technologies (IC_ASET), pp. 66\u201372. IEEE (2017)","DOI":"10.1109\/ASET.2017.7983668"},{"key":"3496_CR184","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.foodcont.2016.06.042","volume":"71","author":"RY Chen","year":"2017","unstructured":"Chen, R.Y.: An intelligent value stream-based approach to collaboration of food traceability cyber physical system by fog computing. Food Control 71, 124\u2013137 (2017)","journal-title":"Food Control"},{"key":"3496_CR185","doi-asserted-by":"crossref","unstructured":"Joshi B, Singh NK (2016) Mitigating dynamic dos attacks in mobile ad hoc network. In: Colossal Data Analysis and Networking (CDAN), Symposium On. IEEE. Pp 1\u20138","DOI":"10.1109\/CDAN.2016.7570941"},{"issue":"9","key":"3496_CR186","doi-asserted-by":"crossref","first-page":"8993","DOI":"10.1109\/JIOT.2020.3001603","volume":"7","author":"S Mishra","year":"2020","unstructured":"Mishra, S., Sahoo, M.N., Bakshi, S., Rodrigues, J.J.: Dynamic resource allocation in fog-cloud hybrid systems using multicriteria AHP techniques. IEEE Internet Things J. 7(9), 8993\u20139000 (2020)","journal-title":"IEEE Internet Things J."},{"key":"3496_CR187","doi-asserted-by":"crossref","unstructured":"Ha, D.A., Nguyen, K.T., Zao, J.K.: Efficient authentication of resource-constrained iot devices based on ecqv implicit certificates and datagram transport layer security protocol. In: Proceedings of the Seventh Symposium on Information and Communication Technology. ACM. pp 173\u2013180. (2016)","DOI":"10.1145\/3011077.3011108"},{"key":"3496_CR188","unstructured":"Alliance, C.S.: The Treacherous 12 Cloud Computing Top Threats in 2016 (2016). https:\/\/downloads.cloudsecurityalliance.org\/assets\/research\/top-threats\/Treacherous-12_Cloud-Computing_Top-Threats.Pdf. Accessed 03 Oct 2020"},{"issue":"3","key":"3496_CR189","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MCE.2019.2893674","volume":"8","author":"D Puthal","year":"2019","unstructured":"Puthal, D., Mohanty, S.P., Bhavake, S.A., Morgan, G., Ranjan, R.: Fog computing security challenges and future directions [energy and security]. IEEE Consum. Electron. Mag. 8(3), 92\u201396 (2019)","journal-title":"IEEE Consum. Electron. Mag."},{"key":"3496_CR190","doi-asserted-by":"crossref","unstructured":"Shin, S., Gu, G. (2012) Cloudwatcher: network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?). In: Network Protocols (ICNP), 2012 20th IEEE international conference on. pp 1\u20136. IEEE","DOI":"10.1109\/ICNP.2012.6459946"},{"key":"3496_CR191","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.cose.2014.11.006","volume":"49","author":"NH Ab Rahman","year":"2015","unstructured":"Ab Rahman, N.H., Choo, K.-K.R.: A survey of information security incident handling in the cloud. Comput. Secur. 49, 45\u201369 (2015)","journal-title":"Comput. Secur."},{"key":"3496_CR192","doi-asserted-by":"crossref","unstructured":"Ma, X., Fu, X., Luo, B., Du, X., Guizani, M.: A design of firewall based on feedback of intrusion detection system in cloud environment. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9013771"},{"key":"3496_CR193","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.comcom.2020.02.018","volume":"153","author":"JJ Hathaliya","year":"2020","unstructured":"Hathaliya, J.J., Tanwar, S.: An exhaustive survey on security and privacy issues in Healthcare 4.0. Comput. Commun. 153, 311\u2013335 (2020)","journal-title":"Comput. Commun."},{"key":"3496_CR194","doi-asserted-by":"crossref","unstructured":"Tamimi, A.A., Dawood, R., Sadaqa, L.: Disaster recovery techniques in cloud computing. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 845\u2013850. IEEE (2019)","DOI":"10.1109\/JEEIT.2019.8717450"},{"key":"3496_CR195","unstructured":"Zhang, W., Tian, D.: FindEvasion: an effective environment-sensitive malware detection system for the cloud. In: Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9\u201311, 2017, Proceedings, vol. 216, p. 3. Springer (2018)"},{"key":"3496_CR196","unstructured":"Berlin, K., Saxe, J.: Improving zero-day malware testing methodology using statistically significant time-lagged test samples. (2016). arXiv preprint arXiv:1608.00670"},{"key":"3496_CR197","unstructured":"Varriale, A., Prinetto, P., Carelli, A., Trotta, P.: Secube \u2122: data at rest and data in motion protection. In: Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Athens. pp 138\u2013145. (2016)"},{"key":"3496_CR198","first-page":"186","volume":"5","author":"NH Hussein","year":"2016","unstructured":"Hussein, N.H., Khalid, A., Khanfar, K.: A survey of cryptography cloud storage techniques. Int. J. Comput. Sci. Mob. Comput. 5, 186\u2013191 (2016)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"issue":"5","key":"3496_CR199","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MM.2016.85","volume":"36","author":"F Liu","year":"2016","unstructured":"Liu, F., Hao, Wu., Mai, K., Lee, R.B.: Newcache: Secure cache architecture thwarting cache side-channel attacks. IEEE Micro 36(5), 8\u201316 (2016)","journal-title":"IEEE Micro"},{"key":"3496_CR200","doi-asserted-by":"crossref","first-page":"107379","DOI":"10.1016\/j.comnet.2020.107379","volume":"180","author":"NK Panigrahy","year":"2020","unstructured":"Panigrahy, N.K., Li, J., Towsley, D., Hollot, C.V.: Network cache design under stationary requests: exact analysis and poisson approximation. Comput. Netw. 180, 107379 (2020)","journal-title":"Comput. Netw."},{"key":"3496_CR201","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Reiter, M.K., Zhang, Y.: A software approach to defeating side channels in last-level caches. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 871\u2013882. (2016)","DOI":"10.1145\/2976749.2978324"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03496-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03496-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03496-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T20:57:12Z","timestamp":1726433832000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03496-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,7]]},"references-count":201,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["3496"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03496-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2022,1,7]]},"assertion":[{"value":"17 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors do not have any conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}