{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T04:04:44Z","timestamp":1775534684802,"version":"3.50.1"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004692","name":"University of Science Ho Chi Minh City","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004692","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.jnca.2026.104478","type":"journal-article","created":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T16:48:56Z","timestamp":1773938936000},"page":"104478","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["POP2TIC: Performance optimization for privacy-preserving fog computing using TEE and intelligent caching"],"prefix":"10.1016","volume":"250","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3199-6333","authenticated-orcid":false,"given":"Phat T.","family":"Tran-Truong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7966-4816","authenticated-orcid":false,"given":"Trung D.","family":"Mai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5336-0566","authenticated-orcid":false,"given":"Ha X.","family":"Son","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9152-6208","authenticated-orcid":false,"given":"Phien","family":"Nguyen-Ngoc","sequence":"additional","affiliation":[]},{"given":"Bang K.","family":"Le","sequence":"additional","affiliation":[]},{"given":"Khanh H.","family":"Vo","sequence":"additional","affiliation":[]},{"given":"Ngan N.T.","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4235-584X","authenticated-orcid":false,"given":"Triet M.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Anh T.","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jnca.2026.104478_b1","doi-asserted-by":"crossref","first-page":"698","DOI":"10.23919\/JCN.2022.000050","article-title":"ENERGENT: An energy-efficient UAV-assisted fog-IoT framework for disaster management","volume":"24","author":"Abkenar","year":"2022","journal-title":"J. Commun. Networks"},{"key":"10.1016\/j.jnca.2026.104478_b2","series-title":"2024 5th International Conference on Communication, Computing & Industry 6.0","first-page":"1","article-title":"BOA: optimizing energy usage in cloud-fog environment using meta-heuristic scheduling algorithm","author":"Aishwarya","year":"2024"},{"key":"10.1016\/j.jnca.2026.104478_b3","series-title":"2022 IEEE International Symposium on Secure and Private Execution Environment Design","first-page":"121","article-title":"Sok: Limitations of confidential computing via tees for high-performance compute systems","author":"Akram","year":"2022"},{"key":"10.1016\/j.jnca.2026.104478_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104119","article-title":"TEE-MR: Developer-friendly data oblivious programming for trusted execution environments","volume":"148","author":"Alam","year":"2025","journal-title":"Comput. Secur."},{"key":"10.1016\/j.jnca.2026.104478_b5","article-title":"Artificial intelligence techniques for securing fog computing environments: trends, challenges, and future directions","author":"Alsadie","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.jnca.2026.104478_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.109464","article-title":"A social smart city for public and private mobility: A real case study","volume":"220","author":"Anedda","year":"2023","journal-title":"Comput. Netw."},{"key":"10.1016\/j.jnca.2026.104478_b7","doi-asserted-by":"crossref","unstructured":"Babar, M.F., Hasan, M., 2022. Real-time scheduling of TrustZone-enabled DNN workloads. In: Proceedings of the 4th Workshop on CPS & IoT Security and Privacy. pp. 63\u201369.","DOI":"10.1145\/3560826.3563386"},{"key":"10.1016\/j.jnca.2026.104478_b8","series-title":"DEBS 2018 - Proceedings of the 12th ACM International Conference on Distributed and Event-Based Systems","first-page":"16","article-title":"Mitigating network side channel leakage for stream processing systems in trusted execution environments","author":"Bilal","year":"2018"},{"key":"10.1016\/j.jnca.2026.104478_b9","first-page":"126","article-title":"Web caching and zipf-like distributions: Evidence and implications","volume":"vol. 1","author":"Breslau","year":"1999"},{"key":"10.1016\/j.jnca.2026.104478_b10","doi-asserted-by":"crossref","first-page":"8355","DOI":"10.1109\/TMC.2024.3349849","article-title":"Caching user-generated content in distributed autonomous networks via contextual bandit","volume":"23","author":"Chen","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.jnca.2026.104478_b11","doi-asserted-by":"crossref","first-page":"28","DOI":"10.3233\/JHS-240059","article-title":"Trailblazer: A proactive caching, blockchain, minimum content retrieval latency, and energy cost-aware resource and job orchestration scheme for publisher-subscriber based 6G ICN services","volume":"31","author":"Chowdhury","year":"2025","journal-title":"J. High Speed Netw."},{"key":"10.1016\/j.jnca.2026.104478_b12","series-title":"2025 IEEE Symposium on Security and Privacy","first-page":"4173","article-title":"Token weaver: Privacy preserving and post-compromise secure attestation","author":"Cremers","year":"2025"},{"key":"10.1016\/j.jnca.2026.104478_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101351","article-title":"CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT","volume":"28","author":"Dadkhah","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.jnca.2026.104478_b14","doi-asserted-by":"crossref","first-page":"101484","DOI":"10.1109\/ACCESS.2024.3409209","article-title":"Enhancement of fog caching using nature inspiration optimization technique based on cloud computing","volume":"12","author":"Elnagar","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.jnca.2026.104478_b15","series-title":"2023 International Conference on Intelligent Data Communication Technologies and Internet of Things","first-page":"271","article-title":"Heuristics and meta-heuristics based algorithms for resource optimization in fog computing environment: a comparative study","author":"Gupta","year":"2023"},{"key":"10.1016\/j.jnca.2026.104478_b16","doi-asserted-by":"crossref","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","article-title":"Intrusion detection system for healthcare systems using medical and network data: A comparison study","volume":"8","author":"Hady","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.jnca.2026.104478_b17","first-page":"22","article-title":"Federated learning collaborative content caching scheme in fog computing networks","volume":"46","author":"Huang","year":"2023","journal-title":"Beijing Youdian Daxue Xuebao"},{"issue":"9","key":"10.1016\/j.jnca.2026.104478_b18","doi-asserted-by":"crossref","first-page":"3025","DOI":"10.3390\/s21093025","article-title":"A framework for malicious traffic detection in IoT healthcare environment","volume":"21","author":"Hussain","year":"2021","journal-title":"Sensors"},{"key":"10.1016\/j.jnca.2026.104478_b19","series-title":"2023 IEEE Wireless Communications and Networking Conference","first-page":"1","article-title":"Asynchronous advantage actor-critic algorithm based cooperative caching strategy for fog radio access networks","author":"Jiang","year":"2023"},{"key":"10.1016\/j.jnca.2026.104478_b20","doi-asserted-by":"crossref","DOI":"10.1109\/JSAC.2025.3574587","article-title":"Cloud-fog automation: The new paradigm towards autonomous industrial cyber-physical systems","author":"Jin","year":"2025","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.jnca.2026.104478_b21","series-title":"2023 IEEE International Conference on Blockchain and Cryptocurrency","first-page":"1","article-title":"Dhtee: Decentralized infrastructure for heterogeneous tees","author":"Karanjai","year":"2023"},{"key":"10.1016\/j.jnca.2026.104478_b22","doi-asserted-by":"crossref","first-page":"2404","DOI":"10.14778\/3603581.3603583","article-title":"Olive: Oblivious federated learning on trusted execution environment against the risk of sparsification","volume":"16","author":"Kato","year":"2023","journal-title":"Proc. the VLDB Endow."},{"issue":"8","key":"10.1016\/j.jnca.2026.104478_b23","article-title":"SGXPool: Improving the performance of enclave creation in the cloud","volume":"33","author":"Li","year":"2022","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"9","key":"10.1016\/j.jnca.2026.104478_b24","doi-asserted-by":"crossref","first-page":"9244","DOI":"10.1109\/TVT.2020.3001301","article-title":"Capacity-aware edge caching in fog computing networks","volume":"69","author":"Li","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.jnca.2026.104478_b25","article-title":"IBOA: Cost-aware task scheduling model for integrated cloud-fog environments","author":"Medishetti","year":"2024","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"issue":"3","key":"10.1016\/j.jnca.2026.104478_b26","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","article-title":"N-baiot\u2014network-based detection of iot botnet attacks using deep autoencoders","volume":"17","author":"Meidan","year":"2018","journal-title":"IEEE Pervasive Comput."},{"key":"10.1016\/j.jnca.2026.104478_b27","doi-asserted-by":"crossref","DOI":"10.3390\/s25041258","article-title":"A critical analysis of cooperative caching in ad hoc wireless communication technologies: Current challenges and future directions","volume":"25","author":"Naeem","year":"2025","journal-title":"Sensors"},{"key":"10.1016\/j.jnca.2026.104478_b28","series-title":"Yellow taxi trip records","author":"New York City Taxi and Limousine Commission","year":"2025"},{"key":"10.1016\/j.jnca.2026.104478_b29","doi-asserted-by":"crossref","DOI":"10.7717\/peerj-cs.950","article-title":"BMDD: a novel approach for IoT platform (broker-less and microservice architecture, decentralized identity, and dynamic transmission messages)","volume":"8","author":"Nguyen","year":"2022","journal-title":"PeerJ Comput. Sci."},{"key":"10.1016\/j.jnca.2026.104478_b30","series-title":"2021 IEEE 34th Computer Security Foundations Symposium","first-page":"1","article-title":"Language support for secure software development with enclaves","author":"Oak","year":"2021"},{"key":"10.1016\/j.jnca.2026.104478_b31","doi-asserted-by":"crossref","unstructured":"Pan, S., Peng, X., Man, Z., Zhao, X., Zhang, D., Yang, B., Du, D., Lu, H., Xia, Y., Li, X., 2025. Dep-TEE: Decoupled Memory Protection for Secure and Scalable Inter-enclave Communication on RISC-V. In: Proceedings of the 30th Asia and South Pacific Design Automation Conference. pp. 454\u2013460.","DOI":"10.1145\/3658617.3697763"},{"key":"10.1016\/j.jnca.2026.104478_b32","first-page":"52","article-title":"Optimizing resource management using hybrid metaheuristic algorithm for fog layer design in edge computing","volume":"16","author":"Pillai","year":"2025","journal-title":"Syst. Soft Comput."},{"key":"10.1016\/j.jnca.2026.104478_b33","doi-asserted-by":"crossref","unstructured":"Shao, Z., Zhang, Z., Wang, F., Xu, Y., 2022. Pre-training enhanced spatial-temporal graph neural network for multivariate time series forecasting. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. pp. 1567\u20131577.","DOI":"10.1145\/3534678.3539396"},{"key":"10.1016\/j.jnca.2026.104478_b34","doi-asserted-by":"crossref","first-page":"112076","DOI":"10.1016\/j.comnet.2026.112076","article-title":"Privacyguard: a hierarchical privacy-preserving framework for iot-fog-cloud architectures","author":"Tran-Truong","year":"2026","journal-title":"Computer Networks"},{"issue":"5","key":"10.1016\/j.jnca.2026.104478_b35","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2541468.2541470","article-title":"Temporal locality in today\u2019s content caching: Why it matters and how to model it","volume":"43","author":"Traverso","year":"2013","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"10.1016\/j.jnca.2026.104478_b36","doi-asserted-by":"crossref","first-page":"80953","DOI":"10.1109\/ACCESS.2021.3085524","article-title":"Systematic literature review on the use of trusted execution environments to protect cloud\/fog-based internet of things applications","volume":"9","author":"Valadares","year":"2021","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.jnca.2026.104478_b37","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/TDSC.2023.3251418","article-title":"Cacheiee: Cache-assisted isolated execution environment on arm multi-core platforms","volume":"21","author":"Wang","year":"2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.jnca.2026.104478_b38","series-title":"37th Euromicro Conference on Real-Time Systems","first-page":"1","article-title":"On real-time guarantees in intel SGX and TDX","author":"Yuhala","year":"2025"},{"key":"10.1016\/j.jnca.2026.104478_b39","first-page":"243","article-title":"Trusted execution environment: State-of-the-art and future directions","volume":"61","author":"Zhang","year":"2024","journal-title":"Jisuanji Yanjiu Yu Fazhan"},{"key":"10.1016\/j.jnca.2026.104478_b40","doi-asserted-by":"crossref","unstructured":"Zoia, M., Cutecchia, M., Rusconi, D., Monzani, A., Picca, M., Bruschi, D., Lanzi, A., 2024. VS-TEE: A Framework for Virtualizing TEEs in ARM Cloud Contexts. In: Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy. pp. 143\u2013154.","DOI":"10.1145\/3714393.3726515"}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804526000536?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804526000536?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T03:19:58Z","timestamp":1775531998000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1084804526000536"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":40,"alternative-id":["S1084804526000536"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2026.104478","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"POP2TIC: Performance optimization for privacy-preserving fog computing using TEE and intelligent caching","name":"articletitle","label":"Article Title"},{"value":"Journal of Network and Computer Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jnca.2026.104478","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104478"}}