{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:16:56Z","timestamp":1770999416998,"version":"3.50.1"},"reference-count":33,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T00:00:00Z","timestamp":1580342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402055"],"award-info":[{"award-number":["61402055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61504013"],"award-info":[{"award-number":["61504013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"crossref","award":["2018JJ2445"],"award-info":[{"award-number":["2018JJ2445"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,17]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Fog computing has become an emerging environment that provides data storage, computing and some other services on the edge of network. It not only can acquire data from terminal devices, but also can provide computing services to users by opening computing resources. Compared with cloud computing, fog devices can collaborate to provide users with powerful computing services through resource allocation. However, as many of fog devices are not monitored, there are some security problems. For example, since fog server processes and maintains user information, device information, task parameters and so on, fog server is easy to perform illegal resource allocation for extra benefits. In this paper, we propose a secure computing resource allocation framework for open fog computing. In our scheme, the fog server is responsible for processing computing requests and resource allocations, and the cloud audit center is responsible for auditing the behaviors of the fog servers and fog nodes. Based on the proposed security framework, our proposed scheme can resist the attack of single malicious node and the collusion attack of fog server and computing devices. Furthermore, the experiments show our proposed scheme is efficient. For example, when the number of initial idle service devices is 40, the rejection rate of allocated tasks is 10% and the total number of sub-tasks is changed from 150 to 200, the total allocation time of our scheme is only changed from 15 ms to 25 ms; additionally, when the task of 5000 order matrix multiplication is tested on 10 service devices, the total computing time of our scheme is $\\sim$250 s, which is better than that of single computer (where single computer needs more than 1500 s). Therefore, our proposed scheme has obvious advantages when it faces some tasks that require more computational cost, such as complex scientific computing, distributed massive data query, distributed image processing and so on.<\/jats:p>","DOI":"10.1093\/comjnl\/bxz108","type":"journal-article","created":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T03:15:30Z","timestamp":1567307730000},"page":"567-592","source":"Crossref","is-referenced-by-count":20,"title":["Secure Computing Resource Allocation Framework For Open Fog Computing"],"prefix":"10.1093","volume":"63","author":[{"given":"Jiafu","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Computer & Communication Engineering, Changsha University of Science & Technology, Wangjiali Rd, Tianxin district, Changsha, Hunan Province 410114, China"}]},{"given":"Linyu","family":"Tang","sequence":"first","affiliation":[{"name":"School of Computer & Communication Engineering, Changsha University of Science & Technology, Wangjiali Rd, Tianxin district, Changsha, Hunan Province 410114, China"}]},{"given":"Ke","family":"Gu","sequence":"first","affiliation":[{"name":"School of Computer & Communication Engineering, Changsha University of Science & Technology, Wangjiali Rd, Tianxin district, Changsha, Hunan Province 410114, China"},{"name":"Department of Computer and Information Science, University of Macau, Avenida da Universidade, Taipa, Macau 999078, China"}]},{"given":"WeiJia","family":"Jia","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science, University of Macau, Avenida da Universidade, Taipa, Macau 999078, China"}]}],"member":"286","published-online":{"date-parts":[[2020,1,30]]},"reference":[{"key":"2020050407474847200_ref1","article-title":"Connected Vehicles, The Internet of Things, and Fog Computing","volume-title":"The Eighth ACM Int. Workshop on Vehicular Inter-Networking (VANET)","author":"Bonomi","year":"2011"},{"key":"2020050407474847200_ref2","doi-asserted-by":"crossref","DOI":"10.1109\/ATNAC.2014.7020884","article-title":"Fog Computing: A Cloud to the Ground Support for Smart Things and Machine-to-Machine Networks","volume-title":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","author":"Stojmenovic","year":"2014"},{"key":"2020050407474847200_ref3","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/2677046.2677052","article-title":"Finding your way in the fog: towards a comprehensive definition of fog computing","volume":"44","author":"Vaquero","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"2020050407474847200_ref4","doi-asserted-by":"crossref","DOI":"10.1145\/2342509.2342513","article-title":"Fog Computing and Its Role in the Internet of Things","volume-title":"Proc. of the First Edition of the MCC Workshop on Mobile Cloud Computing","author":"Bonomi","year":"2012"},{"key":"2020050407474847200_ref5","doi-asserted-by":"crossref","DOI":"10.1109\/FiCloud.2014.83","article-title":"Fog Computing and Smart Gateway Based Communication for Cloud of Things","volume-title":"2014 Int. Conf. on Future Internet of Things and Cloud","author":"Aazam","year":"2014"},{"key":"2020050407474847200_ref6","doi-asserted-by":"crossref","first-page":"3019","DOI":"10.1109\/ACCESS.2015.2509638","article-title":"Architecture harmonization between cloud radio access networks and fog networks","volume":"3","author":"Hung","year":"2015","journal-title":"IEEE Access"},{"key":"2020050407474847200_ref7","doi-asserted-by":"crossref","DOI":"10.1109\/ISCE.2015.7177778","article-title":"Fog Computing Architecture to Enable Consumer Centric Internet of Things Services","volume-title":"2015 Int. Symposium on Consumer Electronics (ISCE)","author":"Datta","year":"2015"},{"key":"2020050407474847200_ref8","doi-asserted-by":"crossref","DOI":"10.1109\/INM.2015.7140467","article-title":"Software Defined Networking-Based Vehicular Adhoc Network with Fog Computing","volume-title":"2015 IFIP\/IEEE Int. Symposium on Integrated Network Management (IM)","author":"Truong","year":"2015"},{"key":"2020050407474847200_ref9","doi-asserted-by":"crossref","DOI":"10.1145\/2757384.2757397","article-title":"A Survey of Fog Computing: Concepts, Applications and Issues","volume-title":"Proc. of the 2015 Workshop on Mobile Big Data","author":"Yi","year":"2015"},{"key":"2020050407474847200_ref10","doi-asserted-by":"crossref","DOI":"10.15439\/2014F503","article-title":"The Fog Computing Paradigm: Scenarios and Security Issues","volume-title":"2014 Federated Conf. on Computer Science and Information Systems","author":"Stojmenovic","year":"2014"},{"key":"2020050407474847200_ref11","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2492348.2492354","article-title":"Service-Oriented Heterogeneous Resource Sharing for Optimizing Service Latency in Mobile Cloud","volume-title":"Proc. of the First Int. Workshop on Mobile Cloud Computing and Networking","author":"Nishio","year":"2013"},{"key":"2020050407474847200_ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2016\/6123234","article-title":"An architecture of iot service delegation and resource allocation based on collaboration between fog and cloud computing","volume":"2016","author":"Alsaffar","year":"2016","journal-title":"Mobile Info. Syst."},{"key":"2020050407474847200_ref13","doi-asserted-by":"crossref","DOI":"10.1109\/SMC.2017.8122791","article-title":"An Algorithm to Optimise the Load Distribution of Fog Environments","volume-title":"2017 IEEE Int. Conf. on Systems, Man, and Cybernetics (SMC)","author":"Neto","year":"2017"},{"key":"2020050407474847200_ref14","doi-asserted-by":"crossref","DOI":"10.1109\/ISED.2016.7977053","article-title":"Real Time Resource Allocation on a Dynamic Two Level Symbiotic Fog Architecture","volume-title":"2016 Sixth Int. Symposium on Embedded Computing and System Design (ISED)","author":"Kochar","year":"2016"},{"key":"2020050407474847200_ref15","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MCOM.2017.1600896","article-title":"A hierarchical game framework for resource management in fog computing","volume":"55","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"2020050407474847200_ref16","first-page":"201","article-title":"An architecture for elastic resource allocation in fog computing","volume":"6","author":"Agarwal","year":"2015","journal-title":"Int. J. Comput. Sci. Commun."},{"key":"2020050407474847200_ref17","doi-asserted-by":"crossref","DOI":"10.1109\/ICC.2015.7248934","article-title":"Towards Power Consumption-Delay Tradeoff by Workload Allocation in Cloud\u2013Fog Computing","volume-title":"2015 IEEE Int. Conf. Communications (ICC)","author":"Deng","year":"2015"},{"key":"2020050407474847200_ref18","doi-asserted-by":"crossref","DOI":"10.1109\/CSCloud.2016.34","article-title":"Scalable Fog Computing with Service Offloading in Bus Networks","volume-title":"2016 IEEE 3rd Int. Conf. on Cyber Security Cloud Computing (CSCloud)","author":"Ye","year":"2016"},{"key":"2020050407474847200_ref19","doi-asserted-by":"crossref","first-page":"19293","DOI":"10.1109\/ACCESS.2017.2749422","article-title":"Security and privacy in fog computing: challenges","volume":"5","author":"Mukherjee","year":"2017","journal-title":"IEEE Access"},{"key":"2020050407474847200_ref20","first-page":"13","article-title":"Survey on fog computing mitigating data theft attacks in cloud","volume":"2","author":"Mandlekar","year":"2014","journal-title":"Int. J. Innovative Res. Comput. Sci. Technol."},{"key":"2020050407474847200_ref21","doi-asserted-by":"crossref","DOI":"10.1109\/NOF.2015.7333287","article-title":"On Security and Privacy Issues of Fog Computing Supported Internet of Things Environment","volume-title":"2015 6th Int. Conf. on the Network of the Future (NOF)","author":"Lee","year":"2015"},{"key":"2020050407474847200_ref22","doi-asserted-by":"crossref","first-page":"203","DOI":"10.4236\/jis.2017.83014","article-title":"Attribute-based secure data sharing with efficient revocation in fog computing","volume":"8","author":"Alotaibi","year":"2017","journal-title":"J. Inform. Secur."},{"key":"2020050407474847200_ref23","first-page":"1","article-title":"Providing task allocation and secure deduplication for mobile crowdsensing via fog computing","volume":"2018","author":"Ni","year":"2018","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2020050407474847200_ref24","doi-asserted-by":"crossref","DOI":"10.1109\/ICSPIS.2017.8311595","article-title":"A Security Aware Scheduling in Fog Computing by Hyper Heuristic Algorithm","volume-title":"2017 3rd Iranian Conf. on Intelligent Systems and Signal Processing (ICSPIS)","author":"Rahbari","year":"2017"},{"key":"2020050407474847200_ref25","doi-asserted-by":"crossref","DOI":"10.1109\/APNOMS.2015.7275445","article-title":"A Fog Based System Model for Cooperative IoT Node Pairing Using Matching Theory","volume-title":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","author":"Abedin","year":"2015"},{"key":"2020050407474847200_ref26","doi-asserted-by":"crossref","DOI":"10.1109\/APNOMS.2016.7737202","article-title":"Dynamic Module Deployment in a Fog Computing Platform","volume-title":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","author":"Hong","year":"2016"},{"key":"2020050407474847200_ref27","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/CC.2016.7445510","article-title":"Fog computing dynamic load balancing mechanism based on graph repartitioning","volume":"13","author":"Ningning","year":"2016","journal-title":"China Commun."},{"key":"2020050407474847200_ref28","article-title":"OpenFog reference architecture for fog computing","author":"OpenFog Consortium Architecture Working Group","year":"2017"},{"key":"2020050407474847200_ref29","doi-asserted-by":"crossref","DOI":"10.1109\/ISWCS.2017.8108146","article-title":"An Energy-Aware Offloading Clustering Approach (EAOCA) in Fog Computing","volume-title":"2017 Int. Symposium on Wireless Communication Systems (ISWCS)","author":"Bozorgchenani","year":"2017"},{"key":"2020050407474847200_ref30","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/JIOT.2017.2788802","article-title":"On reducing IoT service delay via fog offloading","volume":"5","author":"Yousefpour","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"2020050407474847200_ref31","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.ins.2013.04.028","article-title":"Security and privacy for storage and computation in cloud computing","volume":"258","author":"Wei","year":"2014","journal-title":"Inform. Sci."},{"key":"2020050407474847200_ref32","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/00029890.1962.11989827","article-title":"College admissions and the stability of marriage","volume":"69","author":"Gale","year":"1962","journal-title":"Am. Math. Mon."},{"key":"2020050407474847200_ref33","doi-asserted-by":"crossref","first-page":"3246","DOI":"10.1109\/JIOT.2018.2838022","article-title":"Hierarchical fog-cloud computing for IoT systems: a computation offloading game","volume":"5","author":"Shah-Mansouri","year":"2018","journal-title":"IEEE Internet Things J."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/4\/567\/33153502\/bxz108.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/4\/567\/33153502\/bxz108.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T18:41:20Z","timestamp":1695148880000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/63\/4\/567\/5717858"}},"subtitle":[],"editor":[{"given":"Daniele","family":"Sgandurra","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,1,30]]},"references-count":33,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,1,30]]},"published-print":{"date-parts":[[2020,4,17]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxz108","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2020,4]]},"published":{"date-parts":[[2020,1,30]]}}}