{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:54:24Z","timestamp":1774965264540,"version":"3.50.1"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"European Union\u2019s Horizon 2020 Research and Innovation Programme under the Marie Sk\u0142odowska-Curie","award":["764785"],"award-info":[{"award-number":["764785"]}]},{"name":"Fog Computing for Robotics and Industrial Automation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2947652","type":"journal-article","created":{"date-parts":[[2019,10,15]],"date-time":"2019-10-15T22:08:17Z","timestamp":1571177297000},"page":"150936-150948","source":"Crossref","is-referenced-by-count":317,"title":["Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9056-9281","authenticated-orcid":false,"given":"Michele","family":"De Donno","sequence":"first","affiliation":[{"name":"DTU Compute, Technical University of Denmark, Kongens Lyngby, Denmark"}]},{"given":"Koen","family":"Tange","sequence":"additional","affiliation":[{"name":"DTU Compute, Technical University of Denmark, Kongens Lyngby, Denmark"}]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[{"name":"DTU Compute, Technical University of Denmark, Kongens Lyngby, Denmark"}]}],"member":"263","reference":[{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771153"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2018.00056"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref33","first-page":"261","author":"zhang","year":"2017","journal-title":"Securing the Internet of Things"},{"key":"ref32","first-page":"318","article-title":"Recent trends in IoT","author":"saichaitanya","year":"2016","journal-title":"Proc 4th Int Conf Recent Trends Eng Sci Manage"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.195"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2014.7033259"},{"key":"ref36","article-title":"IT\/OT convergence-bridging the divide","author":"harp","year":"2014"},{"key":"ref35","author":"kelly","year":"2015","journal-title":"Internet of Things data to top 1 6 zettabytes by 2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883918"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.020"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.015"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CINE.2015.31"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3390\/s151024818"},{"key":"ref28","first-page":"367","author":"sonar","year":"2016","journal-title":"An Approach to Secure Internet of Things Against DDoS"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120024"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0345-9"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.060"},{"key":"ref29","first-page":"348","article-title":"IoT: A review on security issues and measures","volume":"5","author":"ravindran","year":"2015","journal-title":"Int J Eng Sci Technol"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2016.1276416"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1089-9"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2016.16"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.145"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2015.35021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1536-6_15"},{"key":"ref23","article-title":"The security implications of the Internet of Things","author":"folk","year":"2015"},{"key":"ref26","first-page":"1","article-title":"A critical analysis on the security concerns of Internet of Things (IoT)","volume":"111","author":"farooq","year":"2015","journal-title":"Int J Comput Appl"},{"key":"ref25","year":"2012","journal-title":"Recommendation Y 2060 Overview of Internet of Things"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/9781119187202"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"ref59","author":"durcevic","year":"2019","journal-title":"10 Cloud Computing Risks & Challenges Businesses are Facing in These Days"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/FWC.2017.8368537"},{"key":"ref57","year":"2018","journal-title":"OpenFog Consortium"},{"key":"ref56","first-page":"103","author":"mahmud","year":"2018","journal-title":"Fog computing A taxonomy survey and future directions"},{"key":"ref55","year":"2017","journal-title":"OpenFog Reference Architecture for Fog Computing"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2762345"},{"key":"ref53","year":"2016","journal-title":"Openfog architecture overview"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref10","year":"2006","journal-title":"Google Press Center"},{"key":"ref11","year":"2006","journal-title":"Amazon Web Services Website"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1364782.1364786"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2008.172"},{"key":"ref14","article-title":"That &#x2018;Internet of Things&#x2019; thing","author":"ashton","year":"0","journal-title":"RFID J"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2006.21"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/ce:20060603"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-292"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2766923"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"ref6","year":"2018","journal-title":"IEEE Xplore Digital Library"},{"key":"ref5","year":"2018","journal-title":"Glossary of Terms Related to Fog Computing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"ref7","year":"2018","journal-title":"ACM Digital Library"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.39"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1067063"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.7901470"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3154815"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.15439\/2014F503"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.022021657"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.09.002"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08869772.pdf?arnumber=8869772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T19:46:30Z","timestamp":1662666390000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8869772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2947652","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}