{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T12:48:45Z","timestamp":1750942125941,"version":"3.37.3"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"FCT\/MCTES through national funds and when applicable co-funded EU funds","award":["UIDB\/EEA\/50008\/2020"],"award-info":[{"award-number":["UIDB\/EEA\/50008\/2020"]}]},{"DOI":"10.13039\/501100003593","name":"Brazilian National Council for Research and Development","doi-asserted-by":"publisher","award":["309335\/2017-5"],"award-info":[{"award-number":["309335\/2017-5"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/jiot.2020.2991105","type":"journal-article","created":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T20:30:58Z","timestamp":1588105858000},"page":"7783-7794","source":"Crossref","is-referenced-by-count":6,"title":["A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0026-149X","authenticated-orcid":false,"given":"Gulshan","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3921-9512","authenticated-orcid":false,"given":"Rahul","family":"Saha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1724-0636","authenticated-orcid":false,"given":"Mritunjay Kumar","family":"Rai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3588-2317","authenticated-orcid":false,"given":"Reji","family":"Thomas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7338-973X","authenticated-orcid":false,"given":"G.","family":"Geetha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0117-8102","authenticated-orcid":false,"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1016\/j.cose.2017.08.016"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1016\/j.future.2016.12.015"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/j.future.2017.12.031"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/ACCESS.2017.2749422"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/j.compeleceng.2018.06.006"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.future.2019.11.013"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.future.2017.01.025"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.future.2017.01.024"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.future.2017.02.032"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.suscom.2018.06.003"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"ref27","first-page":"234","article-title":"Security threats and countermeasures in cloud computing","volume":"1","author":"ashktorab","year":"2012","journal-title":"International Journal of Engineering Innovation and Management"},{"year":"2019","author":"walker","journal-title":"Cloud Security Alliance The Treacherous 12-Cloud Computing Top Threats in 2016","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.future.2015.07.012"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.comnet.2010.05.010"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.jnca.2017.09.002"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/MPOT.2015.2456213"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICC.2016.7511146"},{"key":"ref24","first-page":"1662","article-title":"Analysing the security risks of cloud adoption using the SeCA model: A case study","volume":"18","author":"baars","year":"2012","journal-title":"J Universal Comput Sci"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.future.2018.05.008"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1186\/1869-0238-4-5"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.3390\/computers3010001"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1016\/j.chaos.2017.08.020"},{"year":"2018","journal-title":"Schneier on Security","key":"ref51"},{"year":"2019","journal-title":"A Context-Based Access Control Model for HIPAA Privacy and Security Compliance","key":"ref58"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"ref56","article-title":"Security for signcryption: The two user model","author":"rabin","year":"2011","journal-title":"Practical Signcryption Information Security and Cryptography"},{"key":"ref55","first-page":"267","article-title":"Large modulus ring-LWE ? module-LWE","author":"martin","year":"2017","journal-title":"Proc ASIACRYPT"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1155\/2013\/702539"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-319-11659-4_12","article-title":"Lattice cryptography for the Internet","author":"peikert","year":"2014","journal-title":"Proc 6th Int Conf Post Quant Cryptography (PQCrypto)"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1007\/978-3-030-00434-7_15"},{"key":"ref10","first-page":"121","article-title":"Smart items, fog and cloud computing as enablers of servitization in healthcare","volume":"185","author":"stantchev","year":"2015","journal-title":"Sens Transducers"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TMC.2017.2702670"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ACCESS.2017.2766180"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/MCOM.2015.7120041"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1002\/wcm.1203"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/MC.2016.245"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICFEC.2017.20"},{"key":"ref16","first-page":"13","article-title":"Fog computing and its role in the Internet of Things","author":"flavio","year":"2012","journal-title":"Proc MCC SIGCOMM"},{"year":"2018","author":"msv","journal-title":"Is Fog Computing the Next Big Thing in the Internet of Things","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.dcan.2017.07.001"},{"key":"ref19","first-page":"73","article-title":"Fog computing: Platform and applications","author":"yi","year":"2016","journal-title":"Proc 3rd IEEE Workshop IEEE Hot Topics Web Syst Technol (HotWeb)"},{"year":"2015","journal-title":"Cisco global cloud index forecast and methodology 2014&#x2013;2019 white paper","key":"ref4"},{"year":"2011","author":"evans","journal-title":"The Internet of Things&#x2014;How the Next Evolution of the Internet Is Changing Everything","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1721654.1721672"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TVT.2016.2585591"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TII.2017.2715844"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.future.2012.05.023"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/AHS.2009.30"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/NAS.2015.7255196"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1016\/j.comnet.2018.03.012"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1016\/j.procs.2017.12.089"},{"key":"ref48","first-page":"83","article-title":"Integrating multi-modal circuit features within an efficient encryption system","author":"papoutsis","year":"2007","journal-title":"Proc IEEE 3rd Int Symp Inf Assurance Secur (IAS)"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1016\/j.jisa.2017.11.002"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1016\/j.future.2018.09.017"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/ACCESS.2018.2868920"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1016\/j.jnca.2016.09.002"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1016\/j.sjbs.2017.09.010"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9165761\/09079898.pdf?arnumber=9079898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:28:56Z","timestamp":1651080536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9079898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":58,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.2991105","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2020,8]]}}}