{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:37:12Z","timestamp":1754487432872,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,3]]},"DOI":"10.1145\/3607947.3607962","type":"proceedings-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:12:21Z","timestamp":1695946341000},"page":"66-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Fog Computing and Edge Computing: Open Issues, Critical Challenges and the Road Ahead for Future"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3428-844X","authenticated-orcid":false,"given":"Meghna Manoj","family":"Nair","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8828-8093","authenticated-orcid":false,"given":"Anand Kumar","family":"Mishra","sequence":"additional","affiliation":[{"name":"Computer Science and Engg, NIIT University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2657-8700","authenticated-orcid":false,"given":"Amit Kumar","family":"Tyagi","sequence":"additional","affiliation":[{"name":"Department of Fashion Technology, National Institute of Fashion Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Blockchain, Fog and IoT Integrated Framework: Review, Architecture and Evaluation","author":"Alam T.","year":"2020","unstructured":"Alam T., Benaida M, \u201cBlockchain, Fog and IoT Integrated Framework: Review, Architecture and Evaluation\u201d, Technology Reports of Kansai University, 2020."},{"volume-title":"What Will 5G Be?","author":"Andrews Jeffrey G.","unstructured":"Andrews Jeffrey G., Buzzi S., Choi W., Hanly S., Lozano A., Soong Anthony C.K., Zhang Jianzhong C., \u201cWhat Will 5G Be?\u201d, IEEE.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","volume-title":"Recent Advances in Applied Computer Science and Digital Services","author":"Apostu Anca F.","year":"2013","unstructured":"Apostu Anca, Puican F., Ularu G., Suciu G., Todoran G., \u201cStudy on advantages and disadvantages of Cloud Computing \u2013 the advantages of Telemetry Applications in the Cloud\u201d, Recent Advances in Applied Computer Science and Digital Services, 2013."},{"key":"e_1_3_2_1_4_1","volume-title":"proceedings of the first edition of the MCC workshop on Mobile cloud computing","author":"Flavio B.","year":"2012","unstructured":"Flavio B., Milito R., Zhu J., Addepalli S., \u201cFog Computing and Its Role in the Internet of Things Cisco Systems\u201d, proceedings of the first edition of the MCC workshop on Mobile cloud computing, August 2012."},{"volume-title":"European Journal for Law and Technology","author":"Filippi De P","unstructured":"Filippi De, P, McCarthy, S, \u2019Cloud Computing: Centralization and Data Sovereignty\u2019 European Journal for Law and Technology, Vol. 3 No. 2, 2012.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.5958\/2249-5576.2019.00004.9"},{"key":"e_1_3_2_1_7_1","volume-title":"proceedings of the International Conference on Big Data and Internet of Thing","author":"Hua Pengfei S.","year":"2017","unstructured":"Hua Pengfei, Dhelim S., Ning H., Qiud T., \u201cSurvey on fog computing: architecture, key technologies, applications and open issues\u201d, proceedings of the International Conference on Big Data and Internet of Thing, December 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/MNET.2017.1600027NM"},{"key":"e_1_3_2_1_9_1","volume-title":"IoT security: Review, blockchain solutions, and open challenges","author":"Ahmad Khan M.","year":"2018","unstructured":"Ahmad Khan M., Bahauddin Khaled S., \u201cIoT security: Review, blockchain solutions, and open challenges\u201d, Elsevier, 2018."},{"key":"e_1_3_2_1_10_1","volume-title":"Fog computing for Healthcare 4.0 environment: Opportunities and challenges","author":"Kumari Aparna","year":"2018","unstructured":"Kumari Aparna, Tanwar Sudeep., Tyagi S., Kumar N., \u201cFog computing for Healthcare 4.0 environment: Opportunities and challenges\u201d, Elsevier, 2018"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/978-3-319-34208-5_21"},{"key":"e_1_3_2_1_12_1","volume-title":"Fog Computing: A Taxonomy, Survey and Future Directions","author":"Mahmud Redowan R.","year":"2017","unstructured":"Mahmud Redowan, Kotagiri R. and Buyya R., \u201cFog Computing: A Taxonomy, Survey and Future Directions\u201d, Springer, Singapore, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/978-3-319-95450-9"},{"key":"e_1_3_2_1_14_1","volume-title":"A Survey of Fog Computing and Communication: Current Researches and Future Directions","author":"Nath Shubha Brata H.","year":"2018","unstructured":"Nath Shubha Brata, Gupta H., Chakraborty S., Ghosh Soumya K., \u201cA Survey of Fog Computing and Communication: Current Researches and Future Directions\u201d, arXiv, 2018."},{"key":"e_1_3_2_1_15_1","volume-title":"Securing Fog Computing for Internet of Things Applications: Challenges and Solutions","author":"Ni Jianbing K.","year":"2017","unstructured":"Ni Jianbing, Zhang K., Lin X., Shen X. (Sherman), Securing Fog Computing for Internet of Things Applications: Challenges and Solutions, IEEE, 2017"},{"key":"e_1_3_2_1_16_1","volume-title":"Blockchain","author":"Nofer Michael P.","year":"2017","unstructured":"Nofer Michael, Gomber P., Hinz O., Schiereck D., \u201cBlockchain\u201d, Springer, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1186\/s13677-017-0097-9"},{"key":"e_1_3_2_1_18_1","volume-title":"A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT","author":"Sharma Pradip Kumar","year":"2017","unstructured":"Sharma Pradip Kumar, Chen Mu-Yen, and Park Jong H., \u201cA Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT\u201d, IEEE, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2994581"},{"key":"e_1_3_2_1_20_1","article-title":"Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing","author":"Vaquero Luis M.","year":"2014","unstructured":"Vaquero Luis M., Merino Luis R., \u201cFinding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing\u201d, ACM SIGCOMM Computer Communication Review, October 2014.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_21_1","first-page":"19","article-title":"Fog Computing and Its Applications","volume":"2","author":"Waheetha R.","year":"2016","unstructured":"Waheetha R., Fernandez S., \u201cFog Computing and Its Applications\u201d, International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Volume 2, Special Issue 19, October 2016.","journal-title":"International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST)"},{"key":"e_1_3_2_1_22_1","volume-title":"MDPI","author":"Wang Haoyu Wang Lina Z.","year":"2019","unstructured":"Wang Haoyu Wang Lina , Zhou Z., Tao X., Pau G. and Arena F., \u201cBlockchain-Based Resource Allocation Model in Fog Computing\u201d, MDPI, 2019."},{"key":"e_1_3_2_1_23_1","volume-title":"24th IEEE International Conference on Advanced Information Networking and Applications","author":"Wu Chen E.","year":"2010","unstructured":"Wu Chen, Chang E., Dillion T., \u201cCloud Computing: Issues and Challenges\u201d, 24th IEEE International Conference on Advanced Information Networking and Applications, 2010."},{"key":"e_1_3_2_1_24_1","volume-title":"Mobidata '15: Proceedings of the 2015 Workshop on Mobile Big Data","author":"Yi Shanhe C.","year":"2015","unstructured":"Yi Shanhe, Li C., Li Q., \u201cA Survey of Fog Computing: Concepts, Applications and Issues\u201d, Mobidata '15: Proceedings of the 2015 Workshop on Mobile Big Data, June 2015."},{"key":"e_1_3_2_1_25_1","volume-title":"Security and Privacy Issues of Fog Computing: A Survey","author":"Yi Shanhe Z.","year":"2015","unstructured":"Yi Shanhe, Qin Z., and Li Q., \u201cSecurity and Privacy Issues of Fog Computing: A Survey\u201d, Springer, 2015"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1016\/j.sysarc.2019.02.009"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1504\/IJWGS.2018.095647"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1007\/978-3-031-35510-3_36"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/ICOEI56765.2023.10125660"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.4018\/978-1-6684-6697-1.ch017"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.14704\/nq.2022.20.8.NQ44468"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/ICCCI50826.2021.9402498"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1007\/978-981-16-6542-4_22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1007\/978-3-030-87059-1_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/ICCCI54379.2022.9740741"},{"key":"e_1_3_2_1_36_1","volume-title":"A Look at Top 35 Problems in the Computer Science Field for the Next Decade. 10.1201\/9781003052098-40","author":"Goyal","year":"2020","unstructured":"Goyal, Deepti & Tyagi, Amit. (2020). A Look at Top 35 Problems in the Computer Science Field for the Next Decade. 10.1201\/9781003052098-40."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.4018\/978-1-6684-6697-1.ch023"}],"event":{"acronym":"IC3 2023","name":"IC3 2023: 2023 Fifteenth International Conference on Contemporary Computing","location":"Noida India"},"container-title":["Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607947.3607962","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607947.3607962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:38:06Z","timestamp":1750178286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607947.3607962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,3]]},"references-count":37,"alternative-id":["10.1145\/3607947.3607962","10.1145\/3607947"],"URL":"https:\/\/doi.org\/10.1145\/3607947.3607962","relation":{},"subject":[],"published":{"date-parts":[[2023,8,3]]},"assertion":[{"value":"2023-09-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}