{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T10:03:43Z","timestamp":1766311423070,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.23919\/iconac.2017.8082079","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T17:36:33Z","timestamp":1509644193000},"page":"1-6","source":"Crossref","is-referenced-by-count":35,"title":["Fog computing: Security issues, solutions and robust practices"],"prefix":"10.23919","author":[{"given":"Bushra Zaheer","family":"Abbasi","sequence":"first","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Security Management Under Uncertainty","year":"2012","author":"panciatici","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref12","first-page":"395","article-title":"Secure virtualization in cloud computing","author":"volokyta","year":"2012","journal-title":"11th Int Conf Mod Probl Radio Eng Telecommun Comput Sci"},{"key":"ref13","first-page":"3132","volume":"3","author":"madhwai","year":"2015","journal-title":"FOG COMPUTING Comprehensive Approach For Avoiding Data Theft Attack Using"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2014.7051866"},{"key":"ref15","first-page":"311","author":"kumar","year":"2016","journal-title":"Fog Computing Common Security Issues and Proposed Countermeasures"},{"key":"ref16","first-page":"187","article-title":"cTPM: A Cloud TPM for Cross-Device Trusted Applications","volume":"8","author":"chen","year":"2014","journal-title":"11th USENIX Conf Networked Syst Des Implement"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848004"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref3","first-page":"28:1","article-title":"A Hierarchical Distributed Fog Computing Architecture for Big Data Analysis in Smart Cities","author":"tang","year":"2015","journal-title":"Proc ASE BigData Soc 2015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.19"},{"key":"ref5","first-page":"1","author":"luan","year":"2015","journal-title":"Fog Computing Focusing on Mobile Users at the Edge"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517976"},{"key":"ref7","first-page":"np","article-title":"Security Challenges in Cloud Computing","volume":"53","author":"oriol","year":"2013","journal-title":"Gerontologist"},{"key":"ref2","first-page":"1","article-title":"The Fog Computing Paradigm: Scenarios and Security Issues","volume":"2","author":"stojmenovic","year":"2014","journal-title":"2014 Fed Conf Comput Sci Inf Syst"},{"key":"ref1","first-page":"43","author":"madsen","year":"2013","journal-title":"Reliability in the Utility Computing Era Towards Reliable Fog Computing"},{"journal-title":"On security and privacy issues of fog computing supported Internet of Things environment","year":"0","author":"lee","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.125"}],"event":{"name":"2017 23rd International Conference on Automation and Computing (ICAC)","start":{"date-parts":[[2017,9,7]]},"location":"Huddersfield, United Kingdom","end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 23rd International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8067274\/8081956\/08082079.pdf?arnumber=8082079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T15:25:32Z","timestamp":1512055532000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8082079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/iconac.2017.8082079","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}