{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:50:13Z","timestamp":1777704613182,"version":"3.51.4"},"reference-count":28,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T00:00:00Z","timestamp":1531872000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,12,24]]},"abstract":"<jats:p>In a Personal Area Network (PAN) populated with wearable devices, the security of stored files is an important concern. Secret sharing has received considerable attention as an effective approach for handling security as it guarantees confidentiality and integrity. A high level of data privacy is still assured when devices are compromised, lost, or stolen, and even in cases where the total count of these devices is less than the minimum threshold. However, because traditional secret sharing requires tremendous computational overhead and consumes large storage space, it is suboptimal for battery-powered wearable devices. To overcome these limitations, combinatorial-based file sharing is proposed. However, this approach is also hindered by an efficiency problem, because the preparation of file storage and retrieval involves computational costs. Additionally, this file sharing scheme was designed without taking into consideration an environment with heterogeneous wearable devices. To address the aforementioned problems, we first propose a new fog network model that delegates the calculation for the preparation of file storage and retrieval to a fog node, such as a smartphone or tablet PC. A fog node has comparatively higher computational speed, and a larger battery capacity; hence, the resources of the devices in the PAN can be managed efficiently. Additionally, we propose a new algorithm that facilitates file shares by considering the heterogeneous characteristics of wearable devices. In particular, we consider the factors of storage capacity and network speed to determine the size of the file shares. We use mathematical analysis and simulations to demonstrate that our proposed model efficiently manages stored files.<\/jats:p>","DOI":"10.3233\/jifs-169837","type":"journal-article","created":{"date-parts":[[2018,7,20]],"date-time":"2018-07-20T12:28:54Z","timestamp":1532089734000},"page":"5959-5970","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fog-based file sharing scheme for efficient file management in PAN"],"prefix":"10.1177","volume":"35","author":[{"given":"Jung-Eun","family":"Park","sequence":"first","affiliation":[{"name":"Division of Computer Science, Sookmyung Women\u2019s University, Cheongpa-ro 47-gil 100, Yongsan-gu, Seoul, Korea"}]},{"given":"Young-Hoon","family":"Park","sequence":"additional","affiliation":[{"name":"Division of Computer Science, Sookmyung Women\u2019s University, Cheongpa-ro 47-gil 100, Yongsan-gu, Seoul, Korea"}]}],"member":"179","published-online":{"date-parts":[[2018,7,18]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"crossref","unstructured":"LimS. OhT.H. ChoiY.B. and LakshmanT. Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring 2010 IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy ComputingNewport Beach CA 2010 pp. 327\u2013332.","DOI":"10.1109\/SUTC.2010.61"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2009.2032660"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISRA.2012.6219343"},{"key":"e_1_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Sravan KumarR. and SaxenaA. Data integrity proofs in cloud storage 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011) Bangalore 2011 pp. 1\u20134.","DOI":"10.1109\/COMSNETS.2011.5716422"},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","unstructured":"LuoW. and BaiG. Ensuring the data integrity in cloud data storage 2011 IEEE International Conference on Cloud Computing and Intelligence Systems Beijing 2011 pp. 240\u2013243.","DOI":"10.1109\/CCIS.2011.6045067"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","unstructured":"FeldmanP. A practical scheme for non-interactive verifiable secret sharing Foundations of Computer Science 1987 28th Annual Symposium on IEEE1987 pp. 427\u2013438.","DOI":"10.1109\/SFCS.1987.4"},{"key":"e_1_3_2_9_2","first-page":"468","volume-title":"Some ideal secret sharing schemes, Workshop on the Theory and Application of of Cryptographic Techniques","author":"Brickell E.F.","year":"1989","unstructured":"BrickellE.F., Some ideal secret sharing schemes, Workshop on the Theory and Application of of Cryptographic Techniques, Berlin, Heidelberg, 1989, pp. 468\u2013475."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58265-7_5"},{"issue":"12","key":"e_1_3_2_11_2","first-page":"2762","article-title":"A practical (t, n) multisecret sharing scheme IEICE transactions on fundamentals of electronics","volume":"83","author":"Chien H.Y.","year":"2000","unstructured":"ChienH.Y., JanJ.K. and TsengY.M., A practical (t, n) multisecret sharing scheme IEICE transactions on fundamentals of electronics, Communications and Computer Sciences83(12) (2000) 2762\u20132765.","journal-title":"Communications and Computer Sciences"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.06.120"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","unstructured":"ParkY.H. LeeE.D. and SeoS.W. Lightweight (k n)-file sharing scheme for distributed storages with diverse communication capacities 2014 IEEE Conference on Communications and Network Security 2014 pp. 373\u2013381.","DOI":"10.1109\/CNS.2014.6997506"},{"key":"e_1_3_2_14_2","unstructured":"ParkJ.E. and ParkY.H. Energy efficient fog-based file sharing scheme for personal area networks 2018 International Conference on Green and Human Information Technology (ICGHIT) Chiangmai 2018."},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2017.10.11.06"},{"issue":"4","key":"e_1_3_2_16_2","article-title":"An approach secret sharing algorithm in cloud computing security over single to multi clouds","volume":"3","author":"Alam M.K.","year":"2013","unstructured":"AlamM.K., An approach secret sharing algorithm in cloud computing security over single to multi clouds, International Journal of Scientific and Research Publications3(4) (2013).","journal-title":"International Journal of Scientific and Research Publications"},{"key":"e_1_3_2_17_2","doi-asserted-by":"crossref","unstructured":"YangC.N. and LaiJ.B. Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing 2013 International Symposium on Biometrics and Security Technologies Chengdu 2013 pp. 259\u2013266.","DOI":"10.1109\/ISBAST.2013.46"},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","unstructured":"ErmakovaT. and FabianB. Secret Sharing for Health Data in Multi-provider Clouds 2013 IEEE 15th Conference on Business Informatics Vienna 2013 pp. 93\u2013100.","DOI":"10.1109\/CBI.2013.22"},{"key":"e_1_3_2_19_2","doi-asserted-by":"crossref","unstructured":"TruongN.B. LeeG.M. and Ghamri-DoudaneY. Software Defined Networking-Based Vehicular Adhoc Network with Fog Computing 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM) Ottawa ON 2015 pp. 1202\u20131207.","DOI":"10.1109\/INM.2015.7140467"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2659783"},{"key":"e_1_3_2_21_2","doi-asserted-by":"crossref","unstructured":"StojmenovicI. Fog computing: A cloud to the ground support for smart things and machine-to-machine networks 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC) Southbank VIC 2014 pp. 117\u2013122.","DOI":"10.1109\/ATNAC.2014.7020884"},{"key":"e_1_3_2_22_2","doi-asserted-by":"crossref","unstructured":"DubeyH. YangJ. ConstantN. AmiriA.M. YangQ. and MakodiyaK. Fog data: Enhancing telehealth big data through fog computing Proceedings of the ASE BigData & Social Informatics 2015 p. 14.","DOI":"10.1145\/2818869.2818889"},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","unstructured":"AazamM. and HuhE.N. E-HAMC: Leveraging Fog computing for emergency alert service 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) St. Louis MO 2015 pp. 518\u2013523.","DOI":"10.1109\/PERCOMW.2015.7134091"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","unstructured":"ChenN. ChenY. YouY. LingH. LiangP. and ZimmermannR. Dynamic Urban Surveillance Video Stream Processing Using Fog Computing 2016 IEEE Second International Conference on Multimedia Big Data (BigMM) Taipei 2016 pp. 105\u2013112.","DOI":"10.1109\/BigMM.2016.53"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.245"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"e_1_3_2_27_2","doi-asserted-by":"crossref","unstructured":"BonomiF. MilitoR. ZhuJ. and AddepalliS. Fog computing and its role in the internet of things Proceedings of the first edition of the MCC workshop on Mobile cloud computing 2012 pp. 13\u201316.","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_3_2_28_2","doi-asserted-by":"crossref","unstructured":"BonomiF. MilitoR. NatarajanP. and ZhuJ. Fog computing: A platform for internet of things and analytics Big Data and Internet of Things: A Roadmap for Smart Environments 2014 pp. 169\u2013186.","DOI":"10.1007\/978-3-319-05029-4_7"},{"key":"e_1_3_2_29_2","unstructured":"ParkY.H. ParkJ.E. and KoK.M. Energy Efficient File Sharing Scheme for PAN in Heterogeneous Wearable Devices Environment International Conference on Big data IoT and Cloud Computing Jeju Korea 2017."}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169837","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169837","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:37Z","timestamp":1777455697000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169837"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,18]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12,24]]}},"alternative-id":["10.3233\/JIFS-169837"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169837","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,18]]}}}