{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T22:14:33Z","timestamp":1776204873191,"version":"3.50.1"},"reference-count":79,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Russian Science Foundation","award":["22-71-10046, 414"],"award-info":[{"award-number":["22-71-10046, 414"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Fog computing (FC) is a distributed architecture in which computing resources and services are placed on edge devices closer to data sources. This enables more efficient data processing, shorter latency times, and better performance. Fog computing was shown to be a promising solution for addressing the new computing requirements. However, there are still many challenges to overcome to utilize this new computing paradigm, in particular, reliability and security. Following this need, a systematic literature review was conducted to create a list of requirements. As a result, the following four key requirements were formulated: (1) low latency and response times; (2) scalability and resource management; (3) fault tolerance and redundancy; and (4) privacy and security. Low delay and response can be achieved through edge caching, edge real-time analyses and decision making, and mobile edge computing. Scalability and resource management can be enabled by edge federation, virtualization and containerization, and edge resource discovery and orchestration. Fault tolerance and redundancy can be enabled by backup and recovery mechanisms, data replication strategies, and disaster recovery plans, with a residual number system (RNS) being a promising solution. Data security and data privacy are manifested in strong authentication and authorization mechanisms, access control and authorization management, with fully homomorphic encryption (FHE) and the secret sharing system (SSS) being of particular interest.<\/jats:p>","DOI":"10.3390\/info15060317","type":"journal-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T06:58:07Z","timestamp":1716965887000},"page":"317","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Reliablity and Security for Fog Computing Systems"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2359-1291","authenticated-orcid":false,"given":"Egor","family":"Shiriaev","sequence":"first","affiliation":[{"name":"Faculty of Mathematics and Computer Science Named after Prof. N. I. Chervyakov, Department of Computational Mathematics and Cybernetics, North-Caucasus Federal University, 355017 Stavropol, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0864-3302","authenticated-orcid":false,"given":"Tatiana","family":"Ermakova","sequence":"additional","affiliation":[{"name":"School of Computing, Communication and Business, Hochschule f\u00fcr Technik und Wirtschaft, University of Applied Sciences for Engineering and Economics, 10318 Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7608-0452","authenticated-orcid":false,"given":"Ekaterina","family":"Bezuglova","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics and Computer Science Named after Prof. N. I. Chervyakov, Department of Computational Mathematics and Cybernetics, North-Caucasus Federal University, 355017 Stavropol, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8117-9142","authenticated-orcid":false,"given":"Maria A.","family":"Lapina","sequence":"additional","affiliation":[{"name":"Institute of Digital Development, Department of Information Security of Automated Systems, North-Caucasus Federal University, 355017 Stavropol, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7066-0061","authenticated-orcid":false,"given":"Mikhail","family":"Babenko","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics and Computer Science Named after Prof. N. I. Chervyakov, Department of Computational Mathematics and Cybernetics, North-Caucasus Federal University, 355017 Stavropol, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"ref_1","first-page":"25","article-title":"A Survey of Static Scheduling Algorithm for Distributed Computing System","volume":"129","author":"Singh","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Kratzke, N. (2018). A Brief History of Cloud Application Architectures. Appl. Sci., 8.","DOI":"10.3390\/app8081368"},{"key":"ref_3","unstructured":"Mell, P., and Grance, T. (2024, April 22). The NIST Definition of Cloud Computing. National Institute of Standards and Technology, Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/legacy\/sp\/nistspecialpublication800-145.pdf."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1177\/1932296817717007","article-title":"Fog Computing and Edge Computing Architectures for Processing Data From Diabetes Devices Connected to the Medical Internet of Things","volume":"11","author":"Klonoff","year":"2017","journal-title":"J. Diabetes Sci. Technol."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Abouaomar, A., Cherkaoui, S., Kobbane, A., and Dambri, O.A. (2019, January 9\u201313). A Resources Representation for Resource Allocation in Fog Computing Networks. Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA.","DOI":"10.1109\/GLOBECOM38437.2019.9014146"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/TCC.2015.2485206","article-title":"Assessment of the Suitability of Fog Computing in the Context of Internet of Things","volume":"6","author":"Sarkar","year":"2015","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_7","first-page":"32:1","article-title":"Fog Computing for Sustainable Smart Cities: A Survey","volume":"50","author":"Perera","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MCOMSTD.2018.1700057","article-title":"Enabling Fog Computing for Industrial Automation Through Time-Sensitive Networking (TSN)","volume":"2","author":"Pop","year":"2018","journal-title":"IEEE Commun. Stand. Mag."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Tiwari, R., Mittal, M., and Goyal, L.M. (2022). Energy Conservation Solutions for Fog-Edge Computing Paradigms, Springer.","DOI":"10.1007\/978-981-16-3448-2"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"9206","DOI":"10.1109\/ACCESS.2017.2704100","article-title":"Fog Computing in Healthcare\u2014A Review and Discussion","volume":"5","author":"Kraemer","year":"2017","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compeleceng.2018.08.015","article-title":"Fog Computing for Healthcare 4.0 Environment: Opportunities and Challenges","volume":"72","author":"Kumari","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Shi, Y., Ding, G., Wang, H., Roman, H.E., and Lu, S. (2015, January 28\u201330). The Fog Computing Service for Healthcare. Proceedings of the 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), Beijing, China.","DOI":"10.1109\/Ubi-HealthTech.2015.7203325"},{"key":"ref_13","first-page":"1401","article-title":"A Fog Computing-Based IoT Framework for Precision Agriculture","volume":"19","author":"Guardo","year":"2018","journal-title":"J. Internet Technol."},{"key":"ref_14","first-page":"100285","article-title":"A Creative IoT Agriculture Platform for Cloud Fog Computing","volume":"28","author":"Hsu","year":"2020","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3462513","article-title":"A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms","volume":"54","author":"Berger","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Yi, S., Li, C., and Li, Q. (2015, January 21). A Survey of Fog Computing: Concepts, Applications and Issues. Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou, China.","DOI":"10.1145\/2757384.2757397"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.ijinfomgt.2015.11.009","article-title":"Information Security Management Needs More Holistic Approach: A Literature Review","volume":"36","author":"Soomro","year":"2016","journal-title":"Int. J. Inf. Manag."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"103557","DOI":"10.1016\/j.jnca.2022.103557","article-title":"Fog Computing Approaches in IoT-Enabled Smart Cities","volume":"211","author":"Songhorabadi","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.icte.2021.05.004","article-title":"A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges","volume":"7","author":"Sabireen","year":"2021","journal-title":"ICT Express"},{"key":"ref_20","first-page":"266","article-title":"Fog computing and its real time applications","volume":"5","author":"Peter","year":"2015","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1016\/j.future.2020.06.016","article-title":"Design and Application of Fog Computing and Internet of Things Service Platform for Smart City","volume":"112","author":"Zhang","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Yi, S., Hao, Z., Qin, Z., and Li, Q. (2015, January 12\u201313). Fog Computing: Platform and Applications. Proceedings of the 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), Washington, DC, USA.","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Madsen, H., Burtschy, B., Albeanu, G., and Popentiu-Vladicescu, F.L. (2013, January 7\u20139). Reliability in the Utility Computing Era: Towards Reliable Fog Computing. Proceedings of the 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP), Bucharest, Romania.","DOI":"10.1109\/IWSSIP.2013.6623445"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Popentiu-Vladicescu, F., and Albeanu, G. (2017, January 5\u20137). Software Reliability in the Fog Computing. Proceedings of the 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), Karachi, Pakistan.","DOI":"10.1109\/ICIEECT.2017.7916578"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.1109\/JIOT.2021.3088417","article-title":"A Fault-Tolerant Model for Performance Optimization of a Fog Computing System","volume":"9","author":"Zhang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"7117","DOI":"10.1109\/ACCESS.2020.2964073","article-title":"Distributed Fog Computing for Latency and Reliability Guaranteed Swarm of Drones","volume":"8","author":"Hou","year":"2020","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"012007","DOI":"10.1088\/1742-6596\/1661\/1\/012007","article-title":"A Condition of Reliability Improvement of the System Based on the Fog-Computing Concept","volume":"1661","author":"Melnik","year":"2020","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Silhavy, R. (2020). Artificial Intelligence and Bioinspired Computational Methods, Springer International Publishing.","DOI":"10.1007\/978-3-030-51971-1"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1186\/s13677-017-0090-3","article-title":"Fog Computing Security: A Review of Current Applications and Security Solutions","volume":"6","author":"Khan","year":"2017","journal-title":"J. Cloud Comp."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1002\/cpe.3485","article-title":"An Overview of Fog Computing and Its Security Issues","volume":"28","author":"Stojmenovic","year":"2016","journal-title":"Concurr. Comput. Pract. Exper."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., and Wen, S. (2014, January 7\u201310). The Fog Computing Paradigm: Scenarios and Security Issues. Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland.","DOI":"10.15439\/2014F503"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Xu, K., and Zhu, H. (2015). Wireless Algorithms, Systems, and Applications, Springer International Publishing.","DOI":"10.1007\/978-3-319-21837-3"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.future.2018.05.008","article-title":"Security and Trust Issues in Fog Computing: A Survey","volume":"88","author":"Zhang","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_34","unstructured":"Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., and Priyan, M.K. (2018). Fog Computing: Breakthroughs in Research and Practice, IGI Global."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"102139","DOI":"10.1016\/j.scs.2020.102139","article-title":"Fog Computing for Sustainable Smart Cities in the IoT Era: Caching Techniques and Enabling Technologies\u2014An Overview","volume":"59","author":"Zahmatkesh","year":"2020","journal-title":"Sustain. Cities Soc."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"9244","DOI":"10.1109\/TVT.2020.3001301","article-title":"Capacity-Aware Edge Caching in Fog Computing Networks","volume":"69","author":"Li","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"7157192","DOI":"10.1155\/2018\/7157192","article-title":"Fog Computing: An Overview of Big IoT Data Analytics","volume":"2018","author":"Anawar","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","article-title":"A Survey on Mobile Edge Computing: The Communication Perspective","volume":"19","author":"Mao","year":"2017","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_39","first-page":"125:1","article-title":"A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet","volume":"52","author":"Ren","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Dolui, K., and Datta, S.K. (2017, January 6\u20139). Comparison of Edge Computing Implementations: Fog Computing, Cloudlet and Mobile Edge Computing. Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland.","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"e1386470","DOI":"10.1155\/2018\/1386470","article-title":"Fog Computing-Based IoT for Health Monitoring System","volume":"2018","author":"Paul","year":"2018","journal-title":"J. Sens."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.jnca.2017.04.007","article-title":"Load-Balancing Algorithms in Cloud Computing: A Survey","volume":"88","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Aote, S.S., and Kharat, M.U. (2009, January 28\u201329). A Game-Theoretic Model for Dynamic Load Balancing in Distributed Systems. Proceedings of the International Conference on Advances in Computing, Communication and Control, Bangalore, India.","DOI":"10.1145\/1523103.1523153"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Baihaqi, M.R., Negara, R.M., and Tulloh, R. (2022, January 8). Analysis of Load Balancing Performance Using Round Robin and IP Hash Algorithm on P4. Proceedings of the 2022 5th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia.","DOI":"10.1109\/ISRITI56927.2022.10052975"},{"key":"ref_45","first-page":"149","article-title":"Load Balancing in Cloud Computing: A Big Picture","volume":"32","author":"Mishra","year":"2020","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"120:1","DOI":"10.1145\/3281010","article-title":"Issues and Challenges of Load Balancing Techniques in Cloud Computing: A Survey","volume":"51","author":"Kumar","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref_47","first-page":"535","article-title":"A State Of Art Survey For Web Server Performance Measurement And Load Balancing Mechanisms","volume":"8","author":"Jader","year":"2019","journal-title":"Int. J. Sci. Technol. Res."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Chandak, A., and Ray, N.K. (2019, January 20\u201323). A Review of Load Balancing in Fog Computing. Proceedings of the 2019 International Conference on Information Technology (ICIT), Shanghai, China.","DOI":"10.1109\/ICIT48102.2019.00087"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.jpdc.2020.03.022","article-title":"Hybridization of Firefly and Improved Multi-Objective Particle Swarm Optimization Algorithm for Energy Efficient Load Balancing in Cloud Computing Environments","volume":"142","author":"Devaraj","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"e3896065","DOI":"10.1155\/2016\/3896065","article-title":"Load Balancing in Cloud Computing Environment Using Improved Weighted Round Robin Algorithm for Nonpreemptive Dependent Tasks","volume":"2016","author":"Devi","year":"2016","journal-title":"Sci. World J."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"4548","DOI":"10.1109\/TII.2018.2818932","article-title":"Fog Computing for Energy-Aware Load Balancing and Scheduling in Smart Factory","volume":"14","author":"Wan","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/CC.2016.7445510","article-title":"Fog Computing Dynamic Load Balancing Mechanism Based on Graph Repartitioning","volume":"13","author":"Ningning","year":"2016","journal-title":"China Commun."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Savi, M., Santoro, D., Di Meo, K., Pizzolli, D., Pincheira, M., Giaffreda, R., Cretti, S., Kum, S., and Siracusa, D. (2020, January 24\u201327). A Blockchain-Based Brokerage Platform for Fog Computing Resource Federation. Proceedings of the 2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France.","DOI":"10.1109\/ICIN48450.2020.9059337"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Veillon, V., Denninnart, C., and Salehi, M.A. (2019, January 14\u201317). F-FDN: Federation of Fog Computing Systems for Low Latency Video Streaming. Proceedings of the 2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC), Larnaca, Cyprus.","DOI":"10.1109\/CFEC.2019.8733154"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Sri Raghavendra, M., and Chawla, P. (2018, January 29\u201331). A Review on Container-Based Lightweight Virtualization for Fog Computing. Proceedings of the 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India.","DOI":"10.1109\/ICRITO.2018.8748346"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Bellavista, P., and Zanni, A. (2017, January 5\u20137). Feasibility of Fog Computing Deployment Based on Docker Containerization over RaspberryPi. Proceedings of the 18th International Conference on Distributed Computing and Networking, Hyderabad, India.","DOI":"10.1145\/3007748.3007777"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Hoque, S., De Brito, M.S., Willner, A., Keil, O., and Magedanz, T. (2017, January 4\u20138). Towards Container Orchestration in Fog Computing Infrastructures. Proceedings of the 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy.","DOI":"10.1109\/COMPSAC.2017.248"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Santoro, D., Zozin, D., Pizzolli, D., De Pellegrini, F., and Cretti, S. (2017, January 11\u201314). Foggy: A Platform for Workload Orchestration in a Fog Computing Environment. Proceedings of the 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Hong Kong.","DOI":"10.1109\/CloudCom.2017.62"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/MNET.2017.1700271","article-title":"Challenges and Solutions in Fog Computing Orchestration","volume":"32","author":"Jiang","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_60","unstructured":"OASIS Topology and Orchestration Specification for Cloud Applications (TOSCA) TC (2024, April 22). Topology and Orchestration Specification for Cloud Applications Version 1.0. Available online: http:\/\/docs.oasis-open.org\/tosca\/TOSCA\/v1.0\/TOSCA-v1.0.html."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.matcom.2020.04.031","article-title":"Application of the Residue Number System to Reduce Hardware Costs of the Convolutional Neural Network Implementation","volume":"177","author":"Valueva","year":"2020","journal-title":"Math. Comput. Simul."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Babenko, M., Tchernykh, A., Pulido-Gaytan, B., Cort\u00e9s-Mendoza, J.M., Shiryaev, E., Golimblevskaia, E., Avetisyan, A., and Nesmachnow, S. (2021, January 17\u201321). RRNS Base Extension Error-Correcting Code for Performance Optimization of Scalable Reliable Distributed Cloud Data Storage. Proceedings of the 2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Portland, OR, USA.","DOI":"10.1109\/IPDPSW52791.2021.00087"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Tay, T.F., and Chang, C.-H. (2014, January 1\u20135). A New Algorithm for Single Residue Digit Error Correction in Redundant Residue Number System. Proceedings of the 2014 IEEE International Symposium on Circuits and Systems (ISCAS), Melbourne, Australia.","DOI":"10.1109\/ISCAS.2014.6865493"},{"key":"ref_64","unstructured":"Mohan, P.V.A. (2016). Residue Number Systems: Theory and Applications, Springer International Publishing."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCAS.2015.2484118","article-title":"Residue Number Systems: A New Paradigm to Datapath Optimization for Low-Power and High-Performance Digital Signal Processing Applications","volume":"15","author":"Chang","year":"2015","journal-title":"IEEE Circ. Syst. Mag."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2009). A Fully Homomorphic Encryption Scheme. [Ph.D. Thesis, Stanford University].","DOI":"10.1145\/1536414.1536440"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Takagi, T., and Peyrin, T. (2017). Advances in Cryptology\u2014ASIACRYPT 2017, Springer International Publishing.","DOI":"10.1007\/978-3-319-70700-6"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"46938","DOI":"10.1109\/ACCESS.2018.2866697","article-title":"Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption","volume":"6","author":"Cheon","year":"2018","journal-title":"IEEE Access"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Moriai, S., and Wang, H. (2020). Advances in Cryptology\u2014ASIACRYPT 2020, Springer International Publishing.","DOI":"10.1007\/978-3-030-64837-4"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Kim, S., Lee, K., Cho, W., Cheon, J.H., and Rutenbar, R.A. (2019, January 9\u201311). FPGA-Based Accelerators of Fully Pipelined Modular Multipliers for Homomorphic Encryption. Proceedings of the 2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig), Cancun, Mexico.","DOI":"10.1109\/ReConFig48160.2019.8994793"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/TETC.2019.2902799","article-title":"Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme","volume":"9","author":"Polyakov","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Gomathisankaran, M., Tyagi, A., and Namuduri, K. (2011, January 23\u201325). HORNS: A Homomorphic Encryption Scheme for Cloud Computing Using Residue Number System. Proceedings of the 2011 45th Annual Conference on Information Sciences and Systems, Baltimore, MD, USA.","DOI":"10.1109\/CISS.2011.5766176"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Canteaut, A., and Standaert, F.-X. (2021). Advances in Cryptology\u2014EUROCRYPT 2021, Springer International Publishing.","DOI":"10.1007\/978-3-030-77870-5"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Goyal, V., and Kumar, A. (2018, January 25\u201329). Non-Malleable Secret Sharing. Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, Los Angeles, CA, USA.","DOI":"10.1145\/3188745.3188872"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Ishai, Y., and Rijmen, V. (2019). Advances in Cryptology\u2014EUROCRYPT 2019, Springer International Publishing.","DOI":"10.1007\/978-3-030-17653-2"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Tchernykh, A., Alikhanov, A., Babenko, M., and Samoylenko, I. (2022). Mathematics and its Applications in New Computer Systems, Springer International Publishing.","DOI":"10.1007\/978-3-030-97020-8"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Nesmachnow, S., and Hern\u00e1ndez Callejo, L. (2023). Smart Cities, Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-28454-0"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Boyle, E., Gilboa, N., and Ishai, Y. (2016, January 24\u201328). Function Secret Sharing: Improvements and Extensions. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978429"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3586181","article-title":"Computational Resource Allocation in Fog Computing: A Comprehensive Survey","volume":"55","author":"Bachiega","year":"2023","journal-title":"ACM Comput. Surv."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/6\/317\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:50:07Z","timestamp":1760107807000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/6\/317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,29]]},"references-count":79,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["info15060317"],"URL":"https:\/\/doi.org\/10.3390\/info15060317","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,29]]}}}