{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T00:02:33Z","timestamp":1705968153137},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T00:00:00Z","timestamp":1693180800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T00:00:00Z","timestamp":1693180800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11227-023-05576-7","type":"journal-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T15:05:52Z","timestamp":1693235152000},"page":"3089-3113","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Clustering-based data integrity verification approach for multi-replica in a fog environment"],"prefix":"10.1007","volume":"80","author":[{"given":"K. Uma","family":"Maheswari","sequence":"first","affiliation":[]},{"given":"S. Mary Saira","family":"Bhanu","sequence":"additional","affiliation":[]},{"given":"Nickolas","family":"Savarimuthu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,28]]},"reference":[{"issue":"2","key":"5576_CR1","doi-asserted-by":"publisher","first-page":"1983","DOI":"10.1007\/s11227-021-03941-y","volume":"78","author":"K Gasmi","year":"2022","unstructured":"Gasmi K, Dilek S, Tosun S et al (2022) A survey on computation offloading and service placement in fog computing-based iot. J Supercomput 78(2):1983\u20132014. https:\/\/doi.org\/10.1007\/s11227-021-03941-y","journal-title":"J Supercomput"},{"key":"5576_CR2","unstructured":"Statista (????) Internet of things (iot) connected devices installed base worldwide from 2015 to 2025 (2016). https:\/\/www.statista.com\/statistics\/471264\/iot-number-ofconnected-devices-worldwide\/"},{"key":"5576_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1158-z","volume":"43","author":"M Talal","year":"2019","unstructured":"Talal M, Zaidan A, Zaidan B et al (2019) Smart home-based iot for real-time and secure remote health monitoring of triage and priority system using body sensors: multi-driven systematic review. J Med Syst 43:1\u201334. https:\/\/doi.org\/10.1007\/s10916-019-1158-z","journal-title":"J Med Syst"},{"key":"5576_CR4","doi-asserted-by":"publisher","unstructured":"Dastjerdi AV, Gupta H, Calheiros RN et\u00a0al (2016) Fog computing: principles, architectures, and applications. In: Internet of Things. Morgan Kaufmann, Massachusetts, pp 61\u201375. https:\/\/doi.org\/10.1016\/B978-0-12-805395-9.00004-6","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"issue":"1","key":"5576_CR5","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCC.2015.2485206","volume":"6","author":"S Sarkar","year":"2015","unstructured":"Sarkar S, Chatterjee S, Misra S (2015) Assessment of the suitability of fog computing in the context of internet of things. IEEE Trans Cloud Comput 6(1):46\u201359. https:\/\/doi.org\/10.1109\/TCC.2015.2485206","journal-title":"IEEE Trans Cloud Comput"},{"key":"5576_CR6","doi-asserted-by":"publisher","first-page":"2070","DOI":"10.1007\/s11227-018-2701-2","volume":"75","author":"SP Singh","year":"2019","unstructured":"Singh SP, Nayyar A, Kumar R et al (2019) Fog computing: from architecture to edge computing and big data processing. J Supercomput 75:2070\u20132105. https:\/\/doi.org\/10.1007\/s11227-018-2701-2","journal-title":"J Supercomput"},{"key":"5576_CR7","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1007\/s11265-019-1444-5","volume":"91","author":"T Huang","year":"2019","unstructured":"Huang T, Lin W, Li Y et al (2019) A latency-aware multiple data replicas placement strategy for fog computing. J Signal Process Syst 91:1191\u20131204. https:\/\/doi.org\/10.1007\/s11265-019-1444-5","journal-title":"J Signal Process Syst"},{"key":"5576_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04674-2","author":"J Kaur","year":"2022","unstructured":"Kaur J, Kumar R, Agrawal A et al (2022) A neutrosophic ahp-based computational technique for security management in a fog computing network. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-022-04674-2","journal-title":"J Supercomput"},{"key":"5576_CR9","doi-asserted-by":"publisher","first-page":"3677","DOI":"10.1007\/s11227-016-1634-x","volume":"72","author":"M Ahmad","year":"2016","unstructured":"Ahmad M, Amin MB, Hussain S et al (2016) Health fog: a novel framework for health and wellness applications. J Supercomput 72:3677\u20133695","journal-title":"J Supercomput"},{"key":"5576_CR10","doi-asserted-by":"publisher","unstructured":"Ateniese G, Burns R, Curtmola R et\u00a0al (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 598\u2013609. https:\/\/doi.org\/10.1145\/1315245.1315318","DOI":"10.1145\/1315245.1315318"},{"issue":"11","key":"5576_CR11","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1109\/TIFS.2016.2587242","volume":"11","author":"J Li","year":"2016","unstructured":"Li J, Zhang L, Liu JK et al (2016) Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans Inf Forensics Secur 11(11):2572\u20132583. https:\/\/doi.org\/10.1109\/TIFS.2016.2587242","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"5576_CR12","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu Y, Au MH, Ateniese G et al (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767\u2013778. https:\/\/doi.org\/10.1109\/TIFS.2016.2615853","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5576_CR13","doi-asserted-by":"publisher","unstructured":"Juels A, Kaliski\u00a0Jr BS (2007) Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 584\u2013597. https:\/\/doi.org\/10.1145\/1315245.1315317","DOI":"10.1145\/1315245.1315317"},{"key":"5576_CR14","doi-asserted-by":"publisher","unstructured":"Du R, Deng L, Chen J et\u00a0al (2014) Proofs of ownership and retrievability in cloud storage. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, pp 328\u2013335. https:\/\/doi.org\/10.1109\/TrustCom.2014.44","DOI":"10.1109\/TrustCom.2014.44"},{"issue":"27","key":"5576_CR15","doi-asserted-by":"publisher","first-page":"39,229","DOI":"10.1007\/s11042-022-13089-3","volume":"81","author":"CE Balmany","year":"2022","unstructured":"Balmany CE, Asimi A, Bamarouf M et al (2022) Dynamic proof of retrievability based on public auditing for coded secure cloud storage. Multimed Tools Appl 81(27):39,229-39,249. https:\/\/doi.org\/10.1007\/s11042-022-13089-3","journal-title":"Multimed Tools Appl"},{"key":"5576_CR16","doi-asserted-by":"publisher","unstructured":"Curtmola R, Khan O, Burns R et\u00a0al (2008) Mr-pdp: multiple-replica provable data possession. In: 2008 the 28th International Conference on Distributed Computing Systems. IEEE, pp 411\u2013420. https:\/\/doi.org\/10.1109\/ICDCS.2008.68","DOI":"10.1109\/ICDCS.2008.68"},{"issue":"4","key":"5576_CR17","doi-asserted-by":"publisher","first-page":"2838","DOI":"10.1109\/TDSC.2021.3075984","volume":"19","author":"Y Su","year":"2021","unstructured":"Su Y, Li Y, Yang B et al (2021) Decentralized self-auditing scheme with errors localization for multi-cloud storage. IEEE Trans Dependable Secur Comput 19(4):2838\u20132850. https:\/\/doi.org\/10.1109\/TDSC.2021.3075984","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"1","key":"5576_CR18","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TCC.2019.2929045","volume":"10","author":"J Li","year":"2019","unstructured":"Li J, Yan H, Zhang Y (2019) Efficient identity-based provable multi-copy data possession in multi-cloud storage. IEEE Trans Cloud Comput 10(1):356\u2013365. https:\/\/doi.org\/10.1109\/TCC.2019.2929045","journal-title":"IEEE Trans Cloud Comput"},{"issue":"9","key":"5576_CR19","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1109\/TC.2014.2375190","volume":"64","author":"C Liu","year":"2014","unstructured":"Liu C, Ranjan R, Yang C et al (2014) Mur-dpa: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans Comput 64(9):2609\u20132622. https:\/\/doi.org\/10.1109\/TC.2014.2375190","journal-title":"IEEE Trans Comput"},{"key":"5576_CR20","doi-asserted-by":"publisher","first-page":"75,117","DOI":"10.1109\/ACCESS.2021.3079143","volume":"9","author":"Z Liu","year":"2021","unstructured":"Liu Z, Liu Y, Yang X et al (2021) Integrity auditing for multi-copy in cloud storage based on red-black tree. IEEE Access 9:75,117-75,131. https:\/\/doi.org\/10.1109\/ACCESS.2021.3079143","journal-title":"IEEE Access"},{"issue":"102","key":"5576_CR21","first-page":"526","volume":"119","author":"J Wang","year":"2021","unstructured":"Wang J, Wei B, Zhang J et al (2021) An optimized transaction verification method for trustworthy blockchain-enabled iiot. Ad Hoc Netw 119(102):526","journal-title":"Ad Hoc Netw"},{"issue":"3","key":"5576_CR22","doi-asserted-by":"publisher","first-page":"521","DOI":"10.32604\/csse.2021.014530","volume":"36","author":"J Zhang","year":"2021","unstructured":"Zhang J, Zhong S, Wang J et al (2021) A storage optimization scheme for blockchain transaction databases. Comput Syst Sci Eng 36(3):521\u2013535","journal-title":"Comput Syst Sci Eng"},{"issue":"1","key":"5576_CR23","first-page":"1","volume":"21","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhong S, Wang T et al (2020) Blockchain-based systems and applications: a survey. J Internet Technol 21(1):1\u201314","journal-title":"J Internet Technol"},{"issue":"3","key":"5576_CR24","first-page":"2365","volume":"65","author":"J Wang","year":"2020","unstructured":"Wang J, Chen W, Wang L et al (2020) Data secure storage mechanism of sensor networks based on blockchain. Comput Mater Contin 65(3):2365\u20132384","journal-title":"Comput Mater Contin"},{"issue":"101","key":"5576_CR25","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1016\/j.adhoc.2019.101937","volume":"94","author":"H Noura","year":"2019","unstructured":"Noura H, Salman O, Chehab A et al (2019) Preserving data security in distributed fog computing. Ad Hoc Netw 94(101):937. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101937","journal-title":"Ad Hoc Netw"},{"key":"5576_CR26","doi-asserted-by":"publisher","unstructured":"Shu Y, Dong M, Ota K et\u00a0al (2018) Binary reed-solomon coding based distributed storage scheme in information-centric fog networks. In: 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, pp 1\u20135. https:\/\/doi.org\/10.1109\/CAMAD.2018.8514998","DOI":"10.1109\/CAMAD.2018.8514998"},{"issue":"104","key":"5576_CR27","first-page":"743","volume":"110","author":"AE Ezugwu","year":"2022","unstructured":"Ezugwu AE, Ikotun AM, Oyelade OO et al (2022) A comprehensive survey of clustering algorithms: state-of-the-art machine learning applications, taxonomy, challenges, and future research prospects. Eng Appl Artif Intell 110(104):743","journal-title":"Eng Appl Artif Intell"},{"issue":"1","key":"5576_CR28","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/TIFS.2005.863502","volume":"1","author":"V Monga","year":"2006","unstructured":"Monga V, Banerjee A, Evans BL (2006) A clustering based approach to perceptual image hashing. IEEE Trans Inf Forensics Secur 1(1):68\u201379","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5576_CR29","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","volume":"78","author":"WC Lin","year":"2015","unstructured":"Lin WC, Ke SW, Tsai CF (2015) Cann: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl Based Syst 78:13\u201321","journal-title":"Knowl Based Syst"},{"key":"5576_CR30","doi-asserted-by":"crossref","unstructured":"Zahra SR, Chishti MA (2020) Fuzzy logic and fog based secure architecture for internet of things (flfsiot). J Ambient Intell Humaniz Comput 1\u201325","DOI":"10.1007\/s12652-020-02128-2"},{"key":"5576_CR31","doi-asserted-by":"crossref","unstructured":"Tukur YM, Thakker D, Awan IU (2019) Multi-layer approach to internet of things (iot) security. In: 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, pp 109\u2013116","DOI":"10.1109\/FiCloud.2019.00023"},{"issue":"5","key":"5576_CR32","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin J, Yu W, Zhang N et al (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125\u20131142","journal-title":"IEEE Internet Things J"},{"key":"5576_CR33","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/j.procs.2020.07.085","volume":"175","author":"K Aarika","year":"2020","unstructured":"Aarika K, Bouhlal M, Abdelouahid RA et al (2020) Perception layer security in the internet of things. Procedia Comput Sci 175:591\u2013596","journal-title":"Procedia Comput Sci"},{"key":"5576_CR34","doi-asserted-by":"crossref","unstructured":"Tukur YM, Ali YS (2019) Demonstrating the effect of insider attacks on perception layer of internet of things (iot) systems. In: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO). IEEE, pp 1\u20136","DOI":"10.1109\/ICECCO48375.2019.9043248"},{"key":"5576_CR35","doi-asserted-by":"publisher","unstructured":"Wu X (2016) Data sets replicas placements strategy from cost-effective view in the cloud. Scientific Programming 2016. https:\/\/doi.org\/10.1155\/2016\/1496714","DOI":"10.1155\/2016\/1496714"},{"key":"5576_CR36","doi-asserted-by":"publisher","unstructured":"Mayer R, Gupta H, Saurez E et\u00a0al (2017) Fogstore: toward a distributed data store for fog computing. In: 2017 IEEE Fog World Congress (FWC). IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/FWC.2017.8368524","DOI":"10.1109\/FWC.2017.8368524"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05576-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05576-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05576-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T11:04:55Z","timestamp":1705921495000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05576-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,28]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["5576"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05576-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,28]]},"assertion":[{"value":"3 August 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The proposed work does not include any ethically approved human or animal experiments.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}