{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T10:05:30Z","timestamp":1722938730732},"publisher-location":"New York, New York, USA","reference-count":18,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,4,23]],"date-time":"2017-04-23T00:00:00Z","timestamp":1492905600000},"content-version":"vor","delay-in-days":112,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3069383.3069385","type":"proceedings-article","created":{"date-parts":[[2017,4,20]],"date-time":"2017-04-20T08:33:27Z","timestamp":1492677207000},"page":"1-6","source":"Crossref","is-referenced-by-count":24,"title":["Securing combined Fog-to-Cloud system Through SDN Approach"],"prefix":"10.1145","author":[{"given":"Sarang","family":"Kahvazadeh","sequence":"first","affiliation":[{"name":"Advanced Network Architectures Lab (CRAAX), Universitat Politcnica de Catalunya (UPC), Spain"}]},{"given":"Vitor B.","family":"Souza","sequence":"additional","affiliation":[{"name":"Advanced Network Architectures Lab (CRAAX), Universitat Politcnica de Catalunya (UPC), Spain"}]},{"given":"Xavi","family":"Masip-Bruin","sequence":"additional","affiliation":[{"name":"Advanced Network Architectures Lab (CRAAX), Universitat Politcnica de Catalunya (UPC), Spain"}]},{"given":"Eva","family":"Marn-Tordera","sequence":"additional","affiliation":[{"name":"Advanced Network Architectures Lab (CRAAX), Universitat Politcnica de Catalunya (UPC), Spain"}]},{"given":"Jordi","family":"Garcia","sequence":"additional","affiliation":[{"name":"Advanced Network Architectures Lab (CRAAX), Universitat Politcnica de Catalunya (UPC), Spain"}]},{"given":"Rodrigo","family":"Diaz","sequence":"additional","affiliation":[{"name":"Cybersecurity Lab, Atos Spain"}]}],"member":"320","reference":[{"key":"key-10.1145\/3069383.3069385-1","unstructured":"J.Gonzalez-Martnez, et al., Cloud computing and education: A state-ofthe-art survey, Computers & Education 80 (2015) 132--151, 2014."},{"key":"key-10.1145\/3069383.3069385-2","unstructured":"S.Singh, Y. Jeong, J. H. Park, A survey on cloud computing security: Issues, threats, and solutions, Journal of Network and Computer Applications 75 (2016) 200222, 2016 Elsevier."},{"key":"key-10.1145\/3069383.3069385-3","doi-asserted-by":"crossref","unstructured":"F. Bonomi, et al., Fog Computing: A Platform for Internet of Things and Analytics, Big Data and Internet of Things: A Roadmap for Smart Environments Vol. 546 of Studies in Computational Intelligence 2014.","DOI":"10.1007\/978-3-319-05029-4_7"},{"key":"key-10.1145\/3069383.3069385-4","doi-asserted-by":"crossref","unstructured":"X. Masip-Bruin, et al., Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud (F2C) computing systems, IEEE Wireless Communication Magazine, October 2016.","DOI":"10.1109\/MWC.2016.7721750"},{"key":"key-10.1145\/3069383.3069385-5","unstructured":"Hongwei Li1, Yuanshun Dai1, Ling Tian1, and Haomiao Yang, Identity-based Authentication for Cloud Computing, Springer-Verlag Berlin Heidelberg, 2009."},{"key":"key-10.1145\/3069383.3069385-6","doi-asserted-by":"crossref","unstructured":"Dr.N. Venakatesan, M. Rathan Kumar, Finger Print Authentication F or Improved Cloud Security,International Conference on Computational Systems and Information Systems for Sustainable Solutions, 2016","DOI":"10.1109\/CSITSS.2016.7779401"},{"key":"key-10.1145\/3069383.3069385-7","unstructured":"Sin-Fu Lai, Hui-Kai Su, Wen-Hsu Hsiao, Kim-Joan Chen, Design and Implementation of Cloud Security Defense System with Software"},{"key":"key-10.1145\/3069383.3069385-8","unstructured":"N.Jayapandian, Dr.A.M.J.Md.Zubair Rahman, M.Koushikaa, S.Radhikadev, A Novel Approach to Enhance Multi Level Security System Using Encryption with Fingerprint in Cloud, World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR16)"},{"key":"key-10.1145\/3069383.3069385-9","unstructured":"Bhale Pradeepkumar Gajendra, Vinay Kumar Singh, More Sujeet, Achieving Cloud Security using Third Party Auditor, MD5 and Identity Based Encryption, International Conference on Computing, Communication and Automation (ICCCA2016)."},{"key":"key-10.1145\/3069383.3069385-10","doi-asserted-by":"crossref","unstructured":"Akashdeep Bhardwaj, GVB Subrahmanyam, Vinay Avasthi, Hanumat Sastry, Security Algorithms for Cloud Computing, International Conference on Computational Modeling and Security (CMS 2016).","DOI":"10.1016\/j.procs.2016.05.215"},{"key":"key-10.1145\/3069383.3069385-11","doi-asserted-by":"crossref","unstructured":"Y. Li, et al., A SDN-based Architecture for Horizontal Internet of Things Services, Communications (ICC), 2016.","DOI":"10.1109\/ICC.2016.7511053"},{"key":"key-10.1145\/3069383.3069385-12","doi-asserted-by":"publisher","unstructured":"C. Gonzlez, et al., A Novel Distributed SDN-Secured Architecture for the IoT, 2016 Int. Conf. on Distributed Computing in Sensor Systems.","DOI":"10.1109\/DCOSS.2016.22"},{"key":"key-10.1145\/3069383.3069385-13","unstructured":"Vandana C.P, Security improvement in IoT based on Software Defined Networking (SDN), International Journal of Science, Engineering and Technology Research (IJSETR), Volume 5, Issue 1, January 2016"},{"key":"key-10.1145\/3069383.3069385-14","unstructured":"F. Hu, Q. Hao, K. Bao, A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation, IEEE Communications"},{"key":"key-10.1145\/3069383.3069385-15","unstructured":"V. Souza, et al., Insights into the Service Execution in a Combined Fogto-Cloud (F2C) Computing System. 2016, Technical report. http:\/\/www.ac.upc.edu\/app\/research-reports\/html\/RR\/2016\/10.pdf"},{"key":"key-10.1145\/3069383.3069385-16","unstructured":"CIPSEC project at www.cipsec.eu"},{"key":"key-10.1145\/3069383.3069385-17","doi-asserted-by":"publisher","unstructured":"H. Li, et al., Identity-based authentication for cloud computing. In IEEE International Conference on Cloud Computing. Springer, 2009. 157--1","DOI":"10.1007\/978-3-642-10665-1_14"},{"key":"key-10.1145\/3069383.3069385-18","doi-asserted-by":"crossref","unstructured":"C. Dsouza, et al, Policy-driven security management for fog computing: Preliminary framework and a case study. IEEE 15th International Conference on Information Reuse and Integration (IRI). 2014.","DOI":"10.1109\/IRI.2014.7051866"}],"event":{"number":"4","sponsor":["SIGOPS, ACM Special Interest Group on Operating Systems"],"acronym":"Crosscloud'17","name":"the 4th Workshop","start":{"date-parts":[[2017,4,23]]},"location":"Belgrade, Serbia","end":{"date-parts":[[2017,4,26]]}},"container-title":["Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms - Crosscloud'17"],"original-title":[],"link":[{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3069385&ftid=1866749&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T07:28:21Z","timestamp":1569050901000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3069383.3069385"}},"subtitle":[],"proceedings-subject":"CrossCloud Infrastructures & Platforms","short-title":[],"issued":{"date-parts":[[2017]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1145\/3069383.3069385","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}