{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:58:31Z","timestamp":1723017511443},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T00:00:00Z","timestamp":1454025600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"KHU","award":["2013[KHU-20130439]"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s11227-016-1634-x","type":"journal-article","created":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T12:56:27Z","timestamp":1454072187000},"page":"3677-3695","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":167,"title":["Health Fog: a novel framework for health and wellness applications"],"prefix":"10.1007","volume":"72","author":[{"given":"Mahmood","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Muhammad Bilal","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Shujaat","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Byeong Ho","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Taechoong","family":"Cheong","sequence":"additional","affiliation":[]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,29]]},"reference":[{"key":"1634_CR1","unstructured":"FitnessKeeper (2015) Runkeeper everyone every run. http:\/\/runkeeper.com\/"},{"key":"1634_CR2","unstructured":"Noom (2015) Noom help you to make a change. https:\/\/www.noom.com\/"},{"key":"1634_CR3","unstructured":"Azumio (2015) Argus quantify your day-to-day. http:\/\/www.azumio.com\/s\/argus\/index.html"},{"key":"1634_CR4","unstructured":"myfitnesspal (2015) Lose weight with myfitnesspal. https:\/\/www.myfitnesspal.com\/"},{"key":"1634_CR5","unstructured":"Fitocracy (2015) Fitocracy. https:\/\/www.fitocracy.com\/"},{"key":"1634_CR6","unstructured":"Digifit (2015) Digifit personal engagement solution. http:\/\/www.digifit.com\/personal-solutions.html"},{"key":"1634_CR7","unstructured":"MIOLink (2015) Mio train with heart. http:\/\/www.mioglobal.com"},{"key":"1634_CR8","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM, pp 13\u201316","DOI":"10.1145\/2342509.2342513"},{"key":"1634_CR9","unstructured":"Firstbrook P, MacDonald N (2015) The growing importance of cloud access security brokers. https:\/\/www.gartner.com\/doc\/2032015\/growing-importance-cloud-access-security"},{"key":"1634_CR10","unstructured":"HP cloud access security protection platform. Business white paper : Case for a cloud access security brokers. hp.com\/go\/CloudAccessSecurity, (2015)"},{"key":"1634_CR11","doi-asserted-by":"crossref","unstructured":"Fischlin M (2001) A cost-effective pay-per-multiplication comparison method for millionaires. In: Topics in Cryptology CT-RSA 2001, Springer. pp 457\u2013471","DOI":"10.1007\/3-540-45353-9_33"},{"issue":"05","key":"1634_CR12","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"Latanya Sweeney","year":"2002","unstructured":"Sweeney Latanya (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl Based Syst 10(05):571\u2013588","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"issue":"05","key":"1634_CR13","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"Latanya Sweeney","year":"2002","unstructured":"Sweeney Latanya (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"key":"1634_CR14","doi-asserted-by":"crossref","unstructured":"Evdokimov S, G\u00fcnther O (2007) Encryption techniques for secure database outsourcing. In: Computer Security\u2013ESORICS 2007, Springer, pp 327\u2013342","DOI":"10.1007\/978-3-540-74835-9_22"},{"key":"1634_CR15","unstructured":"De Capitani S, Di Vimercati FS, Jajodia S, Paraboschi S, Samarati P (2007) A data outsourcing architecture combining cryptography and access control. In: Proceedings of the 2007 ACM workshop on Computer security architecture, ACM, pp 63\u201369"},{"key":"1634_CR16","unstructured":"Curino C, Jones EPC, Popa RA, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N (2011) Relational cloud: a database-as-a-service for the cloud"},{"key":"1634_CR17","unstructured":"Google (2013) Google app engine. https:\/\/cloud.google.com\/products\/app-engine"},{"key":"1634_CR18","doi-asserted-by":"crossref","unstructured":"Shi Y, Ding G, Wang H, Roman HE, Lu S (2015) The fog computing service for healthcare. In: 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), IEEE, pp 1\u20135","DOI":"10.1109\/Ubi-HealthTech.2015.7203325"},{"key":"1634_CR19","doi-asserted-by":"crossref","unstructured":"Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), IEEE, pp 1\u20138","DOI":"10.15439\/2014F503"},{"key":"1634_CR20","doi-asserted-by":"crossref","unstructured":"Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: mitigating insider data theft attacks in the cloud. In: 2012 IEEE Symposium on Security and Privacy Workshops (SPW), IEEE, pp 125\u2013128","DOI":"10.1109\/SPW.2012.19"},{"key":"1634_CR21","doi-asserted-by":"crossref","unstructured":"Yannuzzi M, Milito R, Serral-Gracia R, Montero D, Nemirovsky M (2014) Key ingredients in an iot recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp 325\u2013329","DOI":"10.1109\/CAMAD.2014.7033259"},{"key":"1634_CR22","doi-asserted-by":"crossref","unstructured":"Paillier P (2000) Trapdooring discrete logarithms on elliptic curves over rings. In: Okamoto T (ed) Advances in CryptologyASI\u2014ACRYPT 2000. Springer, Berlin, Heidelberg, pp 573\u2013584","DOI":"10.1007\/3-540-44448-3_44"},{"key":"1634_CR23","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 17th international conference on Theory and application of cryptographic techniques, EUROCRYPT\u201999, Springer-Verlag, Berlin, Heidelberg, pp 223\u2013238","DOI":"10.1007\/3-540-48910-X_16"},{"key":"1634_CR24","doi-asserted-by":"crossref","unstructured":"Rolim CO, Koch FL, Westphall CB, Werner J, Fracalossi A, Salvador GS (2010) A cloud computing solution for patient\u2019s data collection in health care institutions. In: Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED\u201910, IEEE, pp. 95\u201399","DOI":"10.1109\/eTELEMED.2010.19"},{"key":"1634_CR25","doi-asserted-by":"crossref","unstructured":"Chen Y, Shen W, Huo H, Xu Y (2010) A smart gateway for health care system using wireless sensor network. In: 2010 Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM), IEEE, pp 545\u2013550","DOI":"10.1109\/SENSORCOMM.2010.88"},{"key":"1634_CR26","doi-asserted-by":"crossref","unstructured":"Laine TH, Lee C, Suk H (2014) Mobile gateway for ubiquitous health care system using zigbee and bluetooth. In: 014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2. IEEE, pp 139\u2013145","DOI":"10.1109\/IMIS.2014.17"},{"key":"1634_CR27","doi-asserted-by":"crossref","unstructured":"Yang S, Gerla M (2011) Personal gateway in mobile health monitoring. In: 011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2. IEEE, pp 636\u2013641","DOI":"10.1109\/PERCOMW.2011.5766966"},{"key":"1634_CR28","doi-asserted-by":"crossref","unstructured":"Hong K, Lillethun D, Ramachandran U, Ottenw\u00e4lder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing. ACM, pp 15\u201320","DOI":"10.1145\/2491266.2491270"},{"key":"1634_CR29","doi-asserted-by":"crossref","unstructured":"Gia TN, Rahmani MJAM, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet-of-things: a case study on ecg feature extraction","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.51"},{"key":"1634_CR30","doi-asserted-by":"crossref","unstructured":"Hussain J, Khan WA, Afzal M, Hussain M, Kang BH, Lee S (2014) Adaptive user interface and user experience based authoring tool for recommendation systems. In: Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. Springer, pp 136\u2013142","DOI":"10.1007\/978-3-319-13102-3_24"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-016-1634-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-016-1634-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-016-1634-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-016-1634-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T19:37:20Z","timestamp":1654198640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-016-1634-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,29]]},"references-count":30,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["1634"],"URL":"http:\/\/dx.doi.org\/10.1007\/s11227-016-1634-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,29]]}}}