References
[1] Al Yami, M., & Schaefer, D. (2019). FC as a complementary approach to cloud computing. In International Conference on Computer and Information Science (ICCIS), Jouf University, Al Jouf Region, Kingdom of Saudi Arabia. https://doi.org/10.1109/ICCISci.2019.8716402 [2] Dustdar, S., Avasalcai, C., & Murturi, I. (2019). Edge and FC: vision and research challenges. In 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE). IEEE. https://doi.org/10.1109/SOSE.2019.00023 [3] Ni, J., Zhang, K., Lin, X., & Shen, X. (2018). Securing fog computing for internet of things applications: challenges and solutions. IEEE Communications Surveys & Tutorials, 20(1), 601-628. https://doi.org/10.1109/COMST.2017.2762345 [4] Sookhak, M., Yu, F.R., Khan, .K. & Xiang. (2016). Attribute-Based Data Access Control in Cloud Computing: Taxonomy and Open Issues. Future Generation Computer Systems. Volume 72, July 2017, Pages 273-287 [5] Khan .S.,Parkinson .S. and Qin .Y. (2017). Fog computing security: a review of current applications and security solutions. Journal of Cloud Computing: Advances, Systems and Applications. (2017) 6:19 DOI 10.1186/s13677-017-0090-3 [6] Pfandzelter, T., Japke, N., Schirmer, T., Hasenburg, J., & Bermbach, D. (2023). Managing data replication and distribution in the fog with FReD. Software: Practice and Experience, 53, 1958 - 1981. [7] Alshiky .A.M., Buhari .S., and Barnawi A. (2017). Attribute Based Access Control (ABAC) for HER in Fog Computing Environment. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 7, No. 1, February 2017. DOI:10.5121/ijccsa.2017.7102 [8] Noura .H., Salman .O, Chehab .A., Couturier .R. (2019). Preserving data security in distributed fog computing. Ad Hoc Networks, 2019, 94, pp.101937 (16). ffhal-02366770f. [9] Ometov, A., Molua, O. L., Komarov, M., & Nurmi, J. (2022). A Survey of Security in Cloud, Edge, and Fog Computing. Sensors, 22(3), 927. https://doi.org/10.3390/s22030927 [10] Saleem, Ahsan & Khan, Abid & Malik, Saif & Pervaiz, Haris & Malik, Hassan & Alam, Muhammad & Jindal, Anish. (2019). FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network. IEEE Internet of Things Journal. PP. 1-1. 10.1109/JIOT.2019.2957314. [11] Kongara, Ravindranath & Reddy, M.S. & Reddy, M. & Chaitanya, D.. (2019). Secure data storage and retrieval in the cloud. International Journal of Innovative Technology and Exploring Engineering. 8. 34-38. 12] Zhu, T., Guo, J., Zhou, H., Zhou, X., & Zhou, A.-Y. (2018). Consistency and availability in distributed database systems. Ruan Jian Xue Bao/Journal of Software, 29(1), 131-149. https://doi.org/10.13328/j.cnki.jos.005433 [13] Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698. https://doi.org/10.1016/j.future.2016.11.009