[BACK]
Computers, Materials & Continua
DOI:10.32604/cmc.2020.013025
images
Article

Fog-Based Secure Framework for Personal Health Records Systems

Lewis Nkenyereye1,*, S. M. Riazul Islam2, Mahmud Hossain3, M. Abdullah-Al-Wadud4 and Atif Alamri4

1Department of Computer & Information Security, Sejong University, Seoul, 05006, Korea
2Department of Computer Science and Engineering, Sejong University, Seoul, 05006, Korea
3Department of Computer Science, University of Alabama at Birmingham, Birmingham, AL, 35294, USA
4Department of Software Engineering, King Saud University, Riyadh, 11543, Saudi Arabia
*Corresponding Author: Lewis Nkenyereye. Email: nkenyele@sejong.ac.kr
Received: 22 July 2020; Accepted: 26 September 2020

Abstract: The rapid development of personal health records (PHR) systems enables an individual to collect, create, store and share his PHR to authorized entities. Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions’ repositories located in the cloud. The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency, scalability and bandwidth. Fog computing relieves the load of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers. Assuming a massive demand of PHR data within a ubiquitous smart city, we propose a secure and fog assisted framework for PHR systems to address security, access control and privacy concerns. Built under a fog-based architecture, the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption (CP-ABE) to guarantee confidentiality and fine-grained access control within the system respectively. We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy. We provide the analysis of the proposed framework in terms of security and performance.

Keywords: Fog computing; personal health records; ciphertext attribute based encryption; secure communications

1  Introduction

Personal health records (PHR) service consist of safely storing the patients records. These files contain the extensive summary of the patients medical history. With the advancement of the technology, the PHR management systems are predicted to allow a patient to create, manage, control and most importantly to share the PHR with a range of people and entities such as friends, medical doctors, nurses or any other authorized institution [1]. Thus, a patient can use his mobile device to perform all those operations. In 1996, the health insurance portability and accountability act (HIPAA) was released as an international law which requires a rigorous privacy and security for the patients and their PHR data. Lately, with the development of cloud computing, dedicated servers are outsourced by health agencies to store the PHR data [2]. Hence, causing several security, access control and privacy related concerns. In this regards, several access control protocol coupled with privacy preserving techniques were proposed both in industry and academia.

The most suggested technique to guarantee security, privacy and access control in healthcare environment is attribute based encryption (ABE). ABE can enable a patient to encrypt his/her PHR before storing them in outsourced cloud servers. The patient can specify through the ABE which person or entity is authorized to recover the PHR [3]. A typical example is a patient Bob who is recommended to take additional medical tests in a hospital which is different from the one he usually goes to. In order to proceed, Bob needs to share this existing PHR data to medical teams in that hospital. But Bob does not want to share his PHR data to the whole team, he wants to specify which data will be accessed by the nurses, the medical doctors or others. ABE will then allow the PHR users with corresponding secret keys to access the encrypted data since the decryptors in ABE need to have sufficient attributes to meet the designated access structure. ABE schemes are suggested in two main forms: KP-ABE and CP-ABE. In Key policy ABE (KP-ABE), the secret key of a given user are linked by an access structure set by an attribute authority (AA). However, in ciphertext policy ABE (CP-ABE), the ciphertext is directly linked with an access structure, which is set by the encryptor while the user secret keys are directly attached with a set of attribute. Thus, for an PHR scenario, the patient can first specify an access structure in ABE which a decryptor (PHR user) needs to satisfy before recovering the data.

In this work, the concept of public domain (PUD) healthcare system was adopted. This notion assumes that the PHR users are very diversified. The PHR data might be needed by a range of authorized institutions beside the medical doctors and nurses. For instance, the patient can share his designated PHR data such as his height and weight to a gymnasium manager or any other sport based center. Thus, a need for a scalable and secure platform which can allow all the entities in PHR system to communicate is appealing. It is also worth mentioning that PHR data may include several media files such as pictures that would require sufficient computational capabilities.

Fog computing was announced by Cisco as a scalable platform which would relieve the computational and communication burden from the remote servers located in the cloud and avails intermediate layer of fixed servers between the cloud servers and the IoT devices [4]. Several researchers have investigated on fog computing, specifically focusing on the quality of service (QoS) and quality of experience (QoS) . There are also a number of articles that investigated on security, privacy and access in fog based architectures. While the majority of the existing work focus on IoT, vehicular communications, smart grids and others; there are not pertinent work that address both access control, security, privacy preserving and fog-based scalability for the PHR systems. One of the relevant work in field was conducted by the researchers in [5]. They investigated pervasive health monitoring systems by achieving low latency and lightweight overhead for network congestion through fog computing. Their proposed scheme focused on patients that suffered from falls and strokes and provided a real time detection data analysis using fog computing. In this work, security, privacy, and access control concerns were not addressed specifically for PUD based healthcare systems.

Consequently, looking at the security, privacy and access control requirements for PHR systems, the need of a scalable PHR system that can both offer security and quality of service within a PUD based healthcare system, the features of fog computing in terms of latency and lightweight network congestion, we are appealed to design a secure, privacy preserving protocol for public domain PHR over a fog -based architecture to address the afore mentioned limitations. The contribution of the proposed work is summarized as follows:

We first design an architectural model for secure and privacy preserving scheme for public domain PHR under a fog computing architecture. The proposed scheme allow the public domains entities in the PHR such as gymnasium to securely communicate with the PHR owner.

We design a secure protocol for public domain PHR over fog computing by combining the techniques of CP-ABE in order to offer security and access control coupled with digital signature technique.

We further proceed with the analysis of the proposed protocol in terms of security objectives, transmission overhead caused by the additional security primitives within the PHR and the simulation.

The remainder of this paper is structured as this. We first present the current state of art secure PRH systems, fog based computing architectures in Section 2. In Section 3, we outline the system model for the proposed scheme along with the basic security primitives for designing the proposed scheme. The proposed secure protocol is built in Section 4. We conduct the security analysis and simulation performance of the proposed protocol in Section 5 and draw the concluding remarks and future work in Section 6.

2  Related Work

In the following section, we l discuss current literature that address security and access control in PHR systems and other existing work that proposed the adoption of fog computing in healthcare based systems.

2.1 Attribute Based Encryption

There is a considerable number of articles that proposed the combination of attribute based encryption along with other security primitive to enhance the security of systems. However, the majority of proposed protocol were suggested for the conventional cloud computing and Internet of Things (IoT) based applications such as mobile cloud computing [68] or vehicular cloud computing [911]. We focus in this section to review the state of art of the ABE based systems in PHR based applications.

In regards to PHR based systems, the researchers in [12] proposed a data sharing architecture that allowed a patient to share his PHR data kept in the cloud by using an access control algorithm. In this work, they made use of ABE to ensure the privacy preservation of the patient identity and fine-grained access control for his PHR data. In [13], the authors proposed secure scheme for mobile healthcare cyber physical systems. The proposed scheme offered a number of countermeasure to protect resource limited mobile healthcare applications. The authors in [14] proposed a fined-grained access control scheme in mobile cloud based applications for healthcare domain. Their scheme combined a rigorous access control coupled with a mobile user authentication mechanism. There is also a number of articles that address privacy preservation for PHR data and access control for PHR users [1517] but the majority of them do not build their secure protocols under a fog based architecture that address a diversified PUD healthcare systems.

2.2 Fog Computing

Introduced for the first time in 2012, fog based architectures or fog computing is a new paradigm that offers scalable solutions for applications and IoT devices by allowing them to run their applications in servers located in vicinity of the IoT device rather than remote servers placed in the cloud [18]. The fog computing is very crucial for the internet of things due to the number of devices which could be connected within a smart city. For instance, IoT deployments in mega smart cities is estimated to connect tens of billions devices which cannot always rely on the remote servers located in the cloud. Therefore, the fog paradigm is expected to decrease the network latency and congestion by offering efficient resource allocation solutions between the IoT devices and the remote servers. The fog based architectures have been extensively researched on especially in mobile based applications and IoT based scenario. The current literature that addressed fog computing focuses on three main issues: (1) The quality of service (QoS) which is deemed to be used in order to measure the performance of different entities such as the mobile operators within the fog architecture; (2) The quality of experience (QoE) was also widely researched on to depict the experience met by the end-users on top of the quality of service; (3) The security, privacy challenges and access control issues were researched on for a range of applications from mobile, cloud and IoT based environments. Nevertheless, the majority of the existing work focus on vehicular communications, smart grids and others [1921], there are limited work that address both access control, security, privacy preserving and fog-based scalability for the PHR systems. One of the pertinent work in the domain was conducted by the authors in [5]. They examined pervasive health monitoring systems by achieving low latency and lightweight overhead for network congestion through fog computing. Their proposed scheme mainly emphasized on patients that suffer from falls and strokes and provide a real time detection data analysis using fog computing. Though their work is a fog based model applicable healthcare environment, security, privacy, and access control concerns were not addressed specifically for PUD based healthcare system.

3  System Model and Preliminaries

In this section, we present first the system model of the proposed protocol which is made by the system architecture and the security goals which the proposed scheme has to satisfy. We then outline the basic security primitives used in the design of the proposed protocol including bilinear pairing and access structure.

3.1 Proposed System Model

The proposed system is a fog assisted architecture which is made by the following entities:

The attributes Authority: This is made by a number of servers located in the cloud with appropriate computing capabilities. These can be liken to companies or organization which work in the healthcare sector. Their main duties is to supervise how the PHR data are exchanged among the different entities. A typical example would be regional healthcare center (RHC) or any other departmental organization in healthcare domain.

The fog nodes: These are severs outsourced by the attributes authorities. Most of the time, the decryption can be done by the patient IoT device through the fog nodes. For instance, if the PHR contains several media files such as X-ray pictures, the patient can delegate the closest fog node to proceed with the recovery of the PHR file.

The PHR servers: These are databases in charge of storing encrypted PHR data belonging to PHR owners. These data are encrypted using the proposed protocol which is based on ABE.

The PHR owner: The data owner is typically any person or organization which has consulted a medical center for health related issues. The proposed protocol should enable a patient to securely create his data, manage his personal health data and most importantly control who is using his PHR data. In additional, the protocol should enable the patient to share his health data with other entities including medical doctors from another hospital or any other authorized entity.

The PHR user: The PHR users also called PHR consumers are people or organization which need to access the patient’s PHR data for treatment or any other health related issue. Assume a patient is located in city A and was recommended to continue his treatment in a hospital which is located in a city B. Our proposed protocol allow the PHR user (medical personnel in city B) to access the PHR data of the patient after his/her secured authorization.

Fig. 1 depicts the proposed architecture which is made by the following entities: The attribute servers, the fog nodes, the PHR server, the PHR owner such as patient and the PHR consumer such as a medical doctor. In the following subsection, we provide the main security goals which the proposed framework needs to satisfy.

images

Figure 1: Proposed PHR architecture

3.2 Security Goals

The proposed protocol should be able to offer the following security goals both for the PHR owner, the PHR user, the fog nodes and PHR servers:

Authentication: The proposed scheme should be able to prevent any malicious user who wish to access any PHR data or learn any crucial information from the PHR data. Any entity, either a PHR user, PHR owner should be authenticated by the system before he gets involved in any communication.

Confidentiality: The proposed protocol should allow only legitimate PHR user (medical doctors or nurses,..) to access sensitive data of the PHR owner. The proposed protocol ensures the confidentiality of transmitted PHR data using specific security primitives.

Fine-grained access control: The proposed protocol should allow the PHR owner to specify which PHR user access which PHR data. For instance, the patient can specify that the sensitive medical test results can only be accessed by the medical doctors while other non-sensitive data such as weight or height can be accessed both by the medical doctors, their assistants or nurses.

3.3 Preliminaries

In this subsection, we briefly described the two main security primitives which will be used in the proposed protocol. First we overview the basic concepts of bilinear pairing and then we describe the key notions of access structure which are used in attribute based encryption [22,23].

3.3.1 Bilinear Pairing

Assume images and images to be two multiplicative cyclic group with a prime order images and let images be a generator of images. The bilinear map images has to satisfy the following properties:

Bilinear: For all images and images, we have images

Non-degenerate: The generator images needs to satisfy images

Computable: For any images, there is an efficient algorithm to generate images.

3.3.2 Access Structure

Assume that we have a set of parties images. We define a collection images to be monotone if for images and images, that indicates that images.

A Monotone access structure is defined as monotone collection images if we have non empty subsets of images.

In a monotone collection images, the sets within it are defined as authorized sets, and those that are not found in images are described as unauthorized sets

In the proposed protocol, assume L to represent an access structure, with each non leaf node as a threshold gate, and each leaf node as an attribute. We node images as the number of children of node images, and images being the threshold value with images. Note that the threshold value images will return 1 if it is an OR gate or images if it is an and gate. For every leaf node images, we set a threshold value of images which is equals to 1. To make the access structure interpretation easy, we use the terms images as the parent of the node images within the tree, images as the attribute belonging to a leaf node images and images being the function that outputs a unique value that is linked with a node images.

In the proposed scheme, a set of attributes act as a separate entity while a given access structure images specifies the policy within the attributes. Note that we mainly make use of monotonic access structures and simply labelled them as access structure in this work.

4  Proposed Protocol

The proposed secure protocol is designed within four main phases. In the first phase, a function is executed by the AA servers to generate the system public parameters and the master secret key. In the second phase, the AA servers also generate the secret keys based on a set of attributes S. The third main phase is executed by the PHR owner device which could be an IoT device or fixed computer. The PHR owner specifies the access tree structure that needs to be satisfied by the PHR user in order to recover the data. Finally, the last phase is performed by the PHR user in order to recover the data, note that in this phase, the PHR user can outsource the computing capabilities of the fog nodes to perform the decryption.

4.1 System Initialization

The first phase is executed by the AA server to generate the public parameters which are used both by the PHR user and the PHR owner. The details of the initialization function is described as follows:

Initialization(U,T,1k) →(MK,PK): The different steps which are involved in the initialization phased are shown in Algorithm 1. The initialization function return the public parameters PK along with the master key MK. The public parameters PK can be accessed by all the entities in the system while the master key is securely key by attributes authority (AA).

:

images

4.2 Private Key Generation

Prior to this stage, we assume that there is a secure communication between the AA server and the PHR server. The AA server will communicate a set of the attribute to the PHR server.

The AA defines the access structures images and forwarded securely to the PHR servers and fog nodes. For instance, a fog node can be given a set of attribute fogi={radiography, doctorlevel A, location} and fogj={pediatry, nurselevel B, location}. Therefore, a fog node whose attribute satisfies the access structure can compute the shared key and recover the file.

In this phase, the function images is run to generate the private key. The detailed steps of the functions are shown in Algorithm 2. The PHR server then sends the private key SK to the medical doctor, in this case the PHR user. Note that the proposed protocol adds a valid timing in which the private key can be used. For instance, if the patient has visited the hospital today, he can give a one-day or two days validity. We assume that images is minimum cover set of T, and images is set to contain several time intervals stated as images. Therefore, practically, the private key can have a time validation such as images.

:

images

4.3 PHR Encryption

The PHR encryption phase is described in details within the Algorithm 3. In this phase, the patient which is the PHR owner upload the cypher text C which also contain symmetric key. The encryption can be performed by the PHR owner device or he can outsource the computing capabilities of fog nodes.

:

images

4.4 PHR Decryption

This phase allows the recovery of the PHR data by running the function images or not, based on the attributes of the PHR user. Note that the Lagrange theory is used to retrieve the secret share. The decryption phase can executed by the PHR user devices (computer or mobile gadgets) or the PHR user can outsource the decryption phase to the fog nodes. In this phase, the PHR user or medical doctor first verifies the integrity of the PHR data along with the verification of the digital signature.

If everything holds, the PHR user proceeds by checking if the access time is still valid; if not the process will be aborted. Later on, the PHR user performs the decryption calculation by checking if the access policy set by the patient or PHR owner is satisfied. The PHR owner will compute the decryption key in order to recover the plaintext.

:

images

The correctness of Eq. (4) can be verified as follows:

images

images

images

images

images

Then the function of decryption (SK,PK, C) is executed on the root R under the access tree T. The decryption process to recover the symmetric key is computed as follows:

images

images

images

5  Performance Analysis

In this section, we proceed with the evaluation of the proposed protocol in terms of security goals, computational cost caused by the message size and simulation.

5.1 Security Analysis

Authentication: Assume that a malicious user probably another patient in the hospital wants to impersonate a legitimate PHR owner. In the scenario the malicious user needs to generate a valid private key within the Algorithm 2, images, which is not hard due to the unforgeability of CP-ABE scheme. Therefore, the scheme can provide authentication to all the entities.

Confidentiality: The PHR message is encrypted to generate the ciphertext images. In addition, a digital signature is performed on the encrypted data as images. In the case, only a legitimate PHR owner can generate a valid signature, otherwise the decryption phase which is provided in Eq. (5) will not hold, therefore, the message will be discarded. Additionally, even if a malicious user eavesdrop the PHR data, only the hash value of the data will be obtained as shown in Algorithm 3.

Fine-grained access control: The access control is major security in the scenario. The patient which is the data owner might need to share his PHR to a medical team based on their rank, medical doctor or nurses. As shown in Algorithm 3, the ciphertext is constructed based on the access structure T as images. Therefore, unless a PHR user either a doctor or a nurse possesses valid secret shares to reconstruct the root node R, the decryption message will output images as demonstrated in Algorithm 4 and Eq. (5).

5.2 Message Size

In this section, we proceed with the analysis of the message size of the proposed PHR scheme. As shown in the Algorithm 1 for the initialization process, the algorithm outputs the public key images along with the master key images. The outcome in total size is images. In the second algorithm which is key generation, the secret key is made by images, which results in total message size of images with images being the number of attributes. In the Algorithm 3 which is the encryption process, the output is the cipher text C along with the digital signature images. Therefore the message size of images is images. In the last phase which Algorithm 4, the PHR user needs to keep the symmetric key K, therefore the message size is images. Note that the proposed scheme does not rely on certificate for authorization. Therefore, the computation overhead resulting from the use of certificate is generally higher, up to 8000 ms for the category of X.509 certificate while the size of the certificate can weight to tens of megabytes. In addition, the use of certificate to bind the identity of PHR owner to their keys cause an overhead within the transmission cost. The verification of the certificate validity and authenticity increase the overall time used in the decryption phase.

5.3 Implementation

In this section we proceed with the implementation of the proposed scheme which mainly focus on the impact of the number of attributes used in the access policy. We consider a range of 5 to 40 attributes for the implementation. We run our experiment using Python as the programming language under a Windows operating system version 10 Home, with processing capacity of 3.6 GHz, Intel core i7.

We also make use of the well-known and open source library for cryptographic operations Charm, which contains the PBC (standard pairing based cryptography) needed to execute mathematical operations for pairing based protocols. We first investigate the run time occurred on the key generation algorithm based on the described range of the attribute. As shown in Fig. 2(a), the run time is very linear, with the execution time increasing based on the number of attribute. We also investigate the performance of the encryption phase of the PHR by the patient. As depicted in Fig. 2(b), the polynomial operations caused by the child nodes in the access structure cause additional running time, but which is very limited in general. We later investigate the performance of the decryption phased which is illustrated in algorithm 4. As shown in Fig. 2(c), for a total of 25 attributes, the decryption time is less than 100 ms, which is acceptable for healthcare based applications looking at the security primitives within the proposed protocol.

images

Figure 2: (a) Performance of the key generation phase, (b) performance of encryption algorithm and (c) performance of the decryption algorithm

6  Conclusion

In this paper, we proposed a secure and fog assisted framework for personal health records systems. The underlying fog architecture is used to allow public domain healthcare systems with a multitude of centers to use the computational capabilities of fog nodes for secure communications. The proposed secure protocol made use of ciphertext attribute based encryption to achieve confidentiality and rigorous access control for the PHR data. The CP-ABE was also coupled with digital signature to provide authentication of the all the entities within the system. We also provided the discussion of the proposed framework in terms of security along with the computational overhead. We further provided the implementation of the proposed protocol to investigate the impact of the security primitives on the system based on range of attribute, which yielded satisfactory results.

Funding Statement: The authors are grateful to the Deanship of Scientific Research at King Saud University for funding this work through Vice Deanship of Scientific Research Chairs: Chair of Pervasive and Mobile Computing.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

  1. C. Dameff, B. Clay and C. A. Longhurst. (2019). “Personal health records: More promising in the smartphone era?,” Jama, vol. 321, no. 4, pp. 339–340.
  2. P. P. Gunn, A. M. Fremont, M. Bottrell, L. R. Shugarman, J. Galegher et al. (2004). , “The health insurance portability and accountability act privacy rule: A practical guide for researchers,” Medical Care, vol. 42, no. 4, pp. 321–327.
  3. Y. S. Rao. (2017). “A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing,” Future Generation Computer Systems, vol. 67, pp. 133–151.
  4. C. Puliafito, E. Mingozzi, F. Longo, A. Puliafito and O. Rana. (2019). “Fog computing for the internet of things: A survey,” ACM Transactions on Internet Technology, vol. 19, no. 2, pp. 1–41.
  5. Y. Cao, S. Chen, P. Hou and D. Brown. (2015). “Fast: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation,” in Proc. IEEE NAS, Boston, USA, pp. 2–11.
  6. C. Zuo, J. Shao, G. Wei, M. Xie and M. Ji. (2018). “CCA-secure ABE with outsourced decryption for fog computing,” Future Generation Computer Systems, vol. 78, pp. 730–738.
  7. 7.   N. Agrawal and S. Tapaswi. (2019). “A trustworthy agent-based encrypted access control method for mobile cloud computing environment,” Pervasive and Mobile Computing, vol. 52, pp. 13–28.
  8. Z. Li, W. Li, Z. Jin, H. Zhang and Q. Wen. (2019). “An efficient ABE scheme with verifiable outsourced encryption and decryption,” IEEE Access, vol. 7, pp. 29023–29037.
  9. L. Nkenyereye, Y. Park and K. H. Rhee. (2018). “Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing,” Journal of Supercomputing, vol. 74, no. 3, pp. 1024–1044.
  10. 10. H. Cui, H. R. Deng and G. Wang. (2019). “An attribute-based framework for secure communications in vehicular ad hoc networks,” IEEE/ACM Transactions on Networking, vol. 27, no. 2, pp. 721–733.
  11. L. Nkenyereye, C. H. Liu and J. Song. (2019). “Towards secure and privacy preserving collision avoidance system in 5G fog based internet of vehicles,” Future Generation Computer Systems, vol. 95, pp. 488–499.
  12. M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou. (2013). “Scalable and secure sharing of personal health records in cloud computing using attribute based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131–143.
  13. C. Hahn, H. Kwon and J. Hur. (2018). “Trustworthy delegation toward securing mobile healthcare cyber-physical systems,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6301–6309.
  14. S. Roy, A. K. Das, S. Chatterjee, N. Kumar, S Chattopadhyay et al. (2018). , “Chattopadhyay etal, Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications,” IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 457–468.
  15. J. Al-Muhtadi, B. Shahzad, K. Saleem, W. Jameel and M. A. Orgun. (2019). “Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment,” Health Informatics Journal, vol. 25, no. 2, pp. 315–329.
  16. 16. S. Y. Tan, K. W. Yeow and S. O. Hwang. (2019). “Enhancement of a lightweight attribute-based encryption scheme for the internet of things,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6384–6395.
  17. S. Sharaf and N. F. Shilbayeh. (2019). “A secure G-cloud-based framework for government healthcare services,” IEEE Access, vol. 7, pp. 37876–37882.
  18. J. Bellendorf and Z. Á. Mann. (2020). “Classification of optimization problems in fog computing,” Future Generation Computer Systems, vol. 107, pp. 158–176.
  19. R. Mahmud, S. N. Srirama, K. Ramamohanarao and R. Buyya. (2019). “Quality of experience (QoE)-aware placement of applications in fog computing environments,” Journal of Parallel and Distributed Computing, vol. 132, pp. 190–203.
  20. 20. R. Pecori. (2019). “Augmenting quality of experience in distance learning using fog computing,” IEEE Internet Computing, vol. 23, no. 5, pp. 49–58.
  21. L. Nkenyereye, J. Kwon and H. Y. Choi. (2017). “Secure and lightweight cloud-assisted video reporting protocol over 5G-enabled vehicular networks,” Sensors, vol. 17, no. 10, pp. 2191–2201.
  22. J. Han, Y. Li and W. Chen. (2019). “A lightweight and privacy-preserving public cloud auditing scheme without bilinear pairings in smart cities,” Computer Standards & Interfaces, vol. 62, pp. 84–97.
  23. K. Yoneyama. (2013). “Generic construction of two-party round-optimal attribute-based authenticated key exchange without random oracles,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 96, no. 6, pp. 1112–11
images This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.