REFERENCES
Alshiky, A. M., Buhari, S. M., and Barnawi, A. (2017). Ehr
attribute-based access control (abac) for fog comput-
ing environment. In Seventh International Conference
on Computer Science CSIT.
Ambrosin, M., Anzanpour, A., and Conti, M. (2016). On
the feasibility of attribute-based encryption on internet
of things devices. In IEEE Micro Magazine, vol. 36,
no. 6, pages 25–35.
Ambrosin, M., Conti, M., and Dargahi, T. (2015). On
the feasibility of attribute-based encryption on smart-
phone devices. In IoT-Sys 2015, Florence, Italy.
Barik, R. K., Dubey, H., and Mankodiya, K. (2017). Soa-
fog: Secure service-oriented edge computing architec-
ture for smart health big data analytics. In 5th IEEE
Global Conference on Signal and In-formation Pro-
cessing GlobalSIP 2017, Montreal, Canada.
Barni, M., Failla, P., and Lazzeretti, R. (2011). Privacy-
preserving ecg classification with branching programs
and neural networks. In IEEE Trans. Inf. Forensics
Security.
Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. (2012).
Fog computing and its role in the internet of things. In
Proceedings of the First Edition of the MCC Workshop
on Mobile Cloud Computing, pages 13–16. MCC12.
ACM.
Butun, I., Sari, A., and Osterberg, P. (2019). Security im-
plications of fog computing on the internet of things.
In to appear in Proceedings of the ICCE 2019, Las
Vegas, NV, USA.
Cha, H.-J., Yang, H.-K., Kim, J.-M., and Song, Y.-J. (2016).
Design of monitoring system of rule violation using
abpre in the fog computing environment. In Asia-
pacific Journal of Applied Science and Engineering
for Better Human Life, Vol.6, pages 29–31.
Dasgupta, A. and Gill, A. Q. (2017). Fog computing chal-
lenges: A systematic review. In Australasian Confer-
ence on Information Systems, Hobart, Australia.
Deshpande, U. and Kulkarni, M. A. (2017). Iot based real
time ecg monitoring system using cypress wiced. In
International Journal of Advanced Research in Elec-
trical Electronics and Instrumentation Engineering,
Vol. 6, Issue 2.
Dubey, H., Montero, A., and Constant, N. (2017). Fog
computing in medical internet-of-things: Architec-
ture, implementation, and applications. In Hand-
book of Large-Scale Distributed Computing in Smart
Healthcare.
Dubey, H., Yang, J., and Constant, N. (2015). Fog data: En-
hancing telehealth big data through fog computing. In
Proceedings of the ASE BigData & SocialInformatics
2015, page 14.
Kattepur, A., Dohare, H., and Mushunuri, V. (2016). Re-
source constrained offloading in fog computing. In
MECC 16, Trento, Italy.
Kaur, L. and Mahajan, M. (2015). Cryptographic key ex-
change scheme for cloud based healthcare monitor-
ing. In International Journal of Advanced Research
in Computer Science, Volume 6, No. 5.
Koo, D. and Hur, J. (2018). Privacy-preserving deduplica-
tion of encrypted data with dynamic ownership man-
agement in fog computing. In Future Generation
Computer Systems, pages 739–752.
Martin, B. A., Michaud, F., Banks, D., and Mosenia,
A. (2017). Openfog security requirements and ap-
proaches. In IEEE Communications Society Invited
Paper.
Moffat, S., Hammoudeh, M., and Hegarty, R. (2017). A
survey on ciphertext-policy attribute-based encryp-
tion (cp-abe) approaches to data security on mobile
devices and its application to iot. In Proceedings
of the International Conference on Future Networks
and Distributed Systems ICFNDS, Cambridge, United
Kingdom.
Petac, E. and Petac, A.-O. (2016). About security solutions
in fog computing. In Economic Sciences Series, Ovid-
ius University Annals.
Rani, S. and Kumar, P. (2015). A survey of research on
health monitoring system using mobile cloud comput-
ing by home node base station. In IJRITCC.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based en-
cryption. In EUROCRYPT’05, pages 457–473.
Sun, L., Yong, J., and Soar, J. (2014). Access control man-
agement for e-healthcare in cloud environment. In EAI
Endorsed Transactions on Scalable Information Sys-
tems.
Tan, Y.-L., Goi, B.-M., Komiya, R., and Phan, R. (2013).
Design and implementation of key-policy attribute-
based encryption in body sensor network. In Inter-
national Journal of Cryptology Research 4(1): 84 -
101.
Yi, S., Li, C., and Li, Q. (2015). A survey of fog computing:
Concepts, applications and issues. In Mobidata15,
Hangzhou, China.
Zuo, C., Shao, J., and Wei, G. (2016). Cca-secure abe with
outsourced decryption for fog computing. In Future
Generation Computer Systems.
Using ABE for Medical Data Protection in Fog Computing
161