{"id":"https://openalex.org/W3044163058","doi":"https://doi.org/10.1109/fmec49853.2020.9144845","title":"Privacy-Aware and Authentication based on Blockchain with Fault Tolerance for IoT enabled Fog Computing","display_name":"Privacy-Aware and Authentication based on Blockchain with Fault Tolerance for IoT enabled Fog Computing","publication_year":2020,"publication_date":"2020-04-01","ids":{"openalex":"https://openalex.org/W3044163058","doi":"https://doi.org/10.1109/fmec49853.2020.9144845","mag":"3044163058"},"language":"en","primary_location":{"id":"doi:10.1109/fmec49853.2020.9144845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fmec49853.2020.9144845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050641685","display_name":"Oussama Mounnan","orcid":"https://orcid.org/0000-0001-8276-5282"},"institutions":[{"id":"https://openalex.org/I4210088687","display_name":"Universit\u00e9 Ibn Zohr","ror":"https://ror.org/006sgpv47","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210088687"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Oussama Mounnan","raw_affiliation_strings":["LabSI Laboratory, FSA Ibn Zohr University, Agadir, Morocco"],"affiliations":[{"raw_affiliation_string":"LabSI Laboratory, FSA Ibn Zohr University, Agadir, Morocco","institution_ids":["https://openalex.org/I4210088687"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089447839","display_name":"Abdelkrim El Mouatasim","orcid":"https://orcid.org/0000-0001-9947-1408"},"institutions":[{"id":"https://openalex.org/I4210088687","display_name":"Universit\u00e9 Ibn Zohr","ror":"https://ror.org/006sgpv47","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210088687"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdelkrim El Mouatasim","raw_affiliation_strings":["LabSI Laboratory, FPO Ibn Zohr University, Agadir, Morocco"],"affiliations":[{"raw_affiliation_string":"LabSI Laboratory, FPO Ibn Zohr University, Agadir, Morocco","institution_ids":["https://openalex.org/I4210088687"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038781263","display_name":"Otman Manad","orcid":"https://orcid.org/0000-0001-6259-4666"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Otman Manad","raw_affiliation_strings":["Umanis SA, 7 Rue Paul Vaillant Couturier, Levalloie-Perret, France"],"affiliations":[{"raw_affiliation_string":"Umanis SA, 7 Rue Paul Vaillant Couturier, Levalloie-Perret, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048239301","display_name":"Tarik Hidar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144804","display_name":"Laboratoire de Recherche en Informatique","ror":"https://ror.org/04e3ktk27","country_code":"FR","type":"facility","lineage":["https://openalex.org/I102197404","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210144804","https://openalex.org/I4210159245"]},{"id":"https://openalex.org/I103562704","display_name":"ESI Group (France)","ror":"https://ror.org/05ww4z228","country_code":"FR","type":"company","lineage":["https://openalex.org/I103562704"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Tarik Hidar","raw_affiliation_strings":["Laboratory LISER-IPI Group Paris, France LRI ENSEM, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"Laboratory LISER-IPI Group Paris, France LRI ENSEM, Casablanca, Morocco","institution_ids":["https://openalex.org/I103562704","https://openalex.org/I4210144804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078156328","display_name":"Anas Abou El Kalam","orcid":"https://orcid.org/0000-0001-7714-4801"},"institutions":[{"id":"https://openalex.org/I119856527","display_name":"Cadi Ayyad University","ror":"https://ror.org/04xf6nm78","country_code":"MA","type":"education","lineage":["https://openalex.org/I119856527"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Anas Abou El Kalam","raw_affiliation_strings":["Oscar Laboratory, Ensa Marrakech Cadi Ayyad University, Marrakech, Morocco"],"affiliations":[{"raw_affiliation_string":"Oscar Laboratory, Ensa Marrakech Cadi Ayyad University, Marrakech, Morocco","institution_ids":["https://openalex.org/I119856527"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064111211","display_name":"Noureddine Idboufker","orcid":null},"institutions":[{"id":"https://openalex.org/I119856527","display_name":"Cadi Ayyad University","ror":"https://ror.org/04xf6nm78","country_code":"MA","type":"education","lineage":["https://openalex.org/I119856527"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Noureddine Idboufker","raw_affiliation_strings":["TIM Laboratory, Ensa Marrakech Cadi Ayyad University, Marrakech, Morocco"],"affiliations":[{"raw_affiliation_string":"TIM Laboratory, Ensa Marrakech Cadi Ayyad University, Marrakech, Morocco","institution_ids":["https://openalex.org/I119856527"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5050641685"],"corresponding_institution_ids":["https://openalex.org/I4210088687"],"apc_list":null,"apc_paid":null,"fwci":2.75,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.90824105,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"347","last_page":"352"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8297336101531982},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6674980521202087},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6245713233947754},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6180918216705322},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5297240614891052},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4981672763824463},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49583491683006287},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.48965126276016235},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.47235307097435},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45736464858055115},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45067787170410156},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.43125131726264954},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.16796275973320007},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1275329887866974}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8297336101531982},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6674980521202087},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6245713233947754},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6180918216705322},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5297240614891052},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4981672763824463},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49583491683006287},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.48965126276016235},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.47235307097435},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45736464858055115},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45067787170410156},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.43125131726264954},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.16796275973320007},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1275329887866974},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fmec49853.2020.9144845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fmec49853.2020.9144845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2067503796","https://openalex.org/W2114623221","https://openalex.org/W2139092348","https://openalex.org/W2184024736","https://openalex.org/W2184435237","https://openalex.org/W2245189809","https://openalex.org/W2527484278","https://openalex.org/W2581042172","https://openalex.org/W2588585573","https://openalex.org/W2751779568","https://openalex.org/W2753672491","https://openalex.org/W2763950196","https://openalex.org/W2796447772","https://openalex.org/W2897993795","https://openalex.org/W2899228805","https://openalex.org/W2910735050","https://openalex.org/W2912850378","https://openalex.org/W2921980263","https://openalex.org/W2962998973","https://openalex.org/W2963158275","https://openalex.org/W6743825094"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W2137529864"],"abstract_inverted_index":{"Fog":[0,16,45,218],"computing":[1,6,17,46,95],"is":[2,69,108,199],"a":[3,83,133,151],"new":[4,48,84],"distributed":[5],"paradigm":[7],"that":[8],"extends":[9],"the":[10,13,31,93,100,103,126,129,142,155,158,165,169,177,182,185,190,194,202,222,228],"cloud":[11,40],"to":[12,57,110,118,149,221],"network":[14,122],"edge.":[15],"aims":[18],"at":[19],"improving":[20],"quality":[21],"of":[22,52,102,105,184,224],"service,":[23],"data":[24],"access,":[25],"networking,":[26],"computation":[27],"and":[28,33,54,65,115,157,192,214],"storage.":[29],"However,":[30],"security":[32,53,143],"privacy":[34],"issues":[35],"persist,":[36],"even":[37],"if":[38,161,201],"many":[39,76],"solutions":[41],"were":[42],"proposed.":[43],"Indeed,":[44],"introduces":[47],"challenges":[49],"in":[50,75,99,125,136,168,189,193,217],"terms":[51],"privacy,":[55],"due":[56,220],"its":[58],"specific":[59],"features":[60],"such":[61],"as":[62],"mobility,":[63],"geo-distribution":[64],"heterogeneity":[66],"etc.":[67],"Blockchain":[68,107],"an":[70],"emergent":[71],"concept":[72],"bringing":[73],"efficiency":[74],"fields.":[77],"In":[78,145],"this":[79],"paper,":[80],"we":[81,147],"propose":[82,148],"access":[85,116],"control":[86],"scheme":[87],"based":[88],"on":[89],"blockchain":[90,127,170,178],"technology":[91],"for":[92],"fog":[94],"with":[96],"fault":[97,215],"tolerance":[98,216],"context":[101],"Internet":[104],"Things.":[106],"used":[109],"provide":[111],"secure":[112,134,152],"management":[113],"authentication":[114],"process":[117],"IoT":[119,159],"devices.":[120],"Each":[121],"entity":[123],"authenticates":[124],"via":[128],"wallet,":[130],"which":[131],"allows":[132],"communication":[135],"decentralized":[137],"environment,":[138],"hence":[139],"it":[140],"achieves":[141],"objectives.":[144],"addition,":[146],"establish":[150],"connection":[153],"between":[154],"users":[156,186],"devices,":[160],"their":[162],"attributes":[163,187,204],"satisfy":[164],"policy":[166,191],"stored":[167],"by":[171,181],"smart":[172],"contract.":[173],"We":[174],"also":[175],"address":[176],"transparency":[179],"problem":[180],"encryption":[183],"both":[188],"request.":[195],"An":[196],"authorization":[197],"token":[198],"generated":[200],"encrypted":[203],"are":[205],"identical.":[206],"Moreover,":[207],"our":[208],"proposition":[209],"offers":[210],"higher":[211],"scalability,":[212],"availability":[213],"nodes":[219],"implementation":[223],"load":[225],"balancing":[226],"through":[227],"Min-Min":[229],"algorithm.":[230]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":5}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
