{"id":"https://openalex.org/W4360605152","doi":"https://doi.org/10.1109/icaiic57133.2023.10066994","title":"Cyber Security in Fog Computing Using Blockchain: A Mini Literature Review","display_name":"Cyber Security in Fog Computing Using Blockchain: A Mini Literature Review","publication_year":2023,"publication_date":"2023-02-20","ids":{"openalex":"https://openalex.org/W4360605152","doi":"https://doi.org/10.1109/icaiic57133.2023.10066994"},"language":"en","primary_location":{"id":"doi:10.1109/icaiic57133.2023.10066994","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic57133.2023.10066994","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049141812","display_name":"Norah Alhumam","orcid":null},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Norah Arif Alhumam","raw_affiliation_strings":["King Faisal University, CCSIT, Al Hofuf,Dept. of Computer Networks &#x0026; Communications,Al Hassa,Saudi Arabia,31982"],"affiliations":[{"raw_affiliation_string":"King Faisal University, CCSIT, Al Hofuf,Dept. of Computer Networks &#x0026; Communications,Al Hassa,Saudi Arabia,31982","institution_ids":["https://openalex.org/I4626487"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010330476","display_name":"Noura Saud Alyemni","orcid":null},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Noura Saud Alyemni","raw_affiliation_strings":["King Faisal University, CCSIT, Al Hofuf,Dept. of Computer Networks &#x0026; Communications,Al Hassa,Saudi Arabia,31982"],"affiliations":[{"raw_affiliation_string":"King Faisal University, CCSIT, Al Hofuf,Dept. of Computer Networks &#x0026; Communications,Al Hassa,Saudi Arabia,31982","institution_ids":["https://openalex.org/I4626487"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100676847","display_name":"M. M. Hafizur Rahman","orcid":"https://orcid.org/0000-0001-6808-3373"},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"M M Hafizur Rahman","raw_affiliation_strings":["King Faisal University, CCSIT, Al Hofuf,Dept. of Computer Networks &#x0026; Communications,Al Hassa,Saudi Arabia,31982"],"affiliations":[{"raw_affiliation_string":"King Faisal University, CCSIT, Al Hofuf,Dept. of Computer Networks &#x0026; Communications,Al Hassa,Saudi Arabia,31982","institution_ids":["https://openalex.org/I4626487"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049141812"],"corresponding_institution_ids":["https://openalex.org/I4626487"],"apc_list":null,"apc_paid":null,"fwci":1.8193,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.87421306,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"553","last_page":"557"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8457269072532654},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7654314041137695},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.742498517036438},{"id":"https://openalex.org/keywords/fog-computing","display_name":"Fog computing","score":0.6385976076126099},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5936154723167419},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.589133620262146},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.48009708523750305},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4574631154537201},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4383721649646759},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.41339319944381714},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.40861040353775024},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15761664509773254},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14131391048431396},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10790356993675232}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8457269072532654},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7654314041137695},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.742498517036438},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.6385976076126099},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5936154723167419},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.589133620262146},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.48009708523750305},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4574631154537201},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4383721649646759},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.41339319944381714},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.40861040353775024},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15761664509773254},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14131391048431396},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10790356993675232}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaiic57133.2023.10066994","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic57133.2023.10066994","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.550000011920929,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2606939427","https://openalex.org/W2626161699","https://openalex.org/W2747548784","https://openalex.org/W2770104838","https://openalex.org/W2805924584","https://openalex.org/W2885906471","https://openalex.org/W2903622975","https://openalex.org/W2912278425","https://openalex.org/W2920555465","https://openalex.org/W2946193070","https://openalex.org/W2954039302","https://openalex.org/W2954935879","https://openalex.org/W2954944626","https://openalex.org/W2982054674","https://openalex.org/W2990046387","https://openalex.org/W3092828718","https://openalex.org/W3104547572","https://openalex.org/W3156159408","https://openalex.org/W3165677379","https://openalex.org/W3174709037","https://openalex.org/W3196596779"],"related_works":["https://openalex.org/W2885657717","https://openalex.org/W2892869641","https://openalex.org/W4328007012","https://openalex.org/W2982330340","https://openalex.org/W3183865553","https://openalex.org/W4297797983","https://openalex.org/W4213157670","https://openalex.org/W4385586765","https://openalex.org/W4205392332","https://openalex.org/W2805260971"],"abstract_inverted_index":{"Due":[0],"to":[1,7,54,60,67,124],"its":[2],"many":[3],"uses":[4],"and":[5,9,39,69,101,107,121,132],"ability":[6],"save":[8],"restore":[10],"data,":[11],"whether":[12],"for":[13,104],"businesses":[14],"or":[15],"individuals,":[16],"cloud":[17,58,100],"computing":[18,94,103,152],"has":[19],"become":[20],"one":[21],"of":[22,46,49,74,99,114],"the":[23,26,30,35,44,47,57,61,71,147],"mainstays":[24],"in":[25,150],"technology":[27,82],"world":[28],"over":[29],"past":[31],"few":[32],"years.":[33],"However,":[34],"limitations":[36],"on":[37,56,146],"speeds":[38],"sizes":[40],"as":[41,43,95,129],"well":[42],"evolving":[45],"Internet":[48],"Things":[50],"made":[51],"it":[52],"challenging":[53],"rely":[55],"due":[59],"extremely":[62],"slow":[63],"data":[64,75,108],"processing.":[65],"Therefore,":[66],"store":[68],"interpret":[70],"massive":[72],"amount":[73],"rapidly,":[76],"programmers":[77],"switched":[78],"towards":[79],"a":[80,144],"new":[81],"which":[83],"is":[84],"fog":[85,93,151],"computing.":[86],"This":[87,138],"mini":[88,139],"survey":[89],"paper":[90,141],"will":[91,135],"outline":[92],"an":[96],"integral":[97],"part":[98],"edge":[102],"improving":[105],"security":[106],"protection.":[109],"A":[110],"systematic":[111],"literature":[112],"review":[113,140],"selected":[115],"research":[116],"papers":[117],"that":[118],"include":[119],"findings":[120],"algorithms":[122],"used":[123],"enhance":[125],"security-related":[126],"problems":[127],"such":[128],"availability,":[130],"latency,":[131],"intrusion":[133],"detection":[134],"be":[136],"discussed.":[137],"finds":[142],"out":[143],"state-of-the-art":[145],"cybersecurity":[148],"issues":[149],"using":[153],"blockchain.":[154]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
