Trust Enforced Computational Offloading for Health Care Applications in Fog Computing
Internet of Things (IoT) is a network of internet connected devices that generates huge amount of data every day. The usage of IoT devices such as smart wearables, smart phones, smart cities are increasing in the linear scale. Health care is one of the primary applications today that uses IoT device...
Gespeichert in:
| Veröffentlicht in: | Wireless personal communications Jg. 119; H. 2; S. 1369 - 1386 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
Springer US
2021
Springer Nature B.V |
| Schlagworte: | |
| ISSN: | 0929-6212, 1572-834X |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Internet of Things (IoT) is a network of internet connected devices that generates huge amount of data every day. The usage of IoT devices such as smart wearables, smart phones, smart cities are increasing in the linear scale. Health care is one of the primary applications today that uses IoT devices. Data generated in this application may need computation, storage and data analytics operations which requires resourceful environment for remote patient health monitoring. The data related with health care applications are primarily private and should be readily available to the users. Enforcing these two constraints in cloud environment is a hard task. Fog computing is an emergent architecture for providing computation, storage, control and network services within user’s proximity. To handle private data, the processing elements should be trustable entities in Fog environment. In this paper we propose novel Trust Enforced computation ofFLoading technique for trust worthy applications using fOg computiNg (TEFLON). The proposed system comprises of two algorithms namely optimal service offloader and trust assessment for addressing security and trust issues with reduced response time. And the simulation results show that proposed TEFLON framework improves success rate of fog collaboration with reduced average latency for delay sensitive applications and ensures trust for trustworthy applications. |
|---|---|
| AbstractList | Internet of Things (IoT) is a network of internet connected devices that generates huge amount of data every day. The usage of IoT devices such as smart wearables, smart phones, smart cities are increasing in the linear scale. Health care is one of the primary applications today that uses IoT devices. Data generated in this application may need computation, storage and data analytics operations which requires resourceful environment for remote patient health monitoring. The data related with health care applications are primarily private and should be readily available to the users. Enforcing these two constraints in cloud environment is a hard task. Fog computing is an emergent architecture for providing computation, storage, control and network services within user’s proximity. To handle private data, the processing elements should be trustable entities in Fog environment. In this paper we propose novel Trust Enforced computation ofFLoading technique for trust worthy applications using fOg computiNg (TEFLON). The proposed system comprises of two algorithms namely optimal service offloader and trust assessment for addressing security and trust issues with reduced response time. And the simulation results show that proposed TEFLON framework improves success rate of fog collaboration with reduced average latency for delay sensitive applications and ensures trust for trustworthy applications. Internet of Things (IoT) is a network of internet connected devices that generates huge amount of data every day. The usage of IoT devices such as smart wearables, smart phones, smart cities are increasing in the linear scale. Health care is one of the primary applications today that uses IoT devices. Data generated in this application may need computation, storage and data analytics operations which requires resourceful environment for remote patient health monitoring. The data related with health care applications are primarily private and should be readily available to the users. Enforcing these two constraints in cloud environment is a hard task. Fog computing is an emergent architecture for providing computation, storage, control and network services within user's proximity. To handle private data, the processing elements should be trustable entities in Fog environment. In this paper we propose novel Trust Enforced computation ofFLoading technique for trust worthy applications using fOg computiNg (TEFLON). The proposed system comprises of two algorithms namely optimal service offloader and trust assessment for addressing security and trust issues with reduced response time. And the simulation results show that proposed TEFLON framework improves success rate of fog collaboration with reduced average latency for delay sensitive applications and ensures trust for trustworthy applications.Internet of Things (IoT) is a network of internet connected devices that generates huge amount of data every day. The usage of IoT devices such as smart wearables, smart phones, smart cities are increasing in the linear scale. Health care is one of the primary applications today that uses IoT devices. Data generated in this application may need computation, storage and data analytics operations which requires resourceful environment for remote patient health monitoring. The data related with health care applications are primarily private and should be readily available to the users. Enforcing these two constraints in cloud environment is a hard task. Fog computing is an emergent architecture for providing computation, storage, control and network services within user's proximity. To handle private data, the processing elements should be trustable entities in Fog environment. In this paper we propose novel Trust Enforced computation ofFLoading technique for trust worthy applications using fOg computiNg (TEFLON). The proposed system comprises of two algorithms namely optimal service offloader and trust assessment for addressing security and trust issues with reduced response time. And the simulation results show that proposed TEFLON framework improves success rate of fog collaboration with reduced average latency for delay sensitive applications and ensures trust for trustworthy applications. |
| Author | Suriya Praba, T. Gorripatti, Meghana Meena, V. |
| Author_xml | – sequence: 1 givenname: V. surname: Meena fullname: Meena, V. organization: School of Computing, SASTRA Deemed University – sequence: 2 givenname: Meghana surname: Gorripatti fullname: Gorripatti, Meghana organization: School of Computing, SASTRA Deemed University – sequence: 3 givenname: T. orcidid: 0000-0003-3398-8302 surname: Suriya Praba fullname: Suriya Praba, T. email: suriyapraba@cse.sastra.edu organization: School of Computing, SASTRA Deemed University |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/33840908$$D View this record in MEDLINE/PubMed |
| BookMark | eNp9kctLHTEYxUOx1Kv2H-iiBLpxM21eM0k2Bbn4KAhuFNyFmMc1kptMkxmh_32jc-3Dhatv8f3O4XDOAdhLOTkAPmH0FSPEv1WMCecdIrhDgoi-4-_ACvecdIKy2z2wQpLIbiCY7IODWh8QajJJPoB9SgVDEokVuLkuc53gafK5GGfhOm_HedJTyElHeOV9zNqGtIHtDy-cjtM9XOvi4Mk4xmCewQpDgmd5sxM3-gi89zpW93F3D8HN2en1-qK7vDr_sT657AzjbOq4k4Zi3VsuBNPSCGmpx8Jo7V1vMPfWSem09IK5YXAWUyutZcKKntI75Okh-L74jvPd1lnj0lR0VGMJW11-qayD-v-Twr3a5EclEGm1DM3geGdQ8s_Z1UltQzUuRp1cnqsiPcZCColJQ7-8Qh_yXFpLTxQTA2N9jxr1-d9Ef6K8NN4AsQCm5FqL88qEpe8WMESFkXoaVy3jqjaueh5X8SYlr6Qv7m-K6CKqDU4bV_7GfkP1G-PWuA8 |
| CitedBy_id | crossref_primary_10_1016_j_jnca_2022_103402 crossref_primary_10_1016_j_comcom_2022_10_022 crossref_primary_10_1007_s11227_024_06330_3 crossref_primary_10_1007_s12553_023_00796_6 crossref_primary_10_1007_s11227_024_06271_x crossref_primary_10_7717_peerj_17133 crossref_primary_10_1007_s11277_023_10469_2 crossref_primary_10_3390_s21217276 |
| Cites_doi | 10.1007/978-3-540-74810-6_8 10.1109/TCOMM.2017.2699660 10.1007/978-3-319-68136-8_7 10.1145/3132211.3134451 10.1109/JIOT.2016.2565516 10.1109/ACCESS.2017.2733225 10.1016/j.future.2018.04.057 10.1016/j.future.2019.07.030 10.1016/j.jpdc.2019.10.006 10.1016/j.future.2018.05.049 10.1109/TNSE.2018.2852762 10.1016/j.jpdc.2018.10.007 10.1109/MCOM.2017.1700360 10.1016/j.future.2018.05.008 10.1007/978-3-030-00021-9_18 10.1109/TPDS.2013.116 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. Copyright Springer Nature B.V. 2021 |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. – notice: Copyright Springer Nature B.V. 2021 |
| DBID | AAYXX CITATION NPM JQ2 7X8 5PM |
| DOI | 10.1007/s11277-021-08285-7 |
| DatabaseName | CrossRef PubMed ProQuest Computer Science Collection MEDLINE - Academic PubMed Central (Full Participant titles) |
| DatabaseTitle | CrossRef PubMed ProQuest Computer Science Collection MEDLINE - Academic |
| DatabaseTitleList | ProQuest Computer Science Collection MEDLINE - Academic PubMed |
| Database_xml | – sequence: 1 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: 7X8 name: MEDLINE - Academic url: https://search.proquest.com/medline sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Journalism & Communications Engineering |
| EISSN | 1572-834X |
| EndPage | 1386 |
| ExternalDocumentID | PMC8022126 33840908 10_1007_s11277_021_08285_7 |
| Genre | Journal Article |
| GroupedDBID | -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29R 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAPKM AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBRH ABBXA ABDBE ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACZOJ ADHHG ADHIR ADHKG ADIMF ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEGXH AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFDZB AFEXP AFGCZ AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGQPQ AGWIL AGWZB AGYKE AHAVH AHBYD AHPBZ AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYFIA AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EDO EIOEI EJD ESBYG FD6 FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P9P PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A U5U UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 ZMTXR ~A9 ~EX AAYXX ABFSG ABJCF ABRTQ ACSTC AEZWR AFFHD AFHIU AFKRA AFOHR AHWEU AIXLP ARAPS ATHPR BENPR BGLVJ CCPQU CITATION HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS -5B -5G -BR -EM ADINQ GQ6 NPM Z7R Z7S Z7X Z7Z Z81 Z83 Z88 Z8M Z8N Z8R Z8T Z8U Z8W Z92 _50 JQ2 7X8 5PM |
| ID | FETCH-LOGICAL-c474t-7e9c31a5d7884a9c89d3f18caafe5c17fde99ea9f84e66ed13d9dd48d8533b0f3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 13 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000637445200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0929-6212 |
| IngestDate | Tue Nov 04 01:41:57 EST 2025 Sun Nov 09 12:13:28 EST 2025 Thu Sep 25 00:45:52 EDT 2025 Wed Feb 19 02:28:42 EST 2025 Sat Nov 29 08:02:50 EST 2025 Tue Nov 18 21:55:07 EST 2025 Thu Apr 10 08:04:03 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Keywords | Fog computing Health care Response time Trusted node identification Computational offloading |
| Language | English |
| License | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c474t-7e9c31a5d7884a9c89d3f18caafe5c17fde99ea9f84e66ed13d9dd48d8533b0f3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0003-3398-8302 |
| OpenAccessLink | https://pubmed.ncbi.nlm.nih.gov/PMC8022126 |
| PMID | 33840908 |
| PQID | 2548644550 |
| PQPubID | 2043826 |
| PageCount | 18 |
| ParticipantIDs | pubmedcentral_primary_oai_pubmedcentral_nih_gov_8022126 proquest_miscellaneous_2511898912 proquest_journals_2548644550 pubmed_primary_33840908 crossref_citationtrail_10_1007_s11277_021_08285_7 crossref_primary_10_1007_s11277_021_08285_7 springer_journals_10_1007_s11277_021_08285_7 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-00-00 |
| PublicationDateYYYYMMDD | 2021-01-01 |
| PublicationDate_xml | – year: 2021 text: 2021-00-00 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Netherlands – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Wireless personal communications |
| PublicationTitleAbbrev | Wireless Pers Commun |
| PublicationTitleAlternate | Wirel Pers Commun |
| PublicationYear | 2021 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | 8285_CR5 M Al-Khafajiy (8285_CR2) 2020; 137 8285_CR12 M Aazam (8285_CR6) 2018; 87 8285_CR1 P Zhang (8285_CR4) 2018; 88 P Kochovski (8285_CR7) 2019; 101 TQ Dinh (8285_CR14) 2017; 65 T Wang (8285_CR3) 2018 8285_CR10 SA Soleymani (8285_CR15) 2017; 5 D Puthal (8285_CR8) 2019; 124 Q Fan (8285_CR17) 2018 X Wang (8285_CR16) 2017; 55 R Deng (8285_CR13) 2016; 3 8285_CR9 R Chen (8285_CR11) 2013; 25 |
| References_xml | – ident: 8285_CR9 doi: 10.1007/978-3-540-74810-6_8 – volume: 65 start-page: 3571 issue: 8 year: 2017 ident: 8285_CR14 publication-title: IEEE Transactions on Communications doi: 10.1109/TCOMM.2017.2699660 – ident: 8285_CR12 doi: 10.1007/978-3-319-68136-8_7 – ident: 8285_CR1 – ident: 8285_CR10 doi: 10.1145/3132211.3134451 – volume: 3 start-page: 1171 issue: 6 year: 2016 ident: 8285_CR13 publication-title: IEEE Internet of Things Journal doi: 10.1109/JIOT.2016.2565516 – volume: 5 start-page: 15619 year: 2017 ident: 8285_CR15 publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2733225 – volume: 87 start-page: 278 issue: 2018 year: 2018 ident: 8285_CR6 publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2018.04.057 – volume: 101 start-page: 747 year: 2019 ident: 8285_CR7 publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2019.07.030 – volume: 137 start-page: 1 year: 2020 ident: 8285_CR2 publication-title: Journal of Parallel and Distributed Computing doi: 10.1016/j.jpdc.2019.10.006 – year: 2018 ident: 8285_CR3 publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2018.05.049 – year: 2018 ident: 8285_CR17 publication-title: IEEE Transactions on Network Science and Engineering doi: 10.1109/TNSE.2018.2852762 – volume: 124 start-page: 60 year: 2019 ident: 8285_CR8 publication-title: Journal of Parallel and Distributed Computing doi: 10.1016/j.jpdc.2018.10.007 – volume: 55 start-page: 80 issue: 11 year: 2017 ident: 8285_CR16 publication-title: IEEE Communications Magazine doi: 10.1109/MCOM.2017.1700360 – volume: 88 start-page: 16 year: 2018 ident: 8285_CR4 publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2018.05.008 – ident: 8285_CR5 doi: 10.1007/978-3-030-00021-9_18 – volume: 25 start-page: 1200 issue: 5 year: 2013 ident: 8285_CR11 publication-title: IEEE Transactions on Parallel and Distributed Systems doi: 10.1109/TPDS.2013.116 |
| SSID | ssj0010092 |
| Score | 2.300343 |
| Snippet | Internet of Things (IoT) is a network of internet connected devices that generates huge amount of data every day. The usage of IoT devices such as smart... |
| SourceID | pubmedcentral proquest pubmed crossref springer |
| SourceType | Open Access Repository Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 1369 |
| SubjectTerms | Algorithms Cloud computing Communications Engineering Computation offloading Computer Communication Networks Electronic devices Engineering Health care Internet of Things Network latency Networks Polytetrafluoroethylene Remote monitoring Response time Signal,Image and Speech Processing Smartphones Trust Trustworthiness |
| Title | Trust Enforced Computational Offloading for Health Care Applications in Fog Computing |
| URI | https://link.springer.com/article/10.1007/s11277-021-08285-7 https://www.ncbi.nlm.nih.gov/pubmed/33840908 https://www.proquest.com/docview/2548644550 https://www.proquest.com/docview/2511898912 https://pubmed.ncbi.nlm.nih.gov/PMC8022126 |
| Volume | 119 |
| WOSCitedRecordID | wos000637445200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1572-834X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED-NjofxwDbGR2hXedLEyxapzkdtP1YTFU_dtMHUt8j4Y6vEUkQKfz9nx0lbCkhMypvPSeyc7bvc_X4H8NkKmVHU3lgnWsYZl2ksGaWxZWjvSnTIbCp9sQk2mfDpVPwIoLCqyXZvQpJ-p16C3agLN7qUAk-7FrMteI3HHXcFG37--t3GDhyNkGfYc4kduDMHqMzj91g_jjZszM1UyQfxUn8Mjd_-3wDewW4wO8mo1pP38MqUe7CzQka4B90gNKv-kROyBhypPsDFuQNnkFOHXlJGk7oaRPiTSL5bezX32fgE20mNbSIO20RGKxFyMivJeP4ndEbpfbgYn55_O4tDSYZYZSxbxMwIlVKZa_ScMykUFzq1lCsprckVZVYbIYwUlmdmODSaplponXGNVkF6ObDpAXTKeWmOgCiVS7dlGGXRPedKMCm0ygcyT-xlplgEtPkyhQp85a5sxlWxZFp2E1rghBZ-Qgvs86Xtc12zdTwr3Ws-eBFWblWgw8zRRkTHLYJPbTOuORdIkaWZ3zoZdMsEFzSJ4LDWj_Zx6PKjyzzgEbA1zWkFHJ_3eks5--t5vR3qmSbDCL42-rN8radHcfwy8S68SbwKuqsHncXNrfkI2-puMatu-rDFprzv19M9pVIaOg |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fb9MwED7BmMR4ADYYhI3Nk9BeIFKdOLX9WKFVQxvdtHVob5HnH1BppGhp-fs5O066MoYEUt58TmLnbN_l7vsO4J2TilHU3tRkRqVMqDxVnNLUcbR3FTpkLleh2AQfjcTlpTyNoLC6zXZvQ5Jhp16A3agPN_qUgkC7lvKH8IjhieUZ88_Ov3SxA08jFBj2fGIH7swRKvPneywfR3dszLupkr_FS8MxNHz2fwN4Dk-j2UkGjZ6swwNbbcCTW2SEG7AVhSb1d7JPloAj9Qu4GHtwBjnw6CVtDWmqQcQ_ieTEuetpyMYn2E4abBPx2CYyuBUhJ5OKDKdfY2eUfgkXw4Pxx8M0lmRINeNslnIrdU5VYdBzZkpqIU3uqNBKOVtoyp2xUlolnWC237eG5kYaw4RBqyC_6rl8E1aqaWVfA9G6UH7LsNqhey605EoaXfRUkbkrpnkCtP0ypY585b5sxnW5YFr2E1rihJZhQkvs877r86Nh6_ir9Hb7wcu4cusSHWaBNiI6bgnsdc245nwgRVV2Ovcy6JZJIWmWwKtGP7rHocuPLnNPJMCXNKcT8Hzeyy3V5Fvg9faoZ5r1E_jQ6s_ite4fxZt_E9-Fx4fjz8fl8afR0RasZUEd_bUNK7ObuX0Lq_rnbFLf7IRV9QtAnRw2 |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3fb9MwED6NDaHxAGywETrAkyZeRrQ6Tmr7sYJVIFA3sRb1LfL8AyptadV2_P34nDRt6TZpQsqbz3Fsn-273H2fAY6cVCn12hubxKg4FYrFilMaO-7tXeUdMsdUuGyCd7tiMJDnSyj-kO0-D0mWmAZkaSpmJ2PjThbAN4qhR0wvCBRsMX8EW9gmJvX9uPhZxxGQUiiw7WGSh9-lK9jM7e9YPZrW7M31tMl_YqfhSOo8___OvIBnlTlK2qX-7MCGLXbh6RJJ4S40KqHh9Jp8ICuAkulL6PcQtEFOEdWkrSHlLRHVH0Zy5tzVKGTpE19OSswTQcwTaS9FzsmwIJ3Rr6qyl34F_c5p79OXuLqqIdYpT2cxt1IzqjLjPepUSS2kYY4KrZSzmabcGSulVdKJ1LZa1lBmpDGpMN5aYJdNx_ZgsxgV9jUQrTOFW4nVzrvtQkuupNFZU2WJu0w1j4DOZynXFY85XqdxlS8YmHFAcz-geRjQ3Nc5ruuMSxaPe6UP5pOfVyt6mntHWnjb0Tt0ERzWxX4tYoBFFXZ0gzLeXZNC0iSC_VJX6uYYQ1e6KSLgK1pUCyDP92pJMfwd-L4RDU2TVgQf57q0-Ky7e_HmYeLv4cn5507-_Wv3WwO2k6CN-BzA5mxyY9_CY_1nNpxO3oUF9hepByUa |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Trust+Enforced+Computational+Offloading+for+Health+Care+Applications+in+Fog+Computing&rft.jtitle=Wireless+personal+communications&rft.au=Meena%2C+V&rft.au=Gorripatti%2C+Meghana&rft.au=Suriya+Praba%2C+T&rft.date=2021&rft.issn=0929-6212&rft.spage=1&rft_id=info:doi/10.1007%2Fs11277-021-08285-7&rft_id=info%3Apmid%2F33840908&rft.externalDocID=33840908 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon |