{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T07:04:56Z","timestamp":1773903896729,"version":"3.50.1"},"reference-count":33,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772148"],"award-info":[{"award-number":["61772148"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672441"],"award-info":[{"award-number":["61672441"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province of China","doi-asserted-by":"publisher","award":["2018J01092"],"award-info":[{"award-number":["2018J01092"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province of China","doi-asserted-by":"publisher","award":["2016J013021"],"award-info":[{"award-number":["2016J013021"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province of China","doi-asserted-by":"publisher","award":["2016J05158"],"award-info":[{"award-number":["2016J05158"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fujian Provincial Outstanding Youth Scientific Research Personnel Training Program"},{"DOI":"10.13039\/501100001809","name":"Chinese National Research Fund","doi-asserted-by":"publisher","award":["61532013"],"award-info":[{"award-number":["61532013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National China 973 Project","award":["2015CB352401"],"award-info":[{"award-number":["2015CB352401"]}]},{"name":"Shanghai Scientific Innovation Act","award":["15JC140-2400"],"award-info":[{"award-number":["15JC140-2400"]}]},{"name":"985 Project of Shanghai Jiao Tong University","award":["WF220103001"],"award-info":[{"award-number":["WF220103001"]}]},{"name":"Scientific Research of Huaqiao University","award":["1611314018"],"award-info":[{"award-number":["1611314018"]}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1016\/j.future.2018.05.049","type":"journal-article","created":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T17:26:40Z","timestamp":1530034000000},"page":"573-582","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":94,"special_numbering":"C","title":["A novel trust mechanism based on Fog Computing in Sensor\u2013Cloud System"],"prefix":"10.1016","volume":"109","author":[{"given":"Tian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Guangxue","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9513-9990","authenticated-orcid":false,"given":"MD Zakirul Alam","family":"Bhuiyan","sequence":"additional","affiliation":[]},{"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weijia","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Mande","family":"Xie","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.future.2018.05.049_b1","first-page":"18","article-title":"A survey on sensor-cloud: architecture, applications, and approaches","volume":"2013","author":"Alamri","year":"2013","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"10.1016\/j.future.2018.05.049_b2","doi-asserted-by":"crossref","unstructured":"M. Yuriyama, T. Kushida, Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing, in: International Conference on Network-Based Information Systems, 2010, pp. 1\u20138.","DOI":"10.1109\/NBiS.2010.32"},{"issue":"4","key":"10.1016\/j.future.2018.05.049_b3","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TDSC.2015.2469655","article-title":"Dependable structural health monitoring using wireless sensor networks","volume":"14","author":"Bhuiyan","year":"2017","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"10.1016\/j.future.2018.05.049_b4","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1109\/JSYST.2014.2362617","article-title":"On theoretical modeling of sensor cloud: a paradigm shift from wireless sensor network","volume":"11","author":"Misra","year":"2017","journal-title":"IEEE Syst. J."},{"issue":"2","key":"10.1016\/j.future.2018.05.049_b5","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MS.2013.141","article-title":"Sensor cloud: a cloud of virtual sensors","volume":"31","author":"Madria","year":"2014","journal-title":"IEEE Softw."},{"key":"10.1016\/j.future.2018.05.049_b6","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.future.2017.12.036","article-title":"Fog-based storage technology to fight with cyber threat","volume":"83","author":"Wang","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2018.05.049_b7","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.jnca.2018.01.003","article-title":"Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks","volume":"106","author":"Shen","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.future.2018.05.049_b8","first-page":"1","article-title":"Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network","author":"Gao","year":"2018","journal-title":"Cluster Comput."},{"key":"10.1016\/j.future.2018.05.049_b9","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.jnca.2018.01.014","article-title":"Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures","volume":"107","author":"Xu","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"10.1016\/j.future.2018.05.049_b10","doi-asserted-by":"crossref","DOI":"10.1177\/1550147717695561","article-title":"Optimization coverage conserving protocol with authentication in wireless sensor networks","volume":"13","author":"Sun","year":"2017","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"10.1016\/j.future.2018.05.049_b11","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.adhoc.2014.08.001","article-title":"Security in the integration of low-power wireless sensor networks with the internet: a survey","volume":"24","author":"Granjal","year":"2015","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"10.1016\/j.future.2018.05.049_b12","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/MCOM.2018.1700303","article-title":"Data reduction for a smart citys critical infrastructural health monitoring","volume":"56","author":"Wang","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.future.2018.05.049_b13","article-title":"Data collection from WSNs to the cloud based on mobile Fog elements","author":"Wang","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"10.1016\/j.future.2018.05.049_b14","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s11235-015-0068-8","article-title":"A trust aware routing protocol for energy constrained wireless sensor network","volume":"61","author":"Ahmed","year":"2016","journal-title":"Telecommun. Syst."},{"issue":"3","key":"10.1016\/j.future.2018.05.049_b15","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1016\/j.jcss.2013.06.014","article-title":"Management and applications of trust in wireless sensor networks: a survey","volume":"80","author":"Han","year":"2014","journal-title":"J. Comput. System Sci."},{"issue":"5","key":"10.1016\/j.future.2018.05.049_b16","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1109\/TPDS.2014.2320505","article-title":"An efficient distributed trust model for wireless sensor networks","volume":"26","author":"Jiang","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.future.2018.05.049_b17","series-title":"Comprehensive trustworthy data collection approach in sensor-cloud system","author":"Wang","year":"2018"},{"issue":"C","key":"10.1016\/j.future.2018.05.049_b18","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.future.2017.02.006","article-title":"Multi-key privacy-preserving deep learning in cloud computing","volume":"74","author":"Li","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"10.1016\/j.future.2018.05.049_b19","first-page":"1","article-title":"Improved TOPSIS method based trust evaluation framework for determining trustworthiness of cloud service providers","volume":"15","author":"Sidhu","year":"2016","journal-title":"J. Grid Comput."},{"issue":"6","key":"10.1016\/j.future.2018.05.049_b20","first-page":"1","article-title":"Hybrid model for dynamic evaluation of trust in cloud services","volume":"22","author":"Rajendran","year":"2016","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.future.2018.05.049_b21","doi-asserted-by":"crossref","unstructured":"R.N.P.Z.J. Bonomi, Flavio Milito, Fog computing: a platform for internet of things and analytics, in: Big data and internet of things: A roadmap for smart environments, 2014, pp. 169\u2013186.","DOI":"10.1007\/978-3-319-05029-4_7"},{"key":"10.1016\/j.future.2018.05.049_b22","doi-asserted-by":"crossref","unstructured":"M.J. Guezguez, S. Rekhis, N. Boudriga, A sensor cloud architecture for healthcare applications, in: ACM Symposium on Applied Computing, 2016, pp. 612\u2013617.","DOI":"10.1145\/2851613.2851717"},{"key":"10.1016\/j.future.2018.05.049_b23","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.compag.2017.01.026","article-title":"Sensing-cloud: leveraging the benefits for agricultural applications","volume":"135","author":"Ojha","year":"2017","journal-title":"Comput. Electron. Agric."},{"key":"10.1016\/j.future.2018.05.049_b24","doi-asserted-by":"crossref","unstructured":"O. Savas, G. Jin, J. Deng, Trust management in cloud-integrated wireless sensor networks, in: International Conference on Collaboration Technologies and Systems, 2013, pp. 334\u2013341.","DOI":"10.1109\/CTS.2013.6567251"},{"issue":"1","key":"10.1016\/j.future.2018.05.049_b25","first-page":"118","article-title":"An authenticated trust and reputation calculation and management system for cloud and sensor networks integration","volume":"10","author":"Zhu","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2018.05.049_b26","doi-asserted-by":"crossref","unstructured":"C. Zhu, V.C.M. Leung, L.T. Yang, L. Shu, J.J.P.C. Rodrigues, X. Li, Trust assistance in sensor-cloud, in: Computer Communications Workshops, 2015.","DOI":"10.1109\/INFCOMW.2015.7179408"},{"key":"10.1016\/j.future.2018.05.049_b27","first-page":"77","article-title":"A trust point-based security architecture for sensor data in the cloud","author":"Henze","year":"2014","journal-title":"Trusted Cloud Comput."},{"issue":"2","key":"10.1016\/j.future.2018.05.049_b28","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","article-title":"Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection","volume":"9","author":"Bao","year":"2012","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"2","key":"10.1016\/j.future.2018.05.049_b29","first-page":"1","article-title":"Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks","volume":"42","author":"Prabha","year":"2017","journal-title":"Sdhan"},{"issue":"47","key":"10.1016\/j.future.2018.05.049_b30","doi-asserted-by":"crossref","DOI":"10.17485\/ijst\/2016\/v9i47\/108685","article-title":"A survey on trust models in cloud computing","volume":"9","author":"Gokulnath","year":"2016","journal-title":"Indian J. Sci. Technol."},{"key":"10.1016\/j.future.2018.05.049_b31","doi-asserted-by":"crossref","unstructured":"F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the internet of things, in: Edition of the Mcc Workshop on Mobile Cloud Computing, 2012, pp. 13\u201316.","DOI":"10.1145\/2342509.2342513"},{"key":"10.1016\/j.future.2018.05.049_b32","series-title":"Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing","first-page":"27","author":"Rodero-Merino","year":"2014"},{"issue":"6","key":"10.1016\/j.future.2018.05.049_b33","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.ins.2011.03.013","article-title":"A ladder diffusion algorithm using ant colony optimization for wireless sensor networks","volume":"192","author":"Ho","year":"2012","journal-title":"Inform. Sci."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X17323658?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X17323658?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T04:19:54Z","timestamp":1759119594000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X17323658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":33,"alternative-id":["S0167739X17323658"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2018.05.049","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2020,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A novel trust mechanism based on Fog Computing in Sensor\u2013Cloud System","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2018.05.049","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}