Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (302)
  • Open Access

    ARTICLE

    Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare

    J. Priya*, C. Palanisamy

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 243-259, 2023, DOI:10.32604/iasc.2023.025719

    Abstract The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internet and computing resources. In recent years, many more IoT applications have been extensively used. For instance, Healthcare applications execute computations utilizing the user’s private data stored on cloud servers. However, the main obstacles faced by the extensive acceptance and usage of these emerging technologies are security and privacy. Moreover, many healthcare data management system applications have emerged, offering solutions for distinct circumstances. But still, the existing system has issues with specific security issues, privacy-preserving rate, information loss, etc.… More >

  • Open Access

    ARTICLE

    An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship

    K. Meenakshi*, K. Sashi Rekha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 111-128, 2023, DOI:10.32604/iasc.2023.025032

    Abstract Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network. Both transactions in the system are carried out by consensus processes and to preserve confidentiality all the files contained cannot be changed. Blockchain technology is the fundamental software behind digital currencies like Bitcoin, which is common in the marketplace. Cloud computing is a method of using a network of external machines to store, monitor, and process information, rather than using the local computer or a local personal computer. The software is currently facing multiple problems including lack of data… More >

  • Open Access

    ARTICLE

    Proof of Activity Protocol for IoMT Data Security

    R. Rajadevi1, K. Venkatachalam2, Mehedi Masud3, Mohammed A. AlZain4, Mohamed Abouhawwash5,6,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 339-350, 2023, DOI:10.32604/csse.2023.024537

    Abstract The Internet of Medical Things (IoMT) is an online device that senses and transmits medical data from users to physicians within a time interval. In, recent years, IoMT has rapidly grown in the medical field to provide healthcare services without physical appearance. With the use of sensors, IoMT applications are used in healthcare management. In such applications, one of the most important factors is data security, given that its transmission over the network may cause obtrusion. For data security in IoMT systems, blockchain is used due to its numerous blocks for secure data storage. In this study, Blockchain-assisted secure data… More >

  • Open Access

    ARTICLE

    Phish Block: A Blockchain Framework for Phish Detection in Cloud

    R. N. Karthika*, C. Valliyammai, M. Naveena

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 777-795, 2023, DOI:10.32604/csse.2023.024086

    Abstract The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy. But, deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes. In Spite of much technological advancement, phishing acts as the first step in a series of attacks. With technological advancements, availability and access to the phishing kits has improved drastically, thus making it an ideal tool for the hackers to execute the attacks. The phishing cases indicate use of foreign characters to disguise the original Uniform Resource Locator (URL), typosquatting the popular domain names, using reserved characters… More >

  • Open Access

    ARTICLE

    Selfish Mining and Defending Strategies in the Bitcoin

    Weijian Zhang1,*, Hao Wang2, Hao Hua3, Qirun Wang4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1861-1875, 2022, DOI:10.32604/iasc.2022.030274

    Abstract As a kind of distributed, decentralized and peer-to-peer transmitted technology, blockchain technology has gradually changed people’s lifestyle. However, blockchain technology also faces many problems including selfish mining attack, which causes serious effects to the development of blockchain technology. Selfish mining is a kind of mining strategy where selfish miners increase their profit by selectively publishing hidden blocks. This paper builds the selfish mining model from the perspective of node state conversion and utilize the function extremum method to figure out the optimal profit of this model. Meanwhile, based on the experimental data of honest mining, the author conducts the simulation… More >

  • Open Access

    ARTICLE

    Blockchain-Enabled Digital Rights Management for Museum-Digital Property Rights

    Liutao Zhao1,2, Jiawan Zhang1,3,*, Hairong Jing4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1785-1801, 2022, DOI:10.32604/iasc.2022.029693

    Abstract With the rapid development of digitization technology, digital copyright of museum has become more and more valuable. Its collections can be opened to and shared with the people through the Internet. However, centralized authorization, untransparent transaction information and risk of tampering data in traditional digital rights management have a strong impact on system normal operation. In this paper, we proposed a blockchain-based digital rights management scheme (BMDRM) that realizes a distributed digital rights management and authorization system by introducing non-fungible tokens (NFTs) and smart contracts. To ensure the security and efficiency of transactions and authorization, we store all processing data… More >

  • Open Access

    ARTICLE

    Consensus Mechanism of Blockchain Based on PoR with Data Deduplication

    Wei Zhou1, Hao Wang2, Ghulam Mohiuddin3, Dan Chen4,*, Yongjun Ren1

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1473-1488, 2022, DOI:10.32604/iasc.2022.029657

    Abstract As the basis of cloud computing, distributed storage technology mainly studies how data centers store, organize and manage data. Blockchain has become the most secure solution for cloud storage due to its decentralization and immutability. Consensus mechanism is one of the core technologies of blockchain, which affects the transaction processing capability, security and scalability of blockchain. The current mainstream consensus algorithms such as Proof of Work, Proof of Stake, and Delegated Proof of Stake all have the problem of wasting resources. And with the explosive growth of data, cloud storage nodes store a large amount of redundant data, which inevitably… More >

  • Open Access

    ARTICLE

    Fast and Efficient Security Scheme for Blockchain-Based IoT Networks

    K. A. Fasila*, Sheena Mathew

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2097-2114, 2022, DOI:10.32604/cmc.2022.029637

    Abstract

    Internet of Things (IoT) has become widely used nowadays and tremendous increase in the number of users raises its security requirements as well. The constraints on resources such as low computational capabilities and power requirements demand lightweight cryptosystems. Conventional algorithms are not applicable in IoT network communications because of the constraints mentioned above. In this work, a novel and efficient scheme for providing security in IoT applications is introduced. The scheme proposes how security can be enhanced in a distributed IoT application by providing multilevel protection and dynamic key generation in the data uploading and transfer phases. Existing works rely… More >

  • Open Access

    ARTICLE

    Privacy Preserving Image Encryption with Deep Learning Based IoT Healthcare Applications

    Mohammad Alamgeer1, Saud S. Alotaibi2, Shaha Al-Otaibi3, Nazik Alturki3, Anwer Mustafa Hilal4,*, Abdelwahed Motwakel4, Ishfaq Yaseen4, Mohamed I. Eldesouki5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1159-1175, 2022, DOI:10.32604/cmc.2022.028275

    Abstract Latest developments in computing and communication technologies are enabled the design of connected healthcare system which are mainly based on IoT and Edge technologies. Blockchain, data encryption, and deep learning (DL) models can be utilized to design efficient security solutions for IoT healthcare applications. In this aspect, this article introduces a Blockchain with privacy preserving image encryption and optimal deep learning (BPPIE-ODL) technique for IoT healthcare applications. The proposed BPPIE-ODL technique intends to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server. The proposed BPPIE-ODL technique encompasses the design of dragonfly… More >

  • Open Access

    ARTICLE

    PoEC: A Cross-Blockchain Consensus Mechanism for Governing Blockchain by Blockchain

    Jieren Cheng1,3, Yuan Zhang2,3,*, Yuming Yuan4, Hui Li4, Xiangyan Tang1,3, Victor S. Sheng5, Guangjing Hu1,3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1385-1402, 2022, DOI:10.32604/cmc.2022.026437

    Abstract The research on the governing blockchain by blockchain supervision system is an important development trend of blockchain technology. In this system there is a supervisory blockchain managing and governing the supervised blockchain based on blockchain technology, results in a uniquely cross-blockchain demand to consensus mechanism for solving the trust problem between supervisory blockchain and supervised blockchain. To solve this problem, this paper proposes a cross-blockchain consensus mechanism based on smart contract and a set of smart contracts endorse the cross-blockchain consensus. New consensus mechanism called Proof-of-Endorse-Contracts (PoEC) consensus, which firstly transfers the consensus reached in supervisory blockchain to supervised blockchain… More >

Displaying 171-180 on page 18 of 302. Per Page