Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (298)
  • Open Access

    ARTICLE

    A Image Copyright Protection Method Using Zero-Watermark by Blockchain and IPFS

    Tao Chen1, Zhao Qiu1,*, Gengquan Xie1, Lin Yuan1, Shaohua Duan1, Hao Guo1, Dahao Fu1, Hancheng Huang2

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 131-142, 2021, DOI:10.32604/jihpp.2021.026606

    Abstract Behind the popularity of multimedia technology, the dispute over image copyright is getting worse. In the digital watermark prevention technology for copyright infringement, watermark technology is considered to be an important technology to overcome data protection problems and verify the relationship between data ownership. Among the many digital watermarking technologies, zero watermarking technology has been favored in recent years. However, the existing zero watermark technology in the implementation process often needs a trusted third party to store watermarks, which may make the data too central, data storage security is low and copyright registration costs are too high, which creates a… More >

  • Open Access

    ARTICLE

    Lightweight Direct Acyclic Graph Blockchain for Enhancing Resource-Constrained IoT Environment

    Salaheddine Kably1,2,*, Mounir Arioua1, Nabih Alaoui2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5271-5291, 2022, DOI:10.32604/cmc.2022.020833

    Abstract Blockchain technology is regarded as the emergent security solution for many applications related to the Internet of Things (IoT). In concept, blockchain has a linear structure that grows with the number of transactions entered. This growth in size is the main obstacle to the blockchain, which makes it unsuitable for resource-constrained IoT environments. Moreover, conventional consensus algorithms such as PoW, PoS are very computationally heavy. This paper solves these problems by introducing a new lightweight blockchain structure and lightweight consensus algorithm. The Multi-Zone Direct Acyclic Graph (DAG) Blockchain (Multizone-DAG-Blockchain) framework is proposed for the fog-based IoT environment. In this context,… More >

  • Open Access

    ARTICLE

    User Centric Block-Level Attribute Based Encryption in Cloud Using Blockchains

    S. Godfrey Winster1, A. Siva Kumar2,*, R. Ramesh3

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 605-618, 2022, DOI:10.32604/csse.2022.022467

    Abstract Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner. The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation (RMI). The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user. Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service. To improve the performance in data security, the block chains… More >

  • Open Access

    ARTICLE

    FileWallet: A File Management System Based on IPFS and Hyperledger Fabric

    Jienan Chen, Chuang Zhang, Yu Yan, Yuan Liu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.2, pp. 949-966, 2022, DOI:10.32604/cmes.2022.017516

    Abstract Online file management systems enable cooperatively editing and sharing. However, due to the cost of communication and storage infrastructures, traditional online file management services, e.g., Google Drive and OneDrive, usually provide limited storage space and relatively low download speed for free users. To achieve better performance, ordinary users have to purchase their expensive services. Moreover, these file management systems are based on centralized architecture and bear the privacy leakage risk, because users’ personal files are stored and controlled by their servers. To address the above problems, we propose a peer-to-peer (P2P) file management system based on IPFS and Hyperledger Fabric,… More >

  • Open Access

    ARTICLE

    Blockchain for Securing Healthcare Data Using Squirrel Search Optimization Algorithm

    B. Jaishankar1,*, Santosh Vishwakarma2, Prakash Mohan3, Aditya Kumar Singh Pundir4, Ibrahim Patel5, N. Arulkumar6

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1815-1829, 2022, DOI:10.32604/iasc.2022.021822

    Abstract The Healthcare system is an organization that consists of important requirements corresponding to security and privacy, for example, protecting patients’ medical information from unauthorized access, communication with transport like ambulance and smart e-health monitoring. Due to lack of expert design of security protocols, the healthcare system is facing many security threats such as authenticity, data sharing, the conveying of medical data. In such situation, block chain protocol is used. In this manuscript, Efficient Block chain Network for securing Healthcare data using Multi-Objective Squirrel Search Optimization Algorithm (MOSSA) is proposed to generate smart and secure Healthcare system. In this the block… More >

  • Open Access

    ARTICLE

    Integration of Fog Computing for Health Record Management Using Blockchain Technology

    Mesfer AI Duhayyim1, Fahd N. Al-Wesabi2, Radwa Marzouk3, Abdalla Ibrahim Abdalla Musa4, Noha Negm5, Anwer Mustafa Hilal6, Manar Ahmed Hamza6,*, Mohammed Rizwanullah6

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4135-4149, 2022, DOI:10.32604/cmc.2022.022336

    Abstract Internet of Medical Things (IoMT) is a breakthrough technology in the transfer of medical data via a communication system. Wearable sensor devices collect patient data and transfer them through mobile internet, that is, the IoMT. Recently, the shift in paradigm from manual data storage to electronic health recording on fog, edge, and cloud computing has been noted. These advanced computing technologies have facilitated medical services with minimum cost and available conditions. However, the IoMT raises a high concern on network security and patient data privacy in the health care system. The main issue is the transmission of health data with… More >

  • Open Access

    ARTICLE

    CryptoNight Mining Algorithm with YAC Consensus for Social Media Marketing Using Blockchain

    Anwer Mustafa Hil1, Fahd N. Al-Wesabi2, Hadeel Alsolai3, Ola Abdelgney Omer Ali4, Nadhem Nemri5, Manar Ahmed Hamza1,*, Abu Sarwar Zamani1, Mohammed Rizwanullah1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3921-3936, 2022, DOI:10.32604/cmc.2022.022301

    Abstract Social media is a platform in which user can create, share and exchange the knowledge/information. Social media marketing is to identify the different consumer's demands and engages them to create marketing resources. The popular social media platforms are Microsoft, Snapchat, Amazon, Flipkart, Google, eBay, Instagram, Facebook, Pin interest, and Twitter. The main aim of social media marketing deals with various business partners and build good relationship with millions of customers by satisfying their needs. Disruptive technology is replacing old approaches in the social media marketing to new technology-based marketing. However, this disruptive technology creates some issues like fake news, insecure,… More >

  • Open Access

    ARTICLE

    Blockchain Based Secured Load Balanced Task Scheduling Approach for Fitness Service

    Muhammad Ibrahim1, Faisal Jamil2, YunJung Lee1, DoHyeun Kim2,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2599-2616, 2022, DOI:10.32604/cmc.2022.019534

    Abstract In recent times, the evolution of blockchain technology has got huge attention from the research community due to its versatile applications and unique security features. The IoT has shown wide adoption in various applications including smart cities, healthcare, trade, business, etc. Among these applications, fitness applications have been widely considered for smart fitness systems. The users of the fitness system are increasing at a high rate thus the gym providers are constantly extending the fitness facilities. Thus, scheduling such a huge number of requests for fitness exercise is a big challenge. Secondly, the user fitness data is critical thus securing… More >

  • Open Access

    ARTICLE

    Unsupervised Binary Protocol Clustering Based on Maximum Sequential Patterns

    Jiaxin Shi1, Lin Ye1,2,*, Zhongwei Li3, Dongyang Zhan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 483-498, 2022, DOI:10.32604/cmes.2022.017467

    Abstract With the rapid development of the Internet, a large number of private protocols emerge on the network. However, some of them are constructed by attackers to avoid being analyzed, posing a threat to computer network security. The blockchain uses the P2P protocol to implement various functions across the network. Furthermore, the P2P protocol format of blockchain may differ from the standard format specification, which leads to sniffing tools such as Wireshark and Fiddler not being able to recognize them. Therefore, the ability to distinguish different types of unknown network protocols is vital for network security. In this paper, we propose… More >

  • Open Access

    ARTICLE

    Service Level Agreement Based Secured Data Analytics Framework for Healthcare Systems

    S. Benila1,*, N. Usha Bhanu2

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1277-1291, 2022, DOI:10.32604/iasc.2022.021920

    Abstract Many physical objects are connected to the internet in this modern day to make things easier to work based on the convenience of the user, which reduces human involvement with the help of Internet of Things (IoT) technology.This aids in the capture of large amounts of data, the interchange of information via the internet, and the remote operation of machines. IoT health data is typically in the form of big data and is frequently coupled with the cloud for secure storage. Cloud technology provides a wide range of technological services via the internet, and it is a highly interoperable and… More >

Displaying 201-210 on page 21 of 298. Per Page