Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (298)
  • Open Access

    ARTICLE

    Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study

    Sajid Habib Gill1, Mirza Abdur Razzaq1, Muneer Ahmad2, Fahad M. Almansour3, Ikram Ul Haq4, NZ Jhanjhi5,*, Malik Zaib Alam6, Mehedi Masud7

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 117-128, 2022, DOI:10.32604/iasc.2022.016597

    Abstract The trend of cloud computing is accelerating along with emerging technologies such as utility computing, grid computing, and distributed computing. Cloud computing is showing remarkable potential to provide flexible, cost-effective, and powerful resources across the internet, and is a driving force in today’s most prominent computing technologies. The cloud offers the means to remotely access and store data while virtual machines access data over a network resource. Furthermore, cloud computing plays a leading role in the fourth industrial revolution. Everyone uses the cloud daily life when accessing Dropbox, various Google services, and Microsoft Office 365. While there are many advantages… More >

  • Open Access

    REVIEW

    Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges

    Salam Al-E’mari1, Mohammed Anbar1,*, Yousef Sanjalawe1,2, Selvakumar Manickam1, Iznan Hasbullah1

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 87-112, 2022, DOI:10.32604/csse.2022.017941

    Abstract Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter… More >

  • Open Access

    ARTICLE

    Blockchain: Secured Solution for Signature Transfer in Distributed Intrusion Detection System

    Shraddha R. Khonde1,2,*, Venugopal Ulagamuthalvi1

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 37-51, 2022, DOI:10.32604/csse.2022.017130

    Abstract Exchange of data in networks necessitates provision of security and confidentiality. Most networks compromised by intruders are those where the exchange of data is at high risk. The main objective of this paper is to present a solution for secure exchange of attack signatures between the nodes of a distributed network. Malicious activities are monitored and detected by the Intrusion Detection System (IDS) that operates with nodes connected to a distributed network. The IDS operates in two phases, where the first phase consists of detection of anomaly attacks using an ensemble of classifiers such as Random forest, Convolutional neural network,… More >

  • Open Access

    ARTICLE

    IDV: Internet Domain Name Verification Based on Blockchain

    Ning Hu1, Yu Teng2, Yan Zhao1, Shi Yin1, Yue Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.1, pp. 299-322, 2021, DOI:10.32604/cmes.2021.016839

    Abstract The rapid development of blockchain technology has provided new ideas for network security research. Blockchain-based network security enhancement solutions are attracting widespread attention. This paper proposes an Internet domain name verification method based on blockchain. The authenticity of DNS (Domain Name System) resolution results is crucial for ensuring the accessibility of Internet services. Due to the lack of adequate security mechanisms, it has always been a challenge to verify the authenticity of Internet domain name resolution results. Although the solution represented by DNSSEC (Domain Name System Security Extensions) can theoretically solve the domain name verification problem, it has not been… More >

  • Open Access

    ARTICLE

    Towards Privacy-Preserving Cloud Storage: A Blockchain Approach

    Jia-Shun Zhang1, Gang Xu2,*, Xiu-Bo Chen1, Haseeb Ahmad3, Xin Liu4, Wen Liu5,6,7

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 2903-2916, 2021, DOI:10.32604/cmc.2021.017227

    Abstract With the rapid development of cloud computing technology, cloud services have now become a new business model for information services. The cloud server provides the IT resources required by customers in a self-service manner through the network, realizing business expansion and rapid innovation. However, due to the insufficient protection of data privacy, the problem of data privacy leakage in cloud storage is threatening cloud computing. To address the problem, we propose BC-PECK, a data protection scheme based on blockchain and public key searchable encryption. Firstly, all the data is protected by the encryption algorithm. The privacy data is encrypted and… More >

  • Open Access

    ARTICLE

    Blockchain Based Secure Solution for Cloud Storage: A Model for Synchronizing Industry 4.0 and IIoT

    Prakhar Sahu1,*, S. K. Singh1, Arun Kumar Singh2

    Journal of Cyber Security, Vol.3, No.2, pp. 107-115, 2021, DOI:10.32604/jcs.2021.020831

    Abstract Industry 4.0 is one of the hot topic of today’s world where everything in the industry will be data driven and technological advancements will take place accordingly. In the fourth phase of industrial revolution, manufacturers are dependent upon data produced by the consumers to invent, innovate or change anything for the product. Internet of things devices like OBD, RFID, IIoT, Smart devices are the major source of data generation and represents trends in the industry. Since the IoT device are vulnerable to hackers due to its limitation, consumer data security should be tighten up and enhanced. This paper gives an… More >

  • Open Access

    ARTICLE

    A Lightweight Blockchain for IoT in Smart City (IoT-SmartChain)

    Zakariae Dlimi*, Abdellah Ezzati, Saïd Ben Alla

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2687-2703, 2021, DOI:10.32604/cmc.2021.018942

    Abstract The smart city is a technological framework that connects the city’s different components to create new opportunities. This connection is possible with the help of the Internet of Things (IoT), which provides a digital personality to physical objects. Some studies have proposed integrating Blockchain technology with IoT in different use cases as access, orchestration, or replicated storage layer. The majority of connected objects’ capacity limitation makes the use of Blockchain inadequate due to its redundancy and its conventional processing-intensive consensus like PoW. This paper addresses these challenges by proposing a NOVEL model of a lightweight Blockchain framework (IoT-SmartChain), with a… More >

  • Open Access

    ARTICLE

    Intelligent Microservice Based on Blockchain for Healthcare Applications

    Faisal Jamil1, Faiza Qayyum1, Soha Alhelaly2, Farjeel Javed3, Ammar Muthanna4,5,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2513-2530, 2021, DOI:10.32604/cmc.2021.018809

    Abstract Nowadays, the blockchain, Internet of Things, and artificial intelligence technology revolutionize the traditional way of data mining with the enhanced data preprocessing, and analytics approaches, including improved service platforms. Nevertheless, one of the main challenges is designing a combined approach that provides the analytics functionality for diverse data and sustains IoT applications with robust and modular blockchain-enabled services in a diverse environment. Improved data analytics model not only provides support insights in IoT data but also fosters process productivity. Designing a robust IoT-based secure analytic model is challenging for several purposes, such as data from diverse sources, increasing data size,… More >

  • Open Access

    ARTICLE

    Using Blockchain Technology in Mobile Network to create decentralized Home Location Registry (HLR)

    Behnam Kiani Kalejahi1,2,*, Ruslan Eminov1, Aga Guliyev1

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 287-296, 2021, DOI:10.32604/csse.2021.05480

    Abstract Blockchain can mean many things to many people. It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers. It is a distributed ledger for business and finance and the technology underlying the explosion of new digital currencies. For technologists, it is the driving force behind the next generation of the internet. On the other hand, it is a transformational technology facilitating large-scale human progress in previously unimagined ways for the rest of the people, a tool for radically reshaping society and economy. Some view it as a disruptive technology that… More >

  • Open Access

    A Novel PoW Scheme Implemented by Probabilistic Signature for Blockchain

    Bo Mi1, Yuan Weng1, Darong Huang1,*, Yang Liu1, Yuqing Gan2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 265-274, 2021, DOI:10.32604/csse.2021.017507

    Abstract PoW (Proof of Work) plays a significant role in most blockchain systems to grant an accounting right over decentralized participants and ensure tamper resistance. Though hash functions are generally exploited for PoW due to their merits on summering, anti-collision, and irreversibility, they cannot certify that the bookkeeper is exactly the worker. Thereafter, such insistence may lead to abuse or even embezzlement of computing power for the benefit of malicious miners. To preserve the functionality of PoW but also bind the miners’ signing keys with their works, we build a post-quantum PoW scheme by changing the approximate closest vector norm for… More >

Displaying 231-240 on page 24 of 298. Per Page