Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (302)
  • Open Access

    ARTICLE

    A Lightweight Blockchain for IoT in Smart City (IoT-SmartChain)

    Zakariae Dlimi*, Abdellah Ezzati, Saïd Ben Alla

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2687-2703, 2021, DOI:10.32604/cmc.2021.018942

    Abstract The smart city is a technological framework that connects the city’s different components to create new opportunities. This connection is possible with the help of the Internet of Things (IoT), which provides a digital personality to physical objects. Some studies have proposed integrating Blockchain technology with IoT in different use cases as access, orchestration, or replicated storage layer. The majority of connected objects’ capacity limitation makes the use of Blockchain inadequate due to its redundancy and its conventional processing-intensive consensus like PoW. This paper addresses these challenges by proposing a NOVEL model of a lightweight Blockchain framework (IoT-SmartChain), with a… More >

  • Open Access

    ARTICLE

    Intelligent Microservice Based on Blockchain for Healthcare Applications

    Faisal Jamil1, Faiza Qayyum1, Soha Alhelaly2, Farjeel Javed3, Ammar Muthanna4,5,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2513-2530, 2021, DOI:10.32604/cmc.2021.018809

    Abstract Nowadays, the blockchain, Internet of Things, and artificial intelligence technology revolutionize the traditional way of data mining with the enhanced data preprocessing, and analytics approaches, including improved service platforms. Nevertheless, one of the main challenges is designing a combined approach that provides the analytics functionality for diverse data and sustains IoT applications with robust and modular blockchain-enabled services in a diverse environment. Improved data analytics model not only provides support insights in IoT data but also fosters process productivity. Designing a robust IoT-based secure analytic model is challenging for several purposes, such as data from diverse sources, increasing data size,… More >

  • Open Access

    ARTICLE

    Using Blockchain Technology in Mobile Network to create decentralized Home Location Registry (HLR)

    Behnam Kiani Kalejahi1,2,*, Ruslan Eminov1, Aga Guliyev1

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 287-296, 2021, DOI:10.32604/csse.2021.05480

    Abstract Blockchain can mean many things to many people. It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers. It is a distributed ledger for business and finance and the technology underlying the explosion of new digital currencies. For technologists, it is the driving force behind the next generation of the internet. On the other hand, it is a transformational technology facilitating large-scale human progress in previously unimagined ways for the rest of the people, a tool for radically reshaping society and economy. Some view it as a disruptive technology that… More >

  • Open Access

    A Novel PoW Scheme Implemented by Probabilistic Signature for Blockchain

    Bo Mi1, Yuan Weng1, Darong Huang1,*, Yang Liu1, Yuqing Gan2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 265-274, 2021, DOI:10.32604/csse.2021.017507

    Abstract PoW (Proof of Work) plays a significant role in most blockchain systems to grant an accounting right over decentralized participants and ensure tamper resistance. Though hash functions are generally exploited for PoW due to their merits on summering, anti-collision, and irreversibility, they cannot certify that the bookkeeper is exactly the worker. Thereafter, such insistence may lead to abuse or even embezzlement of computing power for the benefit of malicious miners. To preserve the functionality of PoW but also bind the miners’ signing keys with their works, we build a post-quantum PoW scheme by changing the approximate closest vector norm for… More >

  • Open Access

    ARTICLE

    Blockchain-Based Decision Tree Classification in Distributed Networks

    Jianping Yu1,2,3, Zhuqing Qiao1, Wensheng Tang1,2,3,*, Danni Wang1, Xiaojun Cao4

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 713-728, 2021, DOI:10.32604/iasc.2021.017154

    Abstract In a distributed system such as Internet of things, the data volume from each node may be limited. Such limited data volume may constrain the performance of the machine learning classification model. How to effectively improve the performance of the classification in a distributed system has been a challenging problem in the field of data mining. Sharing data in the distributed network can enlarge the training data volume and improve the machine learning classification model’s accuracy. In this work, we take data sharing and the quality of shared data into consideration and propose an efficient Blockchain-based ID3 Decision Tree Classification… More >

  • Open Access

    ARTICLE

    A Deletable and Modifiable Blockchain Scheme Based on Record Verification Trees and the Multisignature Mechanism

    Daojun Han1,2,3, Jinyu Chen3,4, Lei Zhang1,2,3,*, Yatian Shen1,2,3, Yihua Gao3,5, Xueheng Wang3,6

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 223-245, 2021, DOI:10.32604/cmes.2021.016000

    Abstract As one of the most valuable technologies, blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios. However, data on a blockchain cannot be deleted. As a result, it is impossible to clean invalid and sensitive data and correct erroneous data. This, to a certain extent, hinders the application of blockchains in supply chains and Internet of Things. To address this problem, this study presents a deletable and modifiable blockchain scheme (DMBlockChain) based on record verification trees (RVTrees) and the multisignature scheme. (1) In this scheme, an RVTree structure is designed and added… More >

  • Open Access

    ARTICLE

    Attribute-Based Keyword Search over the Encrypted Blockchain

    Zhen Yang1, Hongao Zhang1, Haiyang Yu1,*, Zheng Li1, Bocheng Zhu1, Richard O. Sinnott2

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 269-282, 2021, DOI:10.32604/cmes.2021.015210

    Abstract To address privacy concerns, data in the blockchain should be encrypted in advance to avoid data access from all users in the blockchain. However, encrypted data cannot be directly retrieved, which hinders data sharing in the blockchain. Several works have been proposed to deal with this problem. However, the data retrieval in these schemes requires the participation of data owners and lacks finer-grained access control. In this paper, we propose an attribute-based keyword search scheme over the encrypted blockchain, which allows users to search encrypted files over the blockchain based on their attributes. In addition, we build a file chain… More >

  • Open Access

    ARTICLE

    Mining Bytecode Features of Smart Contracts to Detect Ponzi Scheme on Blockchain

    Xiajiong Shen1,3, Shuaimin Jiang2,3, Lei Zhang1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.3, pp. 1069-1085, 2021, DOI:10.32604/cmes.2021.015736

    Abstract The emergence of smart contracts has increased the attention of industry and academia to blockchain technology, which is tamper-proofing, decentralized, autonomous, and enables decentralized applications to operate in untrustworthy environments. However, these features of this technology are also easily exploited by unscrupulous individuals, a typical example of which is the Ponzi scheme in Ethereum. The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant. To solve this problem, we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode. In… More >

  • Open Access

    ARTICLE

    Distributed Trusted Computing for Blockchain-Based Crowdsourcing

    Yihuai Liang, Yan Li, Byeong-Seok Shin*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2825-2842, 2021, DOI:10.32604/cmc.2021.016682

    Abstract A centralized trusted execution environment (TEE) has been extensively studied to provide secure and trusted computing. However, a TEE might become a throughput bottleneck if it is used to evaluate data quality when collecting large-scale data in a crowdsourcing system. It may also have security problems compromised by attackers. Here, we propose a scheme, named dTEE, for building a platform for providing distributed trusted computing by leveraging TEEs. The platform is used as an infrastructure of trusted computations for blockchain-based crowdsourcing systems, especially to securely evaluate data quality and manage remuneration: these operations are handled by a TEE group. First,… More >

  • Open Access

    ARTICLE

    A Survey on Security Threats and Solutions of Bitcoin

    Le Lai1,*,Tongqing Zhou1, Zhiping Cai1, Zhiyao Liang2, Hao Bai1

    Journal of Cyber Security, Vol.3, No.1, pp. 29-44, 2021, DOI:10.32604/jcs.2021.016349

    Abstract Bitcoin is known as the first decentralized digital currency around the world. It uses blockchain technology to store transaction data in a distributed public ledger, is a distributed ledger that removes third-party trust institutions. Since its invention, bitcoin has achieved great success, has a market value of about $200 billion. However, while bitcoin has brought a wide and far-reaching impact in the financial field, it has also exposed some security problems, such as selfish mining attacks, Sybil attack, eclipse attacks, routing attacks, EREBUS attacks, and so on. This paper gives a comprehensive overview of various attack scenarios that the bitcoin… More >

Displaying 241-250 on page 25 of 302. Per Page