Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (302)
  • Open Access

    ARTICLE

    OTS Scheme Based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure

    Sushil Kumar Singh1, Yi Pan2, Jong Hyuk Park1,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2905-2922, 2021, DOI:10.32604/cmc.2021.014151

    Abstract For the past few decades, the Internet of Things (IoT) has been one of the main pillars wielding significant impact on various advanced industrial applications, including smart energy, smart manufacturing, and others. These applications are related to industrial plants, automation, and e-healthcare fields. IoT applications have several issues related to developing, planning, and managing the system. Therefore, IoT is transforming into G-IoT (Green Internet of Things), which realizes energy efficiency. It provides high power efficiency, enhances communication and networking. Nonetheless, this paradigm did not resolve all smart applications’ challenges in edge infrastructure, such as communication bandwidth, centralization, security, and privacy.… More >

  • Open Access

    ARTICLE

    Data Security Storage Model of the Internet of Things Based on Blockchain

    Pingshui Wang1,2,*, Willy Susilo2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 213-224, 2021, DOI:10.32604/csse.2021.014541

    Abstract With the development of information technology, the Internet of Things (IoT) has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet. The application of the IoT has brought great convenience to people’s production and life. However, the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them. The traditional centralized data storage and management model of the IoT is easy to cause transmission delay, single point of failure, privacy disclosure and other problems, and eventually leads to unpredictable behavior of the system. Blockchain technology… More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Storage Mechanism for Industrial Internet of Things

    Jin Wang1,2, Wencheng Chen1, Lei Wang3, Yongjun Ren4,*, R. Simon Sherratt5

    Intelligent Automation & Soft Computing, Vol.26, No.5, pp. 1157-1172, 2020, DOI:10.32604/iasc.2020.012174

    Abstract With the development of the Industrial Internet of Things and the continuous expansion of application scenarios, many development bottlenecks have followed. Its data security issue has become an obstacle to its widespread application. It has attracted substantial attention from both academia and industry. Blockchain technology has the characteristics of decentralization, openness and transparency and non-tampering. It has natural advantages in solving the security of the Industrial Internet of Things. Accordingly, this paper first analyzes the security risks associated with data storage in the Industrial Internet of Things and proposes the use of blockchain technology to ensure the secure storage of… More >

  • Open Access

    ARTICLE

    Blockchain Queuing Model with Non-Preemptive Limited-Priority

    Tianmu Li1,2, Yongjun Ren1,2,*, Jinyue Xia3

    Intelligent Automation & Soft Computing, Vol.26, No.5, pp. 1111-1122, 2020, DOI:10.32604/iasc.2020.012531

    Abstract Blockchain technology has recently obtained widespread attention. And it is being regarded as potentially even more disruptive than the Internet, whose usage includes large areas of applications ranging from crypto currency, financial services, reputation system, Internet of Things, sharing economy to public and social services. The existing works of blockchain primarily are focused on key components and potential applications. However, in the existing blockchain systems, the waiting time of transactions is too long. Furthermore, it may produce serious consequences because many important transactions are not handled timely. To solve the problem, in the paper, the blockchain Queuing model with non-preemptive… More >

  • Open Access

    ARTICLE

    Excellent Practical Byzantine Fault Tolerance

    Huanrong Tang, Yaojing Sun, Jianquan Ouyang*

    Journal of Cyber Security, Vol.2, No.4, pp. 167-182, 2020, DOI:10.32604/jcs.2020.011341

    Abstract With the rapid development of blockchain technology, more and more people are paying attention to the consensus mechanism of blockchain. Practical Byzantine Fault Tolerance (PBFT), as the first efficient consensus algorithm solving the Byzantine Generals Problem, plays an important role. But PBFT also has its problems. First, it runs in a completely closed environment, and any node can't join or exit without rebooting the system. Second, the communication complexity in the network is as high as O(n2), which makes the algorithm only applicable to small-scale networks. For these problems, this paper proposes an Optimized consensus algorithm, Excellent Practical Byzantine Fault… More >

  • Open Access

    ARTICLE

    Real Estate Management via a Decentralized Blockchain Platform

    Iftikhar Ahmad1,*, Mohammed A. Alqarni2, Abdulwahab Ali Almazroi3, Laiba Alam1

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1813-1822, 2021, DOI:10.32604/cmc.2020.013048

    Abstract Blockchain technology is one of the key technological breakthroughs of the last decade. It has the ability to revolutionize numerous aspects of society, including financial systems, healthcare, e-government and many others. One such area that is able to reap the benefits of blockchain technology is the real estate industry. Like many other industries, real estate faces major administrative problems such as high transaction fees, a lack of transparency, fraud and the effects of a middleman including undue influence and commissions. Blockchain enables supporting technologies to overcome the obstacles inherent within the real estate investment market. These technologies include smart contracts,… More >

  • Open Access

    ARTICLE

    Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption

    Tao Feng1,*, Hongmei Pei1, Rong Ma1, Youliang Tian2, Xiaoqin Feng3

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 871-890, 2021, DOI:10.32604/cmc.2020.012146

    Abstract Data privacy is important to the security of our society, and enabling authorized users to query this data efficiently is facing more challenge. Recently, blockchain has gained extensive attention with its prominent characteristics as public, distributed, decentration and chronological characteristics. However, the transaction information on the blockchain is open to all nodes, the transaction information update operation is even more transparent. And the leakage of transaction information will cause huge losses to the transaction party. In response to these problems, this paper combines hierarchical attribute encryption with linear secret sharing, and proposes a blockchain data privacy protection control scheme based… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain

    Lejun Zhang1,2,*, Minghui Peng1, Weizheng Wang3 , Yansen Su4, Shuna Cui5,6, Seokhoon Kim7

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 499-515, 2021, DOI:10.32604/cmc.2020.012205

    Abstract In the digital era, electronic medical record (EMR) has been a major way for hospitals to store patients’ medical data. The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing. The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput. To address these issues, we propose a secure and efficient medical data storage and sharing scheme based on double blockchain. In our scheme, we encrypt the original EMR and store it in the cloud. The storage blockchain stores the index of the… More >

  • Open Access

    ARTICLE

    Task-Attribute-Based Access Control Scheme for IoT via Blockchain

    Hao Chen1, Wunan Wan1, *, Jinyue Xia2, *, Shibin Zhang1, Jinquan Zhang1, Xizi Peng1, Xingjie Fan1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2441-2453, 2020, DOI:10.32604/cmc.2020.011824

    Abstract As a new form of network, the Internet of things (IoT) is becoming more widely used in people’s lives. In this paper, related theoretical research and practical applications of the IoT are explored. The security of the IoT has become a hot research topic. Access controls are methods that control reasonable allocations of data and resources and ensure the security of the IoT. However, most access control systems do not dynamically assign users’ rights. Additionally, with some access control systems, there is a risk of overstepping other user’s authority, and there may exist a central authority that is a single… More >

  • Open Access

    ARTICLE

    Data Secure Storage Mechanism of Sensor Networks Based on Blockchain

    Jin Wang1, 2, Wencheng Chen1, Lei Wang3, *, R. Simon Sherratt4, Osama Alfarraj5, Amr Tolba5, 6

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2365-2384, 2020, DOI:10.32604/cmc.2020.011567

    Abstract As the number of sensor network application scenarios continues to grow, the security problems inherent in this approach have become obstacles that hinder its wide application. However, it has attracted increasing attention from industry and academia. The blockchain is based on a distributed network and has the characteristics of nontampering and traceability of block data. It is thus naturally able to solve the security problems of the sensor networks. Accordingly, this paper first analyzes the security risks associated with data storage in the sensor networks, then proposes using blockchain technology to ensure that data storage in the sensor networks is… More >

Displaying 271-280 on page 28 of 302. Per Page