Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23)
  • Open Access

    ARTICLE

    Securing Mobile Cloud-Based Electronic Health Records: A Blockchain-Powered Cryptographic Solution with Enhanced Privacy and Efficiency

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Journal of Intelligent Medicine and Healthcare, Vol.2, pp. 15-34, 2024, DOI:10.32604/jimh.2024.048784

    Abstract The convergence of handheld devices and cloud-based computing has transformed how Electronic Health Records (EHRs) are stored in mobile cloud paradigms, offering benefits such as affordability, adaptability, and portability. However, it also introduces challenges regarding network security and data confidentiality, as it aims to exchange EHRs among mobile users while maintaining high levels of security. This study proposes an innovative blockchain-based solution to these issues and presents secure cloud storage for healthcare data. To provide enhanced cryptography, the proposed method combines an enhanced Blowfish encryption method with a new key generation technique called Elephant Herding Optimization with Resistance-Based Training (EHO-RBT).… More >

  • Open Access

    ARTICLE

    Data Secure Storage Mechanism for IIoT Based on Blockchain

    Jin Wang1,2, Guoshu Huang1, R. Simon Sherratt3, Ding Huang4, Jia Ni4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4029-4048, 2024, DOI:10.32604/cmc.2024.047468

    Abstract With the development of Industry 4.0 and big data technology, the Industrial Internet of Things (IIoT) is hampered by inherent issues such as privacy, security, and fault tolerance, which pose certain challenges to the rapid development of IIoT. Blockchain technology has immutability, decentralization, and autonomy, which can greatly improve the inherent defects of the IIoT. In the traditional blockchain, data is stored in a Merkle tree. As data continues to grow, the scale of proofs used to validate it grows, threatening the efficiency, security, and reliability of blockchain-based IIoT. Accordingly, this paper first analyzes the inefficiency of the traditional blockchain… More >

  • Open Access

    ARTICLE

    A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security

    Fauziyah1, Zhaoshun Wang1,*, Mujahid Tabassum2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4417-4452, 2024, DOI:10.32604/cmc.2024.046797

    Abstract In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method employs a phased strategy, beginning… More >

  • Open Access

    ARTICLE

    Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing

    Nader Abdel Karim1,*, Osama A. Khashan2,*, Waleed K. Abdulraheem3, Moutaz Alazab1, Hasan Kanaker4, Mahmoud E. Farfoura5, Mohammad Alshinwan5,6

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2023-2045, 2024, DOI:10.32604/cmc.2023.044304

    Abstract As the extensive use of cloud computing raises questions about the security of any personal data stored there, cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment. A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware. The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment. An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance; Each hypervisor should be examined to meet… More >

  • Open Access

    ARTICLE

    A Flexible Architecture for Cryptographic Applications: ECC and PRESENT

    Muhammad Rashid1,*, Omar S. Sonbul1, Muhammad Arif2, Furqan Aziz Qureshi3, Saud. S. Alotaibi4, Mohammad H. Sinky1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1009-1025, 2023, DOI:10.32604/cmc.2023.039901

    Abstract This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography (ECC) and PRESENT for cryptographic applications. The features of the proposed work are (i) computation of only the point multiplication operation of ECC over for a 163-bit key generation, (ii) execution of only the variant of an 80-bit PRESENT block cipher for data encryption & decryption and (iii) execution of point multiplication operation (ECC algorithm) along with the data encryption and decryption (PRESENT algorithm). To establish an area overhead for the flexible design, dedicated hardware architectures of ECC and PRESENT are implemented in the first step, and a sum of… More >

  • Open Access

    ARTICLE

    An Interoperability Cross-Block Chain Framework for Secure Transactions in IoT

    N. Anand Kumar1,*, A. Grace Selvarani2, P. Vivekanandan3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1077-1090, 2023, DOI:10.32604/csse.2023.034115

    Abstract The purpose of this research is to deal with effective block chain framework for secure transactions. The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue, Cross-Chain based Transaction (CCT) is introduced. Traditional industries have been restructured by the introduction of Internet of Things (IoT) to become smart industries through the feature of data-driven decision-making. Still, there are a few limitations, like decentralization, security vulnerabilities, poor interoperability, as well as privacy concerns in IoTs. To overcome this limitation, Blockchain has been employed to assure a… More >

  • Open Access

    ARTICLE

    Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems

    Byeori Kim1, Minseong Choi1, Taek-Young Youn2, Jeong Hyun Yi1, Haehyun Cho1,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3725-3742, 2023, DOI:10.32604/iasc.2023.036574

    Abstract Recently, there has been a sudden shift from using traditional office applications to the collaborative cloud-based office suite such as Microsoft Office 365. Such cloud-based systems allow users to work together on the same document stored in a cloud server at once, by which users can effectively collaborate with each other. However, there are security concerns unsolved in using cloud collaboration. One of the major concerns is the security of data stored in cloud servers, which comes from the fact that data that multiple users are working together cannot be stored in encrypted form because of the dynamic characteristic of… More >

  • Open Access

    ARTICLE

    Cryptographic Algorithm for Enhancing Data Security in Wireless IoT Sensor Networks

    A. Bhavani, V. Nithya*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1381-1393, 2023, DOI:10.32604/iasc.2023.029397

    Abstract Wireless IoT Sensor Network can handle audio, video, text, etc., through the interconnection of ubiquitous devices. The entertainment and application-centric network relies on its autonomous nodes for handling large streams of multimedia data. Security breaches and threats due to insider attacks reduce the data handling and distribution capacity of the nodes. For addressing the insider attacks problem, Session-Critical Distributed Authentication Method (SCDAM) is proposed. The proposed method relies on short-lived concealed authentication based on an improved elliptic curve cryptography (ECC) algorithm. In this authentication, the session time and the interrupts are accounted for, providing end-to-end authentication. The session keys are… More >

  • Open Access

    ARTICLE

    Data Security Storage Mechanism Based on Blockchain Network

    Jin Wang1, Wei Ou1, Wenhai Wang2, R. Simon Sherratt3, Yongjun Ren4, Xiaofeng Yu5,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4933-4950, 2023, DOI:10.32604/cmc.2023.034148

    Abstract With the rapid development of information technology, the development of blockchain technology has also been deeply impacted. When performing block verification in the blockchain network, if all transactions are verified on the chain, this will cause the accumulation of data on the chain, resulting in data storage problems. At the same time, the security of data is also challenged, which will put enormous pressure on the block, resulting in extremely low communication efficiency of the block. The traditional blockchain system uses the Merkle Tree method to store data. While verifying the integrity and correctness of the data, the amount of… More >

  • Open Access

    ARTICLE

    A Novel Secure Scan Design Based on Delayed Physical Unclonable Function

    Weizheng Wang1,2, Xingxing Gong1, Xiangqi Wang3, Gwang-jun Kim4,*, Fayez Alqahtani5, Amr Tolba6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6605-6622, 2023, DOI:10.32604/cmc.2023.031617

    Abstract The advanced integrated circuits have been widely used in various situations including the Internet of Things, wireless communication, etc. But its manufacturing process exists unreliability, so cryptographic chips must be rigorously tested. Due to scan testing provides high test coverage, it is applied to the testing of cryptographic integrated circuits. However, while providing good controllability and observability, it also provides attackers with a backdoor to steal keys. In the text, a novel protection scheme is put forward to resist scan-based attacks, in which we first use the responses generated by a strong physical unclonable function circuit to solidify fuse-antifuse structures… More >

Displaying 1-10 on page 1 of 23. Per Page