Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (237)
  • Open Access

    ARTICLE

    Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications

    Romaissa Kebache1, Abdelkader Laouid1,*, Ahcene Bounceur2, Mostefa Kara1,3, Konstantinos Karampidis4, Giorgos Papadourakis4, Mohammad Hammoudeh2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1055-1072, 2024, DOI:10.32604/csse.2024.048738

    Abstract Internet cloud services come at a price, especially when they provide top-tier security measures. The cost incurred by cloud utilization is directly proportional to the storage requirements. Companies are always looking to increase profits and reduce costs while preserving the security of their data by encrypting them. One of the offered solutions is to find an efficient encryption method that can store data in a much smaller space than traditional encryption techniques. This article introduces a novel encryption approach centered on consolidating information into a single ciphertext by implementing Multi-Key Embedded Encryption (MKEE). The effectiveness… More >

  • Open Access

    ARTICLE

    Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications

    Li-Woei Chen1, Kun-Lin Tsai2,*, Fang-Yie Leu3, Wen-Cheng Jiang2, Shih-Ting Tseng2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2779-2794, 2024, DOI:10.32604/cmes.2024.052124

    Abstract Various mobile devices and applications are now used in daily life. These devices require high-speed data processing, low energy consumption, low communication latency, and secure data transmission, especially in 5G and 6G mobile networks. High-security cryptography guarantees that essential data can be transmitted securely; however, it increases energy consumption and reduces data processing speed. Therefore, this study proposes a low-energy data encryption (LEDE) algorithm based on the Advanced Encryption Standard (AES) for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things (IoT) devices. In the proposed LEDE algorithm, the system time More >

  • Open Access

    ARTICLE

    Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things

    Jingjing Nie1,*, Zhenhua Chen2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4763-4779, 2024, DOI:10.32604/cmc.2024.051181

    Abstract The Internet of Medical Things (IoMT) is an application of the Internet of Things (IoT) in the medical field. It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems, which is essential in smart healthcare. However, Personal Health Records (PHRs) are normally kept in public cloud servers controlled by IoMT service providers, so privacy and security incidents may be frequent. Fortunately, Searchable Encryption (SE), which can be used to execute queries on encrypted data, can address the issue above. Nevertheless, most existing SE schemes cannot solve the vector dominance threshold… More >

  • Open Access

    ARTICLE

    Chaotic CS Encryption: An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing

    Mingliang Sun, Jie Yuan*, Xiaoyong Li, Dongxiao Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2625-2646, 2024, DOI:10.32604/cmc.2024.050337

    Abstract Images are the most important carrier of human information. Moreover, how to safely transmit digital images through public channels has become an urgent problem. In this paper, we propose a novel image encryption algorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiency of image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSE can fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks, such as differential attacks, and exhibit robustness. First, we use a sparse… More >

  • Open Access

    ARTICLE

    FL-EASGD: Federated Learning Privacy Security Method Based on Homomorphic Encryption

    Hao Sun*, Xiubo Chen, Kaiguo Yuan

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2361-2373, 2024, DOI:10.32604/cmc.2024.049159

    Abstract Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext data. However, there is still a potential risk of privacy leakage, for example, attackers can obtain the original data through model inference attacks. Therefore, safeguarding the privacy of model parameters becomes crucial. One proposed solution involves incorporating homomorphic encryption algorithms into the federated learning process. However, the existing federated learning privacy protection scheme based on homomorphic encryption will greatly reduce the efficiency and robustness when there are performance differences between parties or abnormal nodes. To solve the above… More >

  • Open Access

    ARTICLE

    Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol

    Umi Salma Basha1, Shashi Kant Gupta2, Wedad Alawad3, SeongKi Kim4,*, Salil Bharany5,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3397-3416, 2024, DOI:10.32604/cmc.2024.046265

    Abstract A new era of data access and management has begun with the use of cloud computing in the healthcare industry. Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a major concern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentiality and integrity of healthcare data in the cloud. The computational overhead of encryption technologies could lead to delays in data access and processing rates. To address these challenges, we introduced the Enhanced Parallel Multi-Key Encryption Algorithm (EPM-KEA), aiming to bolster… More >

  • Open Access

    ARTICLE

    Combo Packet: An Encryption Traffic Classification Method Based on Contextual Information

    Yuancong Chai, Yuefei Zhu*, Wei Lin, Ding Li

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1223-1243, 2024, DOI:10.32604/cmc.2024.049904

    Abstract With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has become a core key technology in network supervision. In recent years, many different solutions have emerged in this field. Most methods identify and classify traffic by extracting spatiotemporal characteristics of data flows or byte-level features of packets. However, due to changes in data transmission mediums, such as fiber optics and satellites, temporal features can exhibit significant variations due to changes in communication links and transmission quality. Additionally, partial spatial features can change due to reasons like data reordering and retransmission.… More >

  • Open Access

    ARTICLE

    Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble

    Amardeep Singh1, Hamad Ali Abosaq2, Saad Arif3, Zohaib Mushtaq4,*, Muhammad Irfan5, Ghulam Abbas6, Arshad Ali7, Alanoud Al Mazroa8

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 857-873, 2024, DOI:10.32604/cmc.2024.048036

    Abstract Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries, especially in light of the growing number of cybersecurity threats. A major and ever-present threat is Ransomware-as-a-Service (RaaS) assaults, which enable even individuals with minimal technical knowledge to conduct ransomware operations. This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models. For this purpose, the network intrusion detection dataset “UNSW-NB15” from the Intelligent Security Group of the University of New South Wales, Australia is analyzed. In the… More >

  • Open Access

    ARTICLE

    A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models

    Naglaa F. Soliman1, Fatma E. Fadl-Allah2, Walid El-Shafai3,4,*, Mahmoud I. Aly2, Maali Alabdulhafith1, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 201-241, 2024, DOI:10.32604/cmc.2024.046757

    Abstract The efficient transmission of images, which plays a large role in wireless communication systems, poses a significant challenge in the growth of multimedia technology. High-quality images require well-tuned communication standards. The Single Carrier Frequency Division Multiple Access (SC-FDMA) is adopted for broadband wireless communications, because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio (PAPR). Data transmission through open-channel networks requires much concentration on security, reliability, and integrity. The data need a space away from unauthorized access, modification, or deletion. These requirements are to be fulfilled by digital image watermarking and… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Federated Deep Learning Diagnostic Method for Multi-Stage Diseases

    Jinbo Yang1, Hai Huang1, Lailai Yin2, Jiaxing Qu3, Wanjuan Xie4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3085-3099, 2024, DOI:10.32604/cmes.2023.045417

    Abstract Diagnosing multi-stage diseases typically requires doctors to consider multiple data sources, including clinical symptoms, physical signs, biochemical test results, imaging findings, pathological examination data, and even genetic data. When applying machine learning modeling to predict and diagnose multi-stage diseases, several challenges need to be addressed. Firstly, the model needs to handle multimodal data, as the data used by doctors for diagnosis includes image data, natural language data, and structured data. Secondly, privacy of patients’ data needs to be protected, as these data contain the most sensitive and private information. Lastly, considering the practicality of the… More >

Displaying 1-10 on page 1 of 237. Per Page