Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (49)
  • Open Access

    ARTICLE

    Enhanced Trust Based Access Control for Multi-Cloud Environment

    N. R. Rejin Paul1,*, D. Paul Raj2

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3079-3093, 2021, DOI:10.32604/cmc.2021.018993

    Abstract Security is an essential part of the cloud environment. For ensuring the security of the data being communicated to and from the cloud server, a significant parameter called trust was introduced. Trust-based security played a vital role in ensuring that the communication between cloud users and service providers remained unadulterated and authentic. In most cloud-based data distribution environments, emphasis is placed on accepting trusted client users’ requests, but the cloud servers’ integrity is seldom verified. This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address… More >

  • Open Access

    ARTICLE

    An Efficient Medium Access Control Mechanism for Flying Ad-hoc Networks

    Muhammad Asghar Khan1,*, Fazal Noor2, Insaf Ullah3, Sajjad ur Rehman4, Shibli Nisar5, Mohaira Ahmad5

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 47-63, 2021, DOI:10.32604/csse.2021.016430

    Abstract The Flying Ad-hoc Networks (FANETs) is characterized by the transition from a single large Unmanned Aerial Vehicle (UAV) to multiple small UAVs connected in an ad-hoc fashion. Since high mobility is the core feature of such networks, they are prone to route breaks within the links. The issue of connectivity loss can be coped with, to some extent, by making use of omnidirectional antennas. Such modification, however, curtails Quality-of-Service (QoS) requirements of networks in terms of bandwidth, media access delay, coverage and others. Alternately, directional antennas have advantages over omnidirectional antennas such as improved transmission… More >

  • Open Access

    ARTICLE

    Network Log-Based SSH Brute-Force Attack Detection Model

    Jeonghoon Park1, Jinsu Kim1, B. B. Gupta2, Namje Park1,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 887-901, 2021, DOI:10.32604/cmc.2021.015172

    Abstract The rapid advancement of IT technology has enabled the quick discovery, sharing and collection of quality information, but has also increased cyberattacks at a fast pace at the same time. There exists no means to block these cyberattacks completely, and all security policies need to consider the possibility of external attacks. Therefore, it is crucial to reduce external attacks through preventative measures. In general, since routers located in the upper part of a firewall can hardly be protected by security systems, they are exposed to numerous unblocked cyberattacks. Routers block unnecessary services and accept necessary… More >

  • Open Access

    ARTICLE

    Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications

    Alaa Omran Almagrabi1,*, A. K. Bashir2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3649-3667, 2021, DOI:10.32604/cmc.2021.015056

    Abstract The design of distributed ledger, Asymmetric Key Algorithm (AKA) blockchain systems, is prominent in administering security and access control in various real-time services and applications. The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services. However, the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness. It results in degrading security through unattended access control for limited-service users. In this article, a service-aware access control procedure (SACP) is introduced to address the afore-mentioned issue. The proposed SACP defines attended access control for all More >

  • Open Access

    ARTICLE

    Blockchain-Enabled EHR Framework for Internet of Medical Things

    Lewis Nkenyereye1,*, S. M. Riazul Islam2, Mahmud Hossain3, M. Abdullah-Al-Wadud4, Atif Alamri4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 211-221, 2021, DOI:10.32604/cmc.2021.013796

    Abstract The Internet of Medical Things (IoMT) offers an infrastructure made of smart medical equipment and software applications for healthcare services. Through the internet, the IoMT is capable of providing remote medical diagnosis and timely health services. The patients can use their smart devices to create, store and share their electronic health records (EHR) with a variety of medical personnel including medical doctors and nurses. However, unless the underlying commination within IoMT is secured, malicious users can intercept, modify and even delete the sensitive EHR data of patients. Patients also lose full control of their EHR… More >

  • Open Access

    ARTICLE

    Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption

    Tao Feng1,*, Hongmei Pei1, Rong Ma1, Youliang Tian2, Xiaoqin Feng3

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 871-890, 2021, DOI:10.32604/cmc.2020.012146

    Abstract Data privacy is important to the security of our society, and enabling authorized users to query this data efficiently is facing more challenge. Recently, blockchain has gained extensive attention with its prominent characteristics as public, distributed, decentration and chronological characteristics. However, the transaction information on the blockchain is open to all nodes, the transaction information update operation is even more transparent. And the leakage of transaction information will cause huge losses to the transaction party. In response to these problems, this paper combines hierarchical attribute encryption with linear secret sharing, and proposes a blockchain data… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain

    Lejun Zhang1,2,*, Minghui Peng1, Weizheng Wang3 , Yansen Su4, Shuna Cui5,6, Seokhoon Kim7

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 499-515, 2021, DOI:10.32604/cmc.2020.012205

    Abstract In the digital era, electronic medical record (EMR) has been a major way for hospitals to store patients’ medical data. The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing. The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput. To address these issues, we propose a secure and efficient medical data storage and sharing scheme based on double blockchain. In our scheme, we encrypt the original EMR and store it in the cloud. The storage blockchain… More >

  • Open Access

    ARTICLE

    A Pursuit of Sustainable Privacy Protection in Big Data Environment by an Optimized Clustered-Purpose Based Algorithm

    Norjihan Binti Abdul Ghani1, Muneer Ahmad1, Zahra Mahmoud1, Raja Majid Mehmood2,*

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1217-1231, 2020, DOI:10.32604/iasc.2020.011731

    Abstract Achievement of sustainable privacy preservation is mostly very challenging in a resource shared computer environment. This challenge demands a dedicated focus on the exponential growth of big data. Despite the existence of specific privacy preservation policies at the organizational level, still sustainable protection of a user’s data at various levels, i.e., data collection, utilization, reuse, and disclosure, etc. have not been implemented to its spirit. For every personal data being collected and used, organizations must ensure that they are complying with their defined obligations. We are proposing a new clustered-purpose based access control for users’… More >

  • Open Access

    ARTICLE

    Task-Attribute-Based Access Control Scheme for IoT via Blockchain

    Hao Chen1, Wunan Wan1, *, Jinyue Xia2, *, Shibin Zhang1, Jinquan Zhang1, Xizi Peng1, Xingjie Fan1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2441-2453, 2020, DOI:10.32604/cmc.2020.011824

    Abstract As a new form of network, the Internet of things (IoT) is becoming more widely used in people’s lives. In this paper, related theoretical research and practical applications of the IoT are explored. The security of the IoT has become a hot research topic. Access controls are methods that control reasonable allocations of data and resources and ensure the security of the IoT. However, most access control systems do not dynamically assign users’ rights. Additionally, with some access control systems, there is a risk of overstepping other user’s authority, and there may exist a central… More >

  • Open Access

    ARTICLE

    Authorized Attribute-Based Encryption Multi-Keywords Search with Policy Updating

    Muqadar Ali, Chungen Xu*, Abid Hussain

    Journal of New Media, Vol.2, No.1, pp. 31-43, 2020, DOI:10.32604/jnm.2020.09946

    Abstract Attribute-based encryption is cryptographic techniques that provide flexible data access control to encrypted data content in cloud storage. Each trusted authority needs proper management and distribution of secret keys to the user’s to only authorized user’s attributes. However existing schemes cannot be applied multiple authority that supports only a single keywords search compare to multi keywords search high computational burden or inefficient attribute’s revocation. In this paper, a ciphertext policy attribute-based encryption (CP-ABE) scheme has been proposed which focuses on multi-keyword search and attribute revocation by new policy updating feathers under multiple authorities and central More >

Displaying 31-40 on page 4 of 49. Per Page