Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (88)
  • Open Access

    ARTICLE

    A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information

    Hao Jiang1, Yuerong Liao1, Dongdong Zhao2, Wenjian Luo3, Xingyi Zhang1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1045-1075, 2024, DOI:10.32604/cmes.2024.048653

    Abstract Due to the presence of a large amount of personal sensitive information in social networks, privacy preservation issues in social networks have attracted the attention of many scholars. Inspired by the self-nonself discrimination paradigm in the biological immune system, the negative representation of information indicates features such as simplicity and efficiency, which is very suitable for preserving social network privacy. Therefore, we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks, called AttNetNRI. Specifically, a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the… More >

  • Open Access

    ARTICLE

    A Blockchain and CP-ABE Based Access Control Scheme with Fine-Grained Revocation of Attributes in Cloud Health

    Ye Lu1,*, Tao Feng1, Chunyan Liu2, Wenbo Zhang3

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2787-2811, 2024, DOI:10.32604/cmc.2023.046106

    Abstract The Access control scheme is an effective method to protect user data privacy. The access control scheme based on blockchain and ciphertext policy attribute encryption (CP–ABE) can solve the problems of single—point of failure and lack of trust in the centralized system. However, it also brings new problems to the health information in the cloud storage environment, such as attribute leakage, low consensus efficiency, complex permission updates, and so on. This paper proposes an access control scheme with fine-grained attribute revocation, keyword search, and traceability of the attribute private key distribution process. Blockchain technology tracks the authorization of attribute private… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things

    Hongliang Tian, Junyuan Tian*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1297-1310, 2024, DOI:10.32604/cmc.2024.047058

    Abstract The Internet of Things (IoT) access control mechanism may encounter security issues such as single point of failure and data tampering. To address these issues, a blockchain-based IoT reputation value attribute access control scheme is proposed. Firstly, writing the reputation value as an attribute into the access control policy, and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control; Secondly, storing a large amount of resources from the Internet of Things in Inter Planetary File System (IPFS) to improve system throughput; Finally, map resource access… More >

  • Open Access

    ARTICLE

    Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations

    Fang Xu1,2,3, Songhao Jiang1,2, Yi Ma1,2,3,*, Manzoor Ahmed1,3,*, Zenggang Xiong1,2,3, Yuanlin Lyu1,2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1095-1113, 2024, DOI:10.32604/cmc.2023.046577

    Abstract Effective data communication is a crucial aspect of the Social Internet of Things (SIoT) and continues to be a significant research focus. This paper proposes a data forwarding algorithm based on Multidimensional Social Relations (MSRR) in SIoT to solve this problem. The proposed algorithm separates message forwarding into intra- and cross-community forwarding by analyzing interest traits and social connections among nodes. Three new metrics are defined: the intensity of node social relationships, node activity, and community connectivity. Within the community, messages are sent by determining which node is most similar to the sender by weighing the strength of social connections… More >

  • Open Access

    ARTICLE

    Software Coupling and Cohesion Model for Measuring the Quality of Software Components

    Zakarya Abdullah Alzamil*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3139-3161, 2023, DOI:10.32604/cmc.2023.042711

    Abstract Measuring software quality requires software engineers to understand the system’s quality attributes and their measurements. The quality attribute is a qualitative property; however, the quantitative feature is needed for software measurement, which is not considered during the development of most software systems. Many research studies have investigated different approaches for measuring software quality, but with no practical approaches to quantify and measure quality attributes. This paper proposes a software quality measurement model, based on a software interconnection model, to measure the quality of software components and the overall quality of the software system. Unlike most of the existing approaches, the… More >

  • Open Access

    ARTICLE

    A Novel Incremental Attribute Reduction Algorithm Based on Intuitionistic Fuzzy Partition Distance

    Pham Viet Anh1,3, Nguyen Ngoc Thuy4, Nguyen Long Giang2, Pham Dinh Khanh5, Nguyen The Thuy1,6,*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2971-2988, 2023, DOI:10.32604/csse.2023.042068

    Abstract Attribute reduction, also known as feature selection, for decision information systems is one of the most pivotal issues in machine learning and data mining. Approaches based on the rough set theory and some extensions were proved to be efficient for dealing with the problem of attribute reduction. Unfortunately, the intuitionistic fuzzy sets based methods have not received much interest, while these methods are well-known as a very powerful approach to noisy decision tables, i.e., data tables with the low initial classification accuracy. Therefore, this paper provides a novel incremental attribute reduction method to deal more effectively with noisy decision tables,… More >

  • Open Access

    ARTICLE

    Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination

    Peng Liu1, Qian He1,*, Baokang Zhao2, Biao Guo1, Zhongyi Zhai1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3325-3343, 2023, DOI:10.32604/cmc.2023.041167

    Abstract Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT. However, data privacy is potentially risky when data is outsourced to cloud servers or edge services. While data encryption ensures data confidentiality, it can impede data sharing and retrieval. Attribute-based searchable encryption (ABSE) is proposed as an effective technique for enhancing data security and privacy. Nevertheless, ABSE has its limitations, such as single attribute authorization failure, privacy leakage during the search process, and high decryption overhead. This paper presents a novel approach called the blockchain-assisted efficient multi-authority attribute-based… More >

  • Open Access

    ARTICLE

    Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services

    Jinqiu Hou1, Changgen Peng1,*, Weijie Tan1,2, Hongfa Ding3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 917-938, 2024, DOI:10.32604/cmes.2023.027276

    Abstract Cloud-based services have powerful storage functions and can provide accurate computation. However, the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight. Although the attribute-based proxy re-encryption (ABPRE) schemes based on number theory can solve this problem, it is still difficult to resist quantum attacks and have limited expression capabilities. To address these issues, we present a novel linear secret sharing schemes (LSSS) matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research. Additionally, to detect the activities of illegal proxies, homomorphic signature (HS) technology is… More >

  • Open Access

    ARTICLE

    A Lightweight ABE Security Protection Scheme in Cloud Environment Based on Attribute Weight

    Lihong Guo*, Jie Yang, Haitao Wu

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1929-1946, 2023, DOI:10.32604/cmc.2023.039170

    Abstract Attribute-based encryption (ABE) is a technique used to encrypt data, it has the flexibility of access control, high security, and resistance to collusion attacks, and especially it is used in cloud security protection. However, a large number of bilinear mappings are used in ABE, and the calculation of bilinear pairing is time-consuming. So there is the problem of low efficiency. On the other hand, the decryption key is not uniquely associated with personal identification information, if the decryption key is maliciously sold, ABE is unable to achieve accountability for the user. In practical applications, shared message requires hierarchical sharing in… More >

  • Open Access

    ARTICLE

    Multi-Attribute Group Decision-Making Method under Spherical Fuzzy Bipolar Soft Expert Framework with Its Application

    Mohammed M. Ali Al-Shamiri1,2, Ghous Ali3,*, Muhammad Zain Ul Abidin3, Arooj Adeel3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1891-1936, 2023, DOI:10.32604/cmes.2023.027844

    Abstract Spherical fuzzy soft expert set (SFSES) theory blends the perks of spherical fuzzy sets and group decision-making into a unified approach. It allows solutions to highly complicated uncertainties and ambiguities under the unbiased supervision and group decision-making of multiple experts. However, SFSES theory has some deficiencies such as the inability to interpret and portray the bipolarity of decision-parameters. This work highlights and overcomes these limitations by introducing the novel spherical fuzzy bipolar soft expert sets (SFBSESs) as a powerful hybridization of spherical fuzzy set theory with bipolar soft expert sets (BSESs). Followed by the development of certain set-theoretic operations and… More > Graphic Abstract

    Multi-Attribute Group Decision-Making Method under Spherical Fuzzy Bipolar Soft Expert Framework with Its Application

Displaying 1-10 on page 1 of 88. Per Page