Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (298)
  • Open Access

    ARTICLE

    Excellent Practical Byzantine Fault Tolerance

    Huanrong Tang, Yaojing Sun, Jianquan Ouyang*

    Journal of Cyber Security, Vol.2, No.4, pp. 167-182, 2020, DOI:10.32604/jcs.2020.011341

    Abstract With the rapid development of blockchain technology, more and more people are paying attention to the consensus mechanism of blockchain. Practical Byzantine Fault Tolerance (PBFT), as the first efficient consensus algorithm solving the Byzantine Generals Problem, plays an important role. But PBFT also has its problems. First, it runs in a completely closed environment, and any node can't join or exit without rebooting the system. Second, the communication complexity in the network is as high as O(n2), which makes the algorithm only applicable to small-scale networks. For these problems, this paper proposes an Optimized consensus algorithm, Excellent Practical Byzantine Fault… More >

  • Open Access

    ARTICLE

    Real Estate Management via a Decentralized Blockchain Platform

    Iftikhar Ahmad1,*, Mohammed A. Alqarni2, Abdulwahab Ali Almazroi3, Laiba Alam1

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1813-1822, 2021, DOI:10.32604/cmc.2020.013048

    Abstract Blockchain technology is one of the key technological breakthroughs of the last decade. It has the ability to revolutionize numerous aspects of society, including financial systems, healthcare, e-government and many others. One such area that is able to reap the benefits of blockchain technology is the real estate industry. Like many other industries, real estate faces major administrative problems such as high transaction fees, a lack of transparency, fraud and the effects of a middleman including undue influence and commissions. Blockchain enables supporting technologies to overcome the obstacles inherent within the real estate investment market. These technologies include smart contracts,… More >

  • Open Access

    ARTICLE

    Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption

    Tao Feng1,*, Hongmei Pei1, Rong Ma1, Youliang Tian2, Xiaoqin Feng3

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 871-890, 2021, DOI:10.32604/cmc.2020.012146

    Abstract Data privacy is important to the security of our society, and enabling authorized users to query this data efficiently is facing more challenge. Recently, blockchain has gained extensive attention with its prominent characteristics as public, distributed, decentration and chronological characteristics. However, the transaction information on the blockchain is open to all nodes, the transaction information update operation is even more transparent. And the leakage of transaction information will cause huge losses to the transaction party. In response to these problems, this paper combines hierarchical attribute encryption with linear secret sharing, and proposes a blockchain data privacy protection control scheme based… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain

    Lejun Zhang1,2,*, Minghui Peng1, Weizheng Wang3 , Yansen Su4, Shuna Cui5,6, Seokhoon Kim7

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 499-515, 2021, DOI:10.32604/cmc.2020.012205

    Abstract In the digital era, electronic medical record (EMR) has been a major way for hospitals to store patients’ medical data. The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing. The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput. To address these issues, we propose a secure and efficient medical data storage and sharing scheme based on double blockchain. In our scheme, we encrypt the original EMR and store it in the cloud. The storage blockchain stores the index of the… More >

  • Open Access

    ARTICLE

    Task-Attribute-Based Access Control Scheme for IoT via Blockchain

    Hao Chen1, Wunan Wan1, *, Jinyue Xia2, *, Shibin Zhang1, Jinquan Zhang1, Xizi Peng1, Xingjie Fan1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2441-2453, 2020, DOI:10.32604/cmc.2020.011824

    Abstract As a new form of network, the Internet of things (IoT) is becoming more widely used in people’s lives. In this paper, related theoretical research and practical applications of the IoT are explored. The security of the IoT has become a hot research topic. Access controls are methods that control reasonable allocations of data and resources and ensure the security of the IoT. However, most access control systems do not dynamically assign users’ rights. Additionally, with some access control systems, there is a risk of overstepping other user’s authority, and there may exist a central authority that is a single… More >

  • Open Access

    ARTICLE

    Data Secure Storage Mechanism of Sensor Networks Based on Blockchain

    Jin Wang1, 2, Wencheng Chen1, Lei Wang3, *, R. Simon Sherratt4, Osama Alfarraj5, Amr Tolba5, 6

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2365-2384, 2020, DOI:10.32604/cmc.2020.011567

    Abstract As the number of sensor network application scenarios continues to grow, the security problems inherent in this approach have become obstacles that hinder its wide application. However, it has attracted increasing attention from industry and academia. The blockchain is based on a distributed network and has the characteristics of nontampering and traceability of block data. It is thus naturally able to solve the security problems of the sensor networks. Accordingly, this paper first analyzes the security risks associated with data storage in the sensor networks, then proposes using blockchain technology to ensure that data storage in the sensor networks is… More >

  • Open Access

    ARTICLE

    Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain

    Jieren Cheng1, Jun Li2, *, Naixue Xiong3, Meizhu Chen2, Hao Guo2, Xinzhi Yao2

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2247-2262, 2020, DOI:10.32604/cmc.2020.011668

    Abstract Nowadays, as lightweight mobile clients become more powerful and widely used, more and more information is stored on lightweight mobile clients, user sensitive data privacy protection has become an urgent concern and problem to be solved. There has been a corresponding rise of security solutions proposed by researchers, however, the current security mechanisms on lightweight mobile clients are proven to be fragile. Due to the fact that this research field is immature and still unexplored in-depth, with this paper, we aim to provide a structured and comprehensive study on privacy protection using trusted execution environment (TEE) for lightweight mobile clients.… More >

  • Open Access

    ARTICLE

    A Digital Start-up Project – CARM Tool as an Innovative Approach to Digital Government Transformation

    S. Green

    Computer Systems Science and Engineering, Vol.35, No.4, pp. 257-269, 2020, DOI:10.32604/csse.2020.35.257

    Abstract The digital revolution impacts modern workplaces through constant advances in technology. This study uses a digital start-up project experience to demonstrate how a Digital Government Transformation can be beneficial. The increase of administrative requirements, compliance, and capability readiness has prompted the development of the Digital start–up project known as the CARM Tool (Compliance, Assurance and Risk Management). CARM introduces a low risk low cost and high productivity solution, which can directly and immediately benefit stakeholders in a large complex government enterprise. It aims to elevate staff performance, customer service and provide qualification between financial statements, asset management and alignment with… More >

  • Open Access

    ARTICLE

    Secure Provenance of Electronic Records Based on Blockchain

    Qirun Wang1, Fujian Zhu2, Sai Ji2, Yongjun Ren2, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1753-1769, 2020, DOI:10.32604/cmc.2020.07366

    Abstract At present, the provenance of electronic records is stored centrally. The centralized way of information storage has huge risks. Whether the database itself is destroyed or the communication between the central database and the external interruption occurs, the provenance information of the stored electronic records will not play its role. At the same time, uncertainties such as fires and earthquakes will also pose a potential threat to centralized databases. Moreover, the existing security provenance model is not specifically designed for electronic records. In this paper, a security provenance model of electronic records is constructed based on PREMIS and METS. Firstly,… More >

  • Open Access

    ARTICLE

    Blockzone: A Decentralized and Trustworthy Data Plane for DNS

    Ning Hu1, Shi Yin1, Shen Su1, *, Xudong Jia1, Qiao Xiang2, Hao Liu3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1531-1557, 2020, DOI:10.32604/cmc.2020.010949

    Abstract The domain name system (DNS) provides a mapping service between memorable names and numerical internet protocol addresses, and it is a critical infrastructure of the Internet. The authenticity of DNS resolution results is crucial for ensuring the accessibility of Internet services. Hundreds of supplementary specifications of protocols have been proposed to compensate for the security flaws of DNS. However, DNS security incidents still occur frequently. Although DNS is a distributed system, for a specified domain name, only authorized authoritative servers can resolve it. Other servers must obtain the resolution result through a recursive or iterative resolving procedure, which renders DNS… More >

Displaying 271-280 on page 28 of 298. Per Page