Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (39)
  • Open Access

    ARTICLE

    Blockchain-Based Key Management Scheme Using Rational Secret Sharing

    Xingfan Zhao1, Changgen Peng1,2,*, Weijie Tan2, Kun Niu1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 307-328, 2024, DOI:10.32604/cmc.2024.047975

    Abstract Traditional blockchain key management schemes store private keys in the same location, which can easily lead to security issues such as a single point of failure. Therefore, decentralized threshold key management schemes have become a research focus for blockchain private key protection. The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security. The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress, but these schemes do not consider participants’ self-interested behavior, and require trusted nodes to keep private key fragments, resulting in a narrow… More >

  • Open Access

    ARTICLE

    Computing Resource Allocation for Blockchain-Based Mobile Edge Computing

    Wanbo Zhang1, Yuqi Fan1, Jun Zhang1, Xu Ding2,*, Jung Yoon Kim3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 863-885, 2024, DOI:10.32604/cmes.2024.047295

    Abstract Users and edge servers are not fully mutually trusted in mobile edge computing (MEC), and hence blockchain can be introduced to provide trustable MEC. In blockchain-based MEC, each edge server functions as a node in both MEC and blockchain, processing users’ tasks and then uploading the task related information to the blockchain. That is, each edge server runs both users’ offloaded tasks and blockchain tasks simultaneously. Note that there is a trade-off between the resource allocation for MEC and blockchain tasks. Therefore, the allocation of the resources of edge servers to the blockchain and the MEC is crucial for the… More >

  • Open Access

    ARTICLE

    Securing Mobile Cloud-Based Electronic Health Records: A Blockchain-Powered Cryptographic Solution with Enhanced Privacy and Efficiency

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Journal of Intelligent Medicine and Healthcare, Vol.2, pp. 15-34, 2024, DOI:10.32604/jimh.2024.048784

    Abstract The convergence of handheld devices and cloud-based computing has transformed how Electronic Health Records (EHRs) are stored in mobile cloud paradigms, offering benefits such as affordability, adaptability, and portability. However, it also introduces challenges regarding network security and data confidentiality, as it aims to exchange EHRs among mobile users while maintaining high levels of security. This study proposes an innovative blockchain-based solution to these issues and presents secure cloud storage for healthcare data. To provide enhanced cryptography, the proposed method combines an enhanced Blowfish encryption method with a new key generation technique called Elephant Herding Optimization with Resistance-Based Training (EHO-RBT).… More >

  • Open Access

    ARTICLE

    Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System

    Yanzhong Sun1, Xiaoni Du1,*, Shufen Niu2, Xiaodong Yang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3287-3310, 2024, DOI:10.32604/cmes.2023.043589

    Abstract Traditional email systems can only achieve one-way communication, which means only the receiver is allowed to search for emails on the email server. In this paper, we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption (CL-BSE) by combining the storage function of cloud server with the communication function of email server. In the new model, not only can the data receiver search for the relevant content by generating its own trapdoor, but the data owner also can retrieve the content in the same way. Meanwhile, there are dual… More >

  • Open Access

    REVIEW

    A Survey on Blockchain-Based Federated Learning: Categorization, Application and Analysis

    Yuming Tang1,#, Yitian Zhang2,#, Tao Niu1, Zhen Li2,3,*, Zijian Zhang1,3, Huaping Chen4, Long Zhang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2451-2477, 2024, DOI:10.32604/cmes.2024.030084

    Abstract Federated Learning (FL), as an emergent paradigm in privacy-preserving machine learning, has garnered significant interest from scholars and engineers across both academic and industrial spheres. Despite its innovative approach to model training across distributed networks, FL has its vulnerabilities; the centralized server-client architecture introduces risks of single-point failures. Moreover, the integrity of the global model—a cornerstone of FL—is susceptible to compromise through poisoning attacks by malicious actors. Such attacks and the potential for privacy leakage via inference starkly undermine FL’s foundational privacy and security goals. For these reasons, some participants unwilling use their private data to train a model, which… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things

    Hongliang Tian, Junyuan Tian*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1297-1310, 2024, DOI:10.32604/cmc.2024.047058

    Abstract The Internet of Things (IoT) access control mechanism may encounter security issues such as single point of failure and data tampering. To address these issues, a blockchain-based IoT reputation value attribute access control scheme is proposed. Firstly, writing the reputation value as an attribute into the access control policy, and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control; Secondly, storing a large amount of resources from the Internet of Things in Inter Planetary File System (IPFS) to improve system throughput; Finally, map resource access… More >

  • Open Access

    ARTICLE

    Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform

    Xiangmin Guo1,2, Guangjun Liang1,2,*, Jiayin Liu1,2, Xianyi Chen3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3305-3323, 2023, DOI:10.32604/cmc.2023.044529

    Abstract Cloud storage is widely used by large companies to store vast amounts of data and files, offering flexibility, financial savings, and security. However, information shoplifting poses significant threats, potentially leading to poor performance and privacy breaches. Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms, ensuring businesses can focus on business development. To ensure data security in cloud platforms, this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing (HD2C) model. However, the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of Things (IoT) in the cloud.… More >

  • Open Access

    ARTICLE

    EduASAC: A Blockchain-Based Education Archive Sharing and Access Control System

    Ronglei Hu1, Chuce He1, Yaping Chi2, Xiaoyi Duan1, Xiaohong Fan1, Ping Xu1, Wenbin Gao1,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3387-3422, 2023, DOI:10.32604/cmc.2023.042000

    Abstract In the education archive sharing system, when performing homomorphic ciphertext retrieval on the storage server, there are problems such as low security of shared data, confusing parameter management, and weak access control. This paper proposes an Education Archives Sharing and Access Control (EduASAC) system to solve these problems. The system research goal is to realize the sharing of security parameters, the execution of access control, and the recording of system behaviors based on the blockchain network, ensuring the legitimacy of shared membership and the security of education archives. At the same time, the system can be combined with most homomorphic… More >

  • Open Access

    ARTICLE

    BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks

    Fengting Luo, Ruwei Huang*, Yuyue Chen

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1815-1835, 2023, DOI:10.32604/cmc.2023.041676

    Abstract Smart parks serve as integral components of smart cities, where they play a pivotal role in the process of urban modernization. The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase. To ensure secure communication, device identities must undergo authentication. The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices, making it impractical for resource-constrained devices. This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks, which simplifies the authentication interaction and requires every device to maintain only one certificate. To… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Game Approach to Multi-Microgrid Energy Dispatch

    Zhikang Wang#, Chengxuan Wang#, Wendi Wu, Cheng Sun, Zhengtian Wu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 845-863, 2024, DOI:10.32604/cmes.2023.029442

    Abstract As the current global environment is deteriorating, distributed renewable energy is gradually becoming an important member of the energy internet. Blockchain, as a decentralized distributed ledger with decentralization, traceability and tamper-proof features, is an important way to achieve efficient consumption and multi-party supply of new energy. In this article, we establish a blockchain-based mathematical model of multiple microgrids and microgrid aggregators’ revenue, consider the degree of microgrid users’ preference for electricity thus increasing users’ reliance on the blockchain market, and apply the one-master-multiple-slave Stackelberg game theory to solve the energy dispatching strategy when each market entity pursues the maximum revenue.… More >

Displaying 1-10 on page 1 of 39. Per Page