Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    REVIEW

    AI-Enabled Perspective for Scaling Consortium Blockchain

    Yingying Zhou, Wenlong Shen, Tianzhe Jiao, Chaopeng Guo, Jie Song*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.3, pp. 3087-3131, 2025, DOI:10.32604/cmes.2025.074378 - 23 December 2025

    Abstract As consortium blockchains scale and complexity grow, scalability presents a critical bottleneck hindering broader adoption. This paper meticulously extracted 150 primary references from IEEE Xplore, Web of Science, Google Scholar, and other reputable databases and websites, providing a comprehensive and structured overview of consortium blockchain scalability research. We propose a scalability framework that combines a four-layer architectural model with a four-dimensional cost model to analyze scalability trade-offs. Applying this framework, we conduct a comprehensive review of scaling approaches and reveal the inherent costs they introduce. Furthermore, we map the artificial intelligence (AI)-enabled methods to the More >

  • Open Access

    ARTICLE

    A Secure Storage and Verification Framework Based on Consortium Blockchain for Engineering Education Accreditation Data

    Yuling Luo1,2, Xiaoguang Lin1,2, Junxiu Liu1,2,*, Qiang Fu1,2, Sheng Qin1,2, Zhen Min1,2, Tinghua Hu1,2

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5323-5343, 2025, DOI:10.32604/cmc.2025.063860 - 19 May 2025

    Abstract The majors accredited by the Engineering Education Accreditation (EEA) reflect the accreditation agency’s recognition of the school’s engineering programs. Excellent accreditation management holds significant importance for the advancement of engineering education programs. However, the traditional engineering education system framework suffers from the opacity of raw education data and the difficulty for accreditation bodies to forensically examine the self-assessment reports. To solve these issues, an EEA framework based on Hyperledger Fabric blockchain technology is proposed in this work. Firstly, all relevant stakeholders and information interactions occur within the blockchain network, ensuring the authenticity of educational data More >

  • Open Access

    ARTICLE

    Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management

    Lizhe Zhang1,2,*, Yongqiang Huang2, Jia Nie2, Kenian Wang1,2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1467-1488, 2023, DOI:10.32604/cmc.2023.042305 - 29 November 2023

    Abstract System-wide information management (SWIM) is a complex distributed information transfer and sharing system for the next generation of Air Transportation System (ATS). In response to the growing volume of civil aviation air operations, users accessing different authentication domains in the SWIM system have problems with the validity, security, and privacy of SWIM-shared data. In order to solve these problems, this paper proposes a SWIM cross-domain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication. The scheme uses a consistent hash algorithm with virtual… More >

  • Open Access

    ARTICLE

    Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing

    Yonghao Zhang1,3, Yongtang Wu2, Tao Li1, Hui Zhou1,3, Yuling Chen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 345-361, 2023, DOI:10.32604/cmes.2023.026920 - 23 April 2023

    Abstract The data in Mobile Edge Computing (MEC) contains tremendous market value, and data sharing can maximize the usefulness of the data. However, certain data is quite sensitive, and sharing it directly may violate privacy. Vertical Federated Learning (VFL) is a secure distributed machine learning framework that completes joint model training by passing encrypted model parameters rather than raw data, so there is no data privacy leakage during the training process. Therefore, the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy. Typically, the VFL requires a… More >

  • Open Access

    ARTICLE

    Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems

    T. Haritha, A. Anitha*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3923-3939, 2023, DOI:10.32604/cmc.2023.036278 - 31 March 2023

    Abstract In crowded cities, searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’ time, increases air pollution, and traffic congestion. Smart parking systems facilitate the drivers to determine the information about the parking lot in real time and book them depending on the requirement. But the existing smart parking systems necessitate the drivers to reveal their sensitive information that includes their mobile number, personal identity, and desired destination. This disclosure of sensitive information makes the existing centralized smart parking systems more vulnerable to service providers’ security… More >

  • Open Access

    ARTICLE

    Secure Model of Medical Data Sharing for Complex Scenarios

    Wei She1, Yue Hu2, Zhao Tian1, Guoning Liu3, Bo Wang4, Wei Liu1, 2, *

    Journal of Cyber Security, Vol.1, No.1, pp. 11-17, 2019, DOI:10.32604/jcs.2019.05856

    Abstract In order to secure the massive heterogeneous medical data for the complex scenarios and improve the information sharing efficiency in healthcare system, a distributed medical data ledger model (DMDL) is proposed in this paper. This DMDL model has adopted the blockchain technology including the function decoupling, the distributed consensus, smart contract as well as multi-channel communication structure of consortium blockchain. The DMDL model not only has high adaptability, but also meets the requirements of the medical treatment processes which generally involve multi-entities, highly private information and secure transaction. The steps for processing the medical data More >

Displaying 1-10 on page 1 of 6. Per Page