Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    VKFQ: A Verifiable Keyword Frequency Query Framework with Local Differential Privacy in Blockchain

    Youlin Ji, Bo Yin*, Ke Gu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4205-4223, 2024, DOI:10.32604/cmc.2024.049086

    Abstract With its untameable and traceable properties, blockchain technology has been widely used in the field of data sharing. How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing. In this paper, we study verifiable keyword frequency (KF) queries with local differential privacy in blockchain. Both the numerical and the keyword attributes are present in data objects; the latter are sensitive and require privacy protection. However, prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries. We propose an efficient framework that… More >

  • Open Access

    ARTICLE

    Robust and Trustworthy Data Sharing Framework Leveraging On-Chain and Off-Chain Collaboration

    Jinyang Yu1,2, Xiao Zhang1,2,3,*, Jinjiang Wang1,2, Yuchen Zhang1,2, Yulong Shi1,2, Linxuan Su1,2, Leijie Zeng1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2159-2179, 2024, DOI:10.32604/cmc.2024.047340

    Abstract The proliferation of Internet of Things (IoT) systems has resulted in the generation of substantial data, presenting new challenges in reliable storage and trustworthy sharing. Conventional distributed storage systems are hindered by centralized management and lack traceability, while blockchain systems are limited by low capacity and high latency. To address these challenges, the present study investigates the reliable storage and trustworthy sharing of IoT data, and presents a novel system architecture that integrates on-chain and off-chain data manage systems. This architecture, integrating blockchain and distributed storage technologies, provides high-capacity, high-performance, traceable, and verifiable data storage and access. The on-chain system,… More >

  • Open Access

    ARTICLE

    A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain

    Yurong Luo, Wei You*, Chao Shang, Xiongpeng Ren, Jin Cao, Hui Li

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2237-2260, 2024, DOI:10.32604/cmes.2023.045679

    Abstract The dynamic landscape of the Internet of Things (IoT) is set to revolutionize the pace of interaction among entities, ushering in a proliferation of applications characterized by heightened quality and diversity. Among the pivotal applications within the realm of IoT, as a significant example, the Smart Grid (SG) evolves into intricate networks of energy deployment marked by data integration. This evolution concurrently entails data interchange with other IoT entities. However, there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem. In this paper, we introduce a hierarchical secure data-sharing platform empowered… More >

  • Open Access

    ARTICLE

    Research on the Electric Energy Metering Data Sharing Method in Smart Grid Based on Blockchain

    Shaocheng Wu1, Honghao Liang1, Xiaowei Chen1, Tao Liu1, Junpeng Ru2,3, Qianhong Gong2,3, Jin Li2,3,*

    Journal on Big Data, Vol.5, pp. 57-67, 2023, DOI:10.32604/jbd.2023.044257

    Abstract Enabling data sharing among smart grid power suppliers is a pressing challenge due to technical hurdles in verifying, storing, and synchronizing energy metering data. Access and sharing limitations are stringent for users, power companies, and researchers, demanding significant resources and time for permissions and verification. This paper proposes a blockchain-based architecture for secure and efficient sharing of electric energy metering data. Further, we propose a data sharing model based on evolutionary game theory. Based on the Lyapunov stability theory, the model’s evolutionary stable strategy (ESS) is analyzed. Numerical results verify the correctness and practicability of the scheme proposed in this… More >

  • Open Access

    ARTICLE

    Medi-Block Record Secure Data Sharing in Healthcare System: Issues, Solutions and Challenges

    Zuriati Ahmad Zukarnain1,*, Amgad Muneer2,3, Nur Atirah Mohamad Nassir1, Akram A. Almohammedi4,5

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2725-2740, 2023, DOI:10.32604/csse.2023.034448

    Abstract With the advancements in the era of artificial intelligence, blockchain, cloud computing, and big data, there is a need for secure, decentralized medical record storage and retrieval systems. While cloud storage solves storage issues, it is challenging to realize secure sharing of records over the network. Medi-block record in the healthcare system has brought a new digitalization method for patients’ medical records. This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital. It enables electronic medical records to be available with the correct authentication and restricts… More >

  • Open Access

    ARTICLE

    Research and Implementation of Credit Investigation Sharing Platform Based on Double Blockchain

    Yanyan Han1,2, Wanqi Wei2,*, Kaili Dou3, Peng Li2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5193-5211, 2023, DOI:10.32604/cmc.2023.037756

    Abstract As the development of the modern economy is increasingly inseparable from credit support, the traditional credit investigation mode has yet to meet this demand. Because of the difficulties in conventional credit data sharing among credit investigation agencies, poor data portability, and centralized supervision, this paper proposes a data-sharing scheme for credit investigation agencies based on a double blockchain. Given the problems such as difficult data sharing, difficult recovery of damaged data, and accessible data leakage between institutions and users with non-traditional credit investigation data other than credit, this paper proposes a data-sharing scheme for credit investigation subjects based on the… More >

  • Open Access

    ARTICLE

    Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing

    Yonghao Zhang1,3, Yongtang Wu2, Tao Li1, Hui Zhou1,3, Yuling Chen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 345-361, 2023, DOI:10.32604/cmes.2023.026920

    Abstract The data in Mobile Edge Computing (MEC) contains tremendous market value, and data sharing can maximize the usefulness of the data. However, certain data is quite sensitive, and sharing it directly may violate privacy. Vertical Federated Learning (VFL) is a secure distributed machine learning framework that completes joint model training by passing encrypted model parameters rather than raw data, so there is no data privacy leakage during the training process. Therefore, the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy. Typically, the VFL requires a third party for key distribution… More >

  • Open Access

    ARTICLE

    BC-PC-Share: Blockchain-Based Patient-Centric Data Sharing Scheme for PHRs in Cloud Computing

    Caihui Lan1, Haifeng Li2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2985-3010, 2023, DOI:10.32604/cmes.2023.026321

    Abstract Sharing of personal health records (PHR) in cloud computing is an essential functionality in the healthcare system. However, how to securely, efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed. For instance, since the trust domain of the cloud server is not identical to the data owner or data user, the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource, to pursue maximum economic… More >

  • Open Access

    ARTICLE

    Research on Federated Learning Data Sharing Scheme Based on Differential Privacy

    Lihong Guo*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5069-5085, 2023, DOI:10.32604/cmc.2023.034571

    Abstract To realize data sharing, and to fully use the data value, breaking the data island between institutions to realize data collaboration has become a new sharing mode. This paper proposed a distributed data security sharing scheme based on C/S communication mode, and constructed a federated learning architecture that uses differential privacy technology to protect training parameters. Clients do not need to share local data, and they only need to upload the trained model parameters to achieve data sharing. In the process of training, a distributed parameter update mechanism is introduced. The server is mainly responsible for issuing training commands and… More >

  • Open Access

    ARTICLE

    Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology

    D. Doreen Hephzibah Miriam1, Deepak Dahiya2, Nitin3, C. R. Rene Robin4,*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1889-1906, 2023, DOI:10.32604/iasc.2023.028850

    Abstract Blockchain technology is critical in cyber security. The most recent cryptographic strategies may be hacked as efforts are made to build massive electronic circuits. Because of the ethical and legal implications of a patient’s medical data, cyber security is a critical and challenging problem in healthcare. The image secrecy is highly vulnerable to various types of attacks. As a result, designing a cyber security model for healthcare applications necessitates extra caution in terms of data protection. To resolve this issue, this paper proposes a Lionized Golden Eagle based Homomorphic Elapid Security (LGE-HES) algorithm for the cybersecurity of blockchain in healthcare… More >

Displaying 1-10 on page 1 of 17. Per Page