Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    Research and Implementation of Credit Investigation Sharing Platform Based on Double Blockchain

    Yanyan Han1,2, Wanqi Wei2,*, Kaili Dou3, Peng Li2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5193-5211, 2023, DOI:10.32604/cmc.2023.037756

    Abstract As the development of the modern economy is increasingly inseparable from credit support, the traditional credit investigation mode has yet to meet this demand. Because of the difficulties in conventional credit data sharing among credit investigation agencies, poor data portability, and centralized supervision, this paper proposes a data-sharing scheme for credit investigation agencies based on a double blockchain. Given the problems such as difficult data sharing, difficult recovery of damaged data, and accessible data leakage between institutions and users with non-traditional credit investigation data other than credit, this paper proposes a data-sharing scheme for credit investigation subjects based on the… More >

  • Open Access

    ARTICLE

    Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing

    Yonghao Zhang1,3, Yongtang Wu2, Tao Li1, Hui Zhou1,3, Yuling Chen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 345-361, 2023, DOI:10.32604/cmes.2023.026920

    Abstract The data in Mobile Edge Computing (MEC) contains tremendous market value, and data sharing can maximize the usefulness of the data. However, certain data is quite sensitive, and sharing it directly may violate privacy. Vertical Federated Learning (VFL) is a secure distributed machine learning framework that completes joint model training by passing encrypted model parameters rather than raw data, so there is no data privacy leakage during the training process. Therefore, the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy. Typically, the VFL requires a third party for key distribution… More >

  • Open Access

    ARTICLE

    BC-PC-Share: Blockchain-Based Patient-Centric Data Sharing Scheme for PHRs in Cloud Computing

    Caihui Lan1, Haifeng Li2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2985-3010, 2023, DOI:10.32604/cmes.2023.026321

    Abstract Sharing of personal health records (PHR) in cloud computing is an essential functionality in the healthcare system. However, how to securely, efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed. For instance, since the trust domain of the cloud server is not identical to the data owner or data user, the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource, to pursue maximum economic… More >

  • Open Access

    ARTICLE

    Research on Federated Learning Data Sharing Scheme Based on Differential Privacy

    Lihong Guo*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5069-5085, 2023, DOI:10.32604/cmc.2023.034571

    Abstract To realize data sharing, and to fully use the data value, breaking the data island between institutions to realize data collaboration has become a new sharing mode. This paper proposed a distributed data security sharing scheme based on C/S communication mode, and constructed a federated learning architecture that uses differential privacy technology to protect training parameters. Clients do not need to share local data, and they only need to upload the trained model parameters to achieve data sharing. In the process of training, a distributed parameter update mechanism is introduced. The server is mainly responsible for issuing training commands and… More >

  • Open Access

    ARTICLE

    Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology

    D. Doreen Hephzibah Miriam1, Deepak Dahiya2, Nitin3, C. R. Rene Robin4,*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1889-1906, 2023, DOI:10.32604/iasc.2023.028850

    Abstract Blockchain technology is critical in cyber security. The most recent cryptographic strategies may be hacked as efforts are made to build massive electronic circuits. Because of the ethical and legal implications of a patient’s medical data, cyber security is a critical and challenging problem in healthcare. The image secrecy is highly vulnerable to various types of attacks. As a result, designing a cyber security model for healthcare applications necessitates extra caution in terms of data protection. To resolve this issue, this paper proposes a Lionized Golden Eagle based Homomorphic Elapid Security (LGE-HES) algorithm for the cybersecurity of blockchain in healthcare… More >

  • Open Access

    ARTICLE

    Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments

    Saraswathi Shunmuganathan1,*, Sridharan Kannan2, T. V. Madhusudhana Rao3, K. Ambika4, T. Jayasankar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 785-801, 2022, DOI:10.32604/csse.2022.022424

    Abstract The Cloud Computing Environment (CCE) developed for using the dynamic cloud is the ability of software and services likely to grow with any business. It has transformed the methodology for storing the enterprise data, accessing the data, and Data Sharing (DS). Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data. With the requirement of vast volumes of storage area in the CCEs, capturing a secured data access framework is an important issue. This paper proposes an Improved Secure Identification-based Multilevel Structure of… More >

  • Open Access

    ARTICLE

    Security Data Sharing of Shipbuilding Information Based on Blockchain

    Jun Zhu1,*, Chaosong Yan2, Yinglong Ouyang3, Yao Chen4, Xiaowan Wang5

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1747-1756, 2022, DOI:10.32604/iasc.2022.026934

    Abstract The shipbuilding industry has problems such as long transaction cycles, many participating suppliers, and data sensitivity. A time-dimensional shipbuilding information security sharing scheme based on an alliance chain is proposed to solve this problem. The blockchain can better deliver value and protect user privacy, the blockchain can directly complete the instant transfer of value through smart contracts and tokens on the blockchain. We divide the program into three parts: data preprocessing, data storage, and data sharing. For data sensitivity, data confidentiality and reliability are handled separately. Aiming at the problem of user privacy leakage in data storage, a privacy-protecting blockchain… More >

  • Open Access

    ARTICLE

    Building a Trust Model for Secure Data Sharing (TM-SDS) in Edge Computing Using HMAC Techniques

    K. Karthikeyan*, P. Madhavan

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4183-4197, 2022, DOI:10.32604/cmc.2022.019802

    Abstract With the rapid growth of Internet of Things (IoT) based models, and the lack amount of data makes cloud computing resources insufficient. Hence, edge computing-based techniques are becoming more popular in present research domains that makes data storage, and processing effective at the network edges. There are several advanced features like parallel processing and data perception are available in edge computing. Still, there are some challenges in providing privacy and data security over networks. To solve the security issues in Edge Computing, Hash-based Message Authentication Code (HMAC) algorithm is used to provide solutions for preserving data from various attacks that… More >

  • Open Access

    ARTICLE

    Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

    V. Rajkumar1,*, M. Prakash2, V. Vennila3

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 779-793, 2022, DOI:10.32604/csse.2022.019622

    Abstract Cloud storage is an incipient technology in today’s world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components such as AVK Scheme (Access List, Verifier and Key Generator). It is challenging for every user to prove their identity to the… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain

    Lejun Zhang1,2,*, Minghui Peng1, Weizheng Wang3 , Yansen Su4, Shuna Cui5,6, Seokhoon Kim7

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 499-515, 2021, DOI:10.32604/cmc.2020.012205

    Abstract In the digital era, electronic medical record (EMR) has been a major way for hospitals to store patients’ medical data. The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing. The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput. To address these issues, we propose a secure and efficient medical data storage and sharing scheme based on double blockchain. In our scheme, we encrypt the original EMR and store it in the cloud. The storage blockchain stores the index of the… More >

Displaying 1-10 on page 1 of 12. Per Page