Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments

    Saraswathi Shunmuganathan1,*, Sridharan Kannan2, T. V. Madhusudhana Rao3, K. Ambika4, T. Jayasankar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 785-801, 2022, DOI:10.32604/csse.2022.022424

    Abstract The Cloud Computing Environment (CCE) developed for using the dynamic cloud is the ability of software and services likely to grow with any business. It has transformed the methodology for storing the enterprise data, accessing the data, and Data Sharing (DS). Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data. With the requirement of vast volumes of storage area in the CCEs, capturing a secured data access framework is an important issue. This paper proposes an Improved Secure Identification-based Multilevel Structure of… More >

  • Open Access

    ARTICLE

    Security Data Sharing of Shipbuilding Information Based on Blockchain

    Jun Zhu1,*, Chaosong Yan2, Yinglong Ouyang3, Yao Chen4, Xiaowan Wang5

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1747-1756, 2022, DOI:10.32604/iasc.2022.026934

    Abstract The shipbuilding industry has problems such as long transaction cycles, many participating suppliers, and data sensitivity. A time-dimensional shipbuilding information security sharing scheme based on an alliance chain is proposed to solve this problem. The blockchain can better deliver value and protect user privacy, the blockchain can directly complete the instant transfer of value through smart contracts and tokens on the blockchain. We divide the program into three parts: data preprocessing, data storage, and data sharing. For data sensitivity, data confidentiality and reliability are handled separately. Aiming at the problem of user privacy leakage in data storage, a privacy-protecting blockchain… More >

  • Open Access

    ARTICLE

    Building a Trust Model for Secure Data Sharing (TM-SDS) in Edge Computing Using HMAC Techniques

    K. Karthikeyan*, P. Madhavan

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4183-4197, 2022, DOI:10.32604/cmc.2022.019802

    Abstract With the rapid growth of Internet of Things (IoT) based models, and the lack amount of data makes cloud computing resources insufficient. Hence, edge computing-based techniques are becoming more popular in present research domains that makes data storage, and processing effective at the network edges. There are several advanced features like parallel processing and data perception are available in edge computing. Still, there are some challenges in providing privacy and data security over networks. To solve the security issues in Edge Computing, Hash-based Message Authentication Code (HMAC) algorithm is used to provide solutions for preserving data from various attacks that… More >

  • Open Access

    ARTICLE

    Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

    V. Rajkumar1,*, M. Prakash2, V. Vennila3

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 779-793, 2022, DOI:10.32604/csse.2022.019622

    Abstract Cloud storage is an incipient technology in today’s world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components such as AVK Scheme (Access List, Verifier and Key Generator). It is challenging for every user to prove their identity to the… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain

    Lejun Zhang1,2,*, Minghui Peng1, Weizheng Wang3 , Yansen Su4, Shuna Cui5,6, Seokhoon Kim7

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 499-515, 2021, DOI:10.32604/cmc.2020.012205

    Abstract In the digital era, electronic medical record (EMR) has been a major way for hospitals to store patients’ medical data. The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing. The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput. To address these issues, we propose a secure and efficient medical data storage and sharing scheme based on double blockchain. In our scheme, we encrypt the original EMR and store it in the cloud. The storage blockchain stores the index of the… More >

  • Open Access

    ARTICLE

    Secure Sharing Scheme of Sensitive Data in the Precision Medicine System

    Deukhun Kim1, Heejin Kim2, Jin Kwak3, *

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1527-1553, 2020, DOI:10.32604/cmc.2020.010535

    Abstract Numerous industries, especially the medical industry, are likely to exhibit significant developments in the future. Ever since the announcement of the precision medicine initiative by the United States in 2015, interest in the field has considerably increased. The techniques of precision medicine are employed to provide optimal treatment and medical services to patients, in addition to the prevention and management of diseases via the collection and analysis of big data related to their individual genetic characteristics, occupation, living environment, and dietary habits. As this involves the accumulation and utilization of sensitive information, such as patient history, DNA, and personal details,… More >

  • Open Access

    ARTICLE

    Secure Model of Medical Data Sharing for Complex Scenarios

    Wei She1, Yue Hu2, Zhao Tian1, Guoning Liu3, Bo Wang4, Wei Liu1, 2, *

    Journal of Cyber Security, Vol.1, No.1, pp. 11-17, 2019, DOI:10.32604/jcs.2019.05856

    Abstract In order to secure the massive heterogeneous medical data for the complex scenarios and improve the information sharing efficiency in healthcare system, a distributed medical data ledger model (DMDL) is proposed in this paper. This DMDL model has adopted the blockchain technology including the function decoupling, the distributed consensus, smart contract as well as multi-channel communication structure of consortium blockchain. The DMDL model not only has high adaptability, but also meets the requirements of the medical treatment processes which generally involve multi-entities, highly private information and secure transaction. The steps for processing the medical data are also introduced. Additionally, the… More >

Displaying 11-20 on page 2 of 17. Per Page