Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (323)
  • Open Access

    ARTICLE

    An Efficient SDFRM Security System for Blockchain Based Internet of Things

    Vivekraj Mannayee1,*, Thirumalai Ramanathan2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1545-1563, 2023, DOI:10.32604/iasc.2023.027675 - 19 July 2022

    Abstract Blockchain has recently sparked interest in both the technological and business firms. The Internet of Things's (IoT) core principle emerged due to the connectivity of several new technologies, including wireless technology, the Internet, embedded automation systems, and micro-electromechanical devices. Manufacturing environments and operations have been successfully converted by implementing recent advanced technology like Cloud Computing (CC), Cyber-Physical System (CSP), Information and Communication Technologies (ICT) and Enterprise Model, and other technological innovations into the fourth industrial revolution referred to as Industry 4.0. Data management is defined as the process of accumulation in order to make better… More >

  • Open Access

    ARTICLE

    Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography

    B. Murugeshwari1,*, D. Selvaraj2, K. Sudharson3, S. Radhika4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 839-851, 2023, DOI:10.32604/iasc.2023.028548 - 06 June 2022

    Abstract Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique that protects the privacy of individual data while mining those data. The most significant task entails obtaining data from numerous remote databases. Mining algorithms can obtain sensitive information once the data is in the data warehouse. Many traditional algorithms/techniques promise to provide safe data transfer, storing, and retrieving over the cloud platform. These strategies are primarily concerned with protecting the privacy of user data. This study aims to present data mining with privacy protection (DMPP) using precise elliptic More >

  • Open Access

    ARTICLE

    Encryption with User Authentication Model for Internet of Medical Things Environment

    K. S. Riya1, R. Surendran2,*, Carlos Andrés Tavera Romero3, M. Sadish Sendil4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 507-520, 2023, DOI:10.32604/iasc.2023.027779 - 06 June 2022

    Abstract Internet of Medical Things (IoMT) enabled e-healthcare has the potential to greately improve conventional healthcare services significantly. However, security and privacy become major issues of IoMT because of the restricted processing abilities, storage, and energy constraints of the sensors. Therefore, it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors. In order to ensure security on sensitive medical data, effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers. In this view, this study designs an effective metaheuristic optimization based encryption with user… More >

  • Open Access

    ARTICLE

    Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare

    J. Priya*, C. Palanisamy

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 243-259, 2023, DOI:10.32604/iasc.2023.025719 - 06 June 2022

    Abstract The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internet and computing resources. In recent years, many more IoT applications have been extensively used. For instance, Healthcare applications execute computations utilizing the user’s private data stored on cloud servers. However, the main obstacles faced by the extensive acceptance and usage of these emerging technologies are security and privacy. Moreover, many healthcare data management system applications have emerged, offering solutions for distinct circumstances. But still, the existing system has issues with specific security issues,… More >

  • Open Access

    REVIEW

    A Survey of Privacy Preservation for Deep Learning Applications

    Ling Zhang1,*, Lina Nie1, Leyan Yu2

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 69-78, 2022, DOI:10.32604/jihpp.2022.039284 - 17 April 2023

    Abstract Deep learning is widely used in artificial intelligence fields such as computer vision, natural language recognition, and intelligent robots. With the development of deep learning, people’s expectations for this technology are increasing daily. Enterprises and individuals usually need a lot of computing power to support the practical work of deep learning technology. Many cloud service providers provide and deploy cloud computing environments. However, there are severe risks of privacy leakage when transferring data to cloud service providers and using data for model training, which makes users unable to use deep learning technology in cloud computing More >

  • Open Access

    ARTICLE

    TrustControl: Trusted Private Data Usage Control Based on Security Enhanced TrustZone

    Hong Lei1,2,3, Jun Li1,*, Suozai Li4, Ming Huang4, Jieren Cheng5, Yirui Bai1, Xinman Luo1, Chao Liu6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5687-5702, 2022, DOI:10.32604/cmc.2022.030995 - 28 July 2022

    Abstract The past decade has seen the rapid development of data in many areas. Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation. However, individuals are becoming increasingly concerned about data misuse and leaks. To address these issues, in this paper, we propose TrustControl, a trusted data usage control system to control, process, and protect data usage without revealing privacy. A trusted execution environment (TEE) is exploited to process confidential user data. First of all, we design a secure and reliable remote attestation mechanism for ARM… More >

  • Open Access

    ARTICLE

    Privacy Preserving Blockchain with Optimal Deep Learning Model for Smart Cities

    K. Pradeep Mohan Kumar1, Jenifer Mahilraj2, D. Swathi3, R. Rajavarman4, Subhi R. M. Zeebaree5, Rizgar R. Zebari6, Zryan Najat Rashid7, Ahmed Alkhayyat8,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5299-5314, 2022, DOI:10.32604/cmc.2022.030825 - 28 July 2022

    Abstract Recently, smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available resources. Despite the advantages of smart cities, security remains a huge challenge to be overcome. Simultaneously, Intrusion Detection System (IDS) is the most proficient tool to accomplish security in this scenario. Besides, blockchain exhibits significance in promoting smart city designing, due to its effective characteristics like immutability, transparency, and decentralization. In order to address the security problems in smart cities, the current study designs a Privacy Preserving Secure Framework using Blockchain with Optimal… More >

  • Open Access

    ARTICLE

    Application and Challenge of Blockchain Technology in Medical Field

    Kaifeng Zhang1, Zhao Qiu1,*, Gengquan Xie1, Jiale Lin1, Tingting Zhang1, Yingsheng Lian1, Tao Chen1, Yunlong He2, Yu Yang2

    Journal of Cyber Security, Vol.4, No.2, pp. 95-107, 2022, DOI:10.32604/jcs.2022.029451 - 04 July 2022

    Abstract Due to its unique security, blockchain technology is widely used in the financial field. Under the background of the rapid development of information technology and the rapid improvement of medical level, it is also a general trend to integrate blockchain technology into the medical field. According to the characteristics of blockchain and the research contents of many scholars on the application of blockchain in the medical field, this paper analyzes and summarizes the problems existing in the current development of blockchain, puts forward corresponding solutions, and looks forward to the further application of blockchain technology More >

  • Open Access

    ARTICLE

    Web Tracking Domain and Possible Privacy Defending Tools: A Literature Review

    Maryam Abdulaziz Saad Bubukayr1,*, Mounir Frikha2

    Journal of Cyber Security, Vol.4, No.2, pp. 79-94, 2022, DOI:10.32604/jcs.2022.029020 - 04 July 2022

    Abstract Personal data are strongly linked to web browsing history. By visiting a certain website, a user can share her favorite items, location, employment status, financial information, preferences, gender, medical status, news, etc. Therefore, web tracking is considered as one of the most significant internet privacy threats that can have a serious impact on end-users. Usually, it is used by most websites to track visitors through the internet in order to enhance their services and improve search customization. Moreover, selling users’ data to the advertising companies without their permission. Although there are more research efforts focused More >

  • Open Access

    ARTICLE

    Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data

    A. Jameer Basha1, N. Rajkumar2, Mohammed A. AlZain3, Mehedi Masud4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1693-1706, 2022, DOI:10.32604/iasc.2022.024714 - 25 May 2022

    Abstract In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication processes between the medical devices and the humans via wireless network. Moreover, this communication helps both the physicians and the patients to contact remotely for the diagnosis of the disease’s wearable devices sensor signals. However, IoMT system violates the privacy preserving of Patient’s Health Record (PHR) as well as self-sovereign identity of patient. In this regard, security action should be taken. Previous techniques used in IoMT are in lack of data consistency, confidentiality, and inaccessible of data. To overcome these issues, the fog computing-based… More >

Displaying 201-210 on page 21 of 323. Per Page