Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context

    Miaomiao Yang1,2, Guosheng Huang1,2, Junwei Liu3, Yanshuang Gui1,2, Qixu Wang1,2,*, Xingshu Chen1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1879-1898, 2023, DOI:10.32604/cmes.2023.026371 - 06 February 2023

    Abstract With the advantages of lightweight and high resource utilization, cloud-native technology with containers as the core is gradually becoming the mainstream technical architecture for information infrastructure. However, malware attacks such as Doki and Symbiote threaten the container runtime’s security. Malware initiates various types of runtime anomalies based on process form (e.g., modifying the process of a container, and opening the external ports). Fortunately, dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime. Nevertheless, the current routine dynamic monitoring mechanisms for baseline data protection are still… More >

  • Open Access

    ARTICLE

    Consensus Mechanism of Blockchain Based on PoR with Data Deduplication

    Wei Zhou1, Hao Wang2, Ghulam Mohiuddin3, Dan Chen4,*, Yongjun Ren1

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1473-1488, 2022, DOI:10.32604/iasc.2022.029657 - 25 May 2022

    Abstract As the basis of cloud computing, distributed storage technology mainly studies how data centers store, organize and manage data. Blockchain has become the most secure solution for cloud storage due to its decentralization and immutability. Consensus mechanism is one of the core technologies of blockchain, which affects the transaction processing capability, security and scalability of blockchain. The current mainstream consensus algorithms such as Proof of Work, Proof of Stake, and Delegated Proof of Stake all have the problem of wasting resources. And with the explosive growth of data, cloud storage nodes store a large amount… More >

  • Open Access

    ARTICLE

    WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings

    Chunhua Li1,*, Peng Wang1, Changhong Sun1, Ke Zhou1, Ping Huang2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 319-333, 2019, DOI:10.32604/cmc.2019.03856

    Abstract The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not. Based on the general three-party audit architecture, a dynamic auditing scheme without bilinear pairings is proposed in this paper. It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence. By establishing the mapping relation between logic index and tag index of data block with index transformation table, our scheme can easily More >

Displaying 1-10 on page 1 of 3. Per Page