Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (322)
  • Open Access

    ARTICLE

    Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment

    Qiping Zou1, Zhong Ruan2,*, Huaning Song1

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1301-1328, 2024, DOI:10.32604/csse.2024.051796

    Abstract As an important application of intelligent transportation system, Internet of Vehicles (IoV) provides great convenience for users. Users can obtain real-time traffic conditions through the IoV’s services, plan users' travel routes, and improve travel efficiency. However, in the IoV system, there are always malicious vehicle nodes publishing false information. Therefore, it is essential to ensure the legitimacy of the source. In addition, during the peak period of vehicle travel, the vehicle releases a large number of messages, and IoV authentication efficiency is prone to performance bottlenecks. Most existing authentication schemes have the problem of low… More >

  • Open Access

    ARTICLE

    Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things

    Zhaobin Li*, Xiantao Liu*, Nan Zhang, Zhanzhen Wei

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3835-3854, 2024, DOI:10.32604/cmc.2024.053950

    Abstract The Industrial Internet of Things (IIoT) consists of massive devices in different management domains, and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange. To address the above challenges, a viable solution that combines Certificateless Public Key Cryptography (CL-PKC) with blockchain technology can be utilized. However, as many existing schemes rely on a single Key Generation Center (KGC), they are prone to problems such as single points of failure and high computational overhead. In this case, this paper proposes a novel blockchain-based certificateless cross-domain authentication… More >

  • Open Access

    ARTICLE

    Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System

    Youngho Park1, Su Jin Shin2, Sang Uk Shin3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 671-688, 2024, DOI:10.32604/cmes.2024.052378

    Abstract Data trading enables data owners and data requesters to sell and purchase data. With the emergence of blockchain technology, research on blockchain-based data trading systems is receiving a lot of attention. Particularly, to reduce the on-chain storage cost, a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform. Moreover, the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace. In the data marketplace, it is a challenge how to trade the data securely… More >

  • Open Access

    ARTICLE

    Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers (DID)

    Iuon-Chang Lin1, I-Ling Yeh1, Ching-Chun Chang2, Jui-Chuan Liu3, Chin-Chen Chang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 809-822, 2024, DOI:10.32604/cmes.2024.051612

    Abstract Centralized storage and identity identification methods pose many risks, including hacker attacks, data misuse, and single points of failure. Additionally, existing centralized identity management methods face interoperability issues and rely on a single identity provider, leaving users without control over their identities. Therefore, this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers. The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity. Data is stored on InterPlanetary File System (IPFS) to avoid the risk of single More >

  • Open Access

    ARTICLE

    PARE: Privacy-Preserving Data Reliability Evaluation for Spatial Crowdsourcing in Internet of Things

    Peicong He, Yang Xin*, Yixian Yang

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3067-3084, 2024, DOI:10.32604/cmc.2024.054777

    Abstract The proliferation of intelligent, connected Internet of Things (IoT) devices facilitates data collection. However, task workers may be reluctant to participate in data collection due to privacy concerns, and task requesters may be concerned about the validity of the collected data. Hence, it is vital to evaluate the quality of the data collected by the task workers while protecting privacy in spatial crowdsourcing (SC) data collection tasks with IoT. To this end, this paper proposes a privacy-preserving data reliability evaluation for SC in IoT, named PARE. First, we design a data uploading format using blockchain More >

  • Open Access

    ARTICLE

    Sec-Auditor: A Blockchain-Based Data Auditing Solution for Ensuring Integrity and Semantic Correctness

    Guodong Han, Hecheng Li*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2121-2137, 2024, DOI:10.32604/cmc.2024.053077

    Abstract Currently, there is a growing trend among users to store their data in the cloud. However, the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks. Additionally, when users perform file operations, the semantic integrity of the data can be compromised. Ensuring both data integrity and semantic correctness has become a critical issue that requires attention. We introduce a pioneering solution called Sec-Auditor, the first of its kind with the ability to verify data integrity and semantic correctness simultaneously, while maintaining a constant communication cost independent of the audited… More >

  • Open Access

    ARTICLE

    Blockchain-Enabled Federated Learning for Privacy-Preserving Non-IID Data Sharing in Industrial Internet

    Qiuyan Wang, Haibing Dong*, Yongfei Huang, Zenglei Liu, Yundong Gou

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1967-1983, 2024, DOI:10.32604/cmc.2024.052775

    Abstract Sharing data while protecting privacy in the industrial Internet is a significant challenge. Traditional machine learning methods require a combination of all data for training; however, this approach can be limited by data availability and privacy concerns. Federated learning (FL) has gained considerable attention because it allows for decentralized training on multiple local datasets. However, the training data collected by data providers are often non-independent and identically distributed (non-IID), resulting in poor FL performance. This paper proposes a privacy-preserving approach for sharing non-IID data in the industrial Internet using an FL approach based on blockchain… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Healthcare and Medical Data Collaboration Service System Based on Blockchain and Federated Learning

    Fang Hu1, Siyi Qiu2, Xiaolian Yang1, Chaolei Wu1, Miguel Baptista Nunes3, Hui Chen4,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2897-2915, 2024, DOI:10.32604/cmc.2024.052570

    Abstract As the volume of healthcare and medical data increases from diverse sources, real-world scenarios involving data sharing and collaboration have certain challenges, including the risk of privacy leakage, difficulty in data fusion, low reliability of data storage, low effectiveness of data sharing, etc. To guarantee the service quality of data collaboration, this paper presents a privacy-preserving Healthcare and Medical Data Collaboration Service System combining Blockchain with Federated Learning, termed FL-HMChain. This system is composed of three layers: Data extraction and storage, data management, and data application. Focusing on healthcare and medical data, a healthcare and… More >

  • Open Access

    ARTICLE

    FADSF: A Data Sharing Model for Intelligent Connected Vehicles Based on Blockchain Technology

    Yan Sun, Caiyun Liu, Jun Li, Yitong Liu*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2351-2362, 2024, DOI:10.32604/cmc.2024.048903

    Abstract With the development of technology, the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal. The data of ICV (intelligent connected vehicles) is the key to organically maximizing their efficiency. However, in the context of increasingly strict global data security supervision and compliance, numerous problems, including complex types of connected vehicle data, poor data collaboration between the IT (information technology) domain and OT (operation technology) domain, different data format standards, lack of shared trust sources, difficulty in ensuring the quality of shared data, lack of data… More >

  • Open Access

    REVIEW

    A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection

    Yaqiong He, Jinlin Fan*, Huaiguang Wu

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 995-1032, 2024, DOI:10.32604/cmc.2024.052887

    Abstract With the rise of blockchain technology, the security issues of smart contracts have become increasingly critical. Despite the availability of numerous smart contract vulnerability detection tools, many face challenges such as slow updates, usability issues, and limited installation methods. These challenges hinder the adoption and practicality of these tools. This paper examines smart contract vulnerability detection tools from 2016 to 2023, sourced from the Web of Science (WOS) and Google Scholar. By systematically collecting, screening, and synthesizing relevant research, 38 open-source tools that provide installation methods were selected for further investigation. From a developer’s perspective,… More >

Displaying 1-10 on page 1 of 322. Per Page