Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Leveraging Sharding-Based Hybrid Consensus for Blockchain

    Hind Baageel1, Md Mahfuzur Rahman1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1215-1233, 2024, DOI:10.32604/cmc.2024.055908 - 15 October 2024

    Abstract The advent of blockchain technology has transformed traditional methods of information exchange, shifting reliance from centralized data centers to decentralized frameworks. While blockchain’s decentralization and security are strengths, traditional consensus mechanisms like Proof of Work (PoW) and Proof of Stake (PoS) face limitations in scalability. PoW achieves decentralization and security but struggles with scalability as transaction volumes grow, while PoS enhances scalability, but risks centralization due to monopolization by high-stake participants. Sharding, a recent advancement in blockchain technology, addresses scalability by partitioning the network into shards that process transactions independently, thereby improving throughput and reducing… More >

  • Open Access

    ARTICLE

    QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

    Ang Liu1, Qing Zhang2, Shengwei Xu3,*, Huamin Feng4, Xiu-bo Chen5, Wen Liu1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1727-1751, 2024, DOI:10.32604/cmc.2024.051233 - 18 July 2024

    Abstract The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used… More >

  • Open Access

    ARTICLE

    Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption

    Mohanad A. Mohammed*, Hala B. Abdul Wahab

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1731-1748, 2024, DOI:10.32604/cmes.2023.030528 - 17 November 2023

    Abstract Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges. Concurrently, the Internet of Things (IoT) has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services, ultimately enhancing human lives. This paper presents a new approach utilizing lightweight blockchain technology, effectively reducing the computational burden typically associated with conventional blockchain systems. By integrating this lightweight blockchain with IoT systems, substantial reductions in implementation time and computational complexity can be achieved. Moreover, the paper proposes the utilization of the Okamoto More >

  • Open Access

    ARTICLE

    Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing

    Yonghao Zhang1,3, Yongtang Wu2, Tao Li1, Hui Zhou1,3, Yuling Chen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 345-361, 2023, DOI:10.32604/cmes.2023.026920 - 23 April 2023

    Abstract The data in Mobile Edge Computing (MEC) contains tremendous market value, and data sharing can maximize the usefulness of the data. However, certain data is quite sensitive, and sharing it directly may violate privacy. Vertical Federated Learning (VFL) is a secure distributed machine learning framework that completes joint model training by passing encrypted model parameters rather than raw data, so there is no data privacy leakage during the training process. Therefore, the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy. Typically, the VFL requires a… More >

  • Open Access

    ARTICLE

    Blockchain Based Consensus Algorithm and Trustworthy Evaluation of Authenticated Subgraph Queries

    G. Sharmila1,*, M. K. Kavitha Devi2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1743-1758, 2023, DOI:10.32604/csse.2023.032127 - 03 November 2022

    Abstract Over the past era, subgraph mining from a large collection of graph database is a crucial problem. In addition, scalability is another big problem due to insufficient storage. There are several security challenges associated with subgraph mining in today’s on-demand system. To address this downside, our proposed work introduces a Blockchain-based Consensus algorithm for Authenticated query search in the Large-Scale Dynamic Graphs (BCCA-LSDG). The two-fold process is handled in the proposed BCCA-LSDG: graph indexing and authenticated query search (query processing). A blockchain-based reputation system is meant to maintain the trust blockchain and cloud server of… More >

  • Open Access

    ARTICLE

    Enhancing Blockchain Security Using Ripple Consensus Algorithm

    A. Baseera1, Abeer Abdullah Alsadhan2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4713-4726, 2022, DOI:10.32604/cmc.2022.029538 - 28 July 2022

    Abstract In the development of technology in various fields like big data analysis, data mining, big data, cloud computing, and blockchain technology, security become more constrained. Blockchain is used in providing security by encrypting the sharing of information. Blockchain is applied in the peer-to-peer (P2P) network and it has a decentralized ledger. Providing security against unauthorized breaches in the distributed network is required. To detect unauthorized breaches, there are numerous techniques were developed and those techniques are inefficient and have poor data integrity. Hence, a novel technique needs to be implemented to tackle the new breaches More >

  • Open Access

    ARTICLE

    A Novel GLS Consensus Algorithm for Alliance Chain in Edge Computing Environment

    Huijuan Wang1, *, Jiang Yong1, Qingwei Liu2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 963-976, 2020, DOI:10.32604/cmc.2020.09803 - 23 July 2020

    Abstract Edge computing devices are widely deployed. An important issue that arises is in that these devices suffer from security attacks. To deal with it, we turn to the blockchain technologies. The note in the alliance chain need rules to limit write permissions. Alliance chain can provide security management functions, using these functions to meet the management between the members, certification, authorization, monitoring and auditing. This article mainly analyzes some requirements realization which applies to the alliance chain, and introduces a new consensus algorithm, generalized Legendre sequence (GLS) consensus algorithm, for alliance chain. GLS algorithms inherit More >

Displaying 1-10 on page 1 of 7. Per Page