Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Application of Federated Learning Algorithm Based on K-Means in Electric Power Data

    Weimin He, Lei Zhao*

    Journal of New Media, Vol.4, No.4, pp. 191-203, 2022, DOI:10.32604/jnm.2022.032994

    Abstract Accurate electricity forecasting is the key basis for guiding the power sector to arrange operation plans and guaranteeing the profitability of electric power companies. However, with the increasing demand of enterprises and departments for data security, the phenomenon of “Isolated Data Island” becomes more and more serious, resulting in the accuracy loss of the traditional electricity prediction model. Federated learning, as an emerging artificial intelligence technology, is designed to ensure data privacy while carrying out efficient machine learning, which provides a new way to solve the problem of “Isolated Data Island” in terms of electricity forecasting. Nonetheless, due to the… More >

  • Open Access

    ARTICLE

    Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation

    B. Murugeshwari1,*, S. Rajalakshmi1, K. Sudharson2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2293-2307, 2023, DOI:10.32604/csse.2023.029074

    Abstract Imagine numerous clients, each with personal data; individual inputs are severely corrupt, and a server only concerns the collective, statistically essential facets of this data. In several data mining methods, privacy has become highly critical. As a result, various privacy-preserving data analysis technologies have emerged. Hence, we use the randomization process to reconstruct composite data attributes accurately. Also, we use privacy measures to estimate how much deception is required to guarantee privacy. There are several viable privacy protections; however, determining which one is the best is still a work in progress. This paper discusses the difficulty of measuring privacy while… More >

  • Open Access

    ARTICLE

    Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

    S. Stewart Kirubakaran1,*, V. P. Arunachalam1, S. Karthik1, S. Kannan2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1881-1895, 2023, DOI:10.32604/csse.2023.026690

    Abstract In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security-related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured… More >

  • Open Access

    ARTICLE

    A Virtual Cloud Storage Architecture for Enhanced Data Security

    M. Antony Joans Kumar1,*, C. Christopher Columbus2, E. Ben George3, T. Ajith Bosco Raj4

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1735-1747, 2023, DOI:10.32604/csse.2023.025906

    Abstract The sensitive data stored in the public cloud by privileged users, such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and hackers. The proposed Virtual Cloud Storage Architecture is primarily concerned with data integrity and confidentiality, as well as availability. To provide confidentiality and availability, the file to be stored in cloud storage should be encrypted using an auto-generated key and then encoded into distinct chunks. Hashing the encoded chunks ensured the file integrity, and a newly proposed Circular Shift Chunk Allocation technique was used to determine the order of chunk storage. The… More >

  • Open Access

    ARTICLE

    Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique

    Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Kanika Sharma3, Masood Ahmad4, Raees Ahmad Khan4,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 859-872, 2023, DOI:10.32604/csse.2023.025796

    Abstract In recent years, it has been observed that the disclosure of information increases the risk of terrorism. Without restricting the accessibility of information, providing security is difficult. So, there is a demand for time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not directly influenced, some of their factors are indirectly influenced by each other. Attributes play an important role in bridging the gap between security and accessibility. In this paper, we identify the key… More >

  • Open Access

    ARTICLE

    Proof of Activity Protocol for IoMT Data Security

    R. Rajadevi1, K. Venkatachalam2, Mehedi Masud3, Mohammed A. AlZain4, Mohamed Abouhawwash5,6,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 339-350, 2023, DOI:10.32604/csse.2023.024537

    Abstract The Internet of Medical Things (IoMT) is an online device that senses and transmits medical data from users to physicians within a time interval. In, recent years, IoMT has rapidly grown in the medical field to provide healthcare services without physical appearance. With the use of sensors, IoMT applications are used in healthcare management. In such applications, one of the most important factors is data security, given that its transmission over the network may cause obtrusion. For data security in IoMT systems, blockchain is used due to its numerous blocks for secure data storage. In this study, Blockchain-assisted secure data… More >

  • Open Access

    ARTICLE

    Image Steganography Using Deep Neural Networks

    Kavitha Chinniyan*, Thamil Vani Samiyappan, Aishvarya Gopu, Narmatha Ramasamy

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1877-1891, 2022, DOI:10.32604/iasc.2022.027274

    Abstract Steganography is the technique of hiding secret data within ordinary data by modifying pixel values which appear normal to a casual observer. Steganography which is similar to cryptography helps in secret communication. The cryptography method focuses on the authenticity and integrity of the messages by hiding the contents of the messages. Sometimes, it is not only just enough to encrypt the message but also essential to hide the existence of the message itself. As this avoids misuse of data, this kind of encryption is less suspicious and does not catch attention. To achieve this, Stacked Autoencoder model is developed which… More >

  • Open Access

    ARTICLE

    An Optimal Framework for SDN Based on Deep Neural Network

    Abdallah Abdallah1, Mohamad Khairi Ishak2, Nor Samsiah Sani3, Imran Khan4, Fahad R. Albogamy5, Hirofumi Amano6, Samih M. Mostafa7,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1125-1140, 2022, DOI:10.32604/cmc.2022.025810

    Abstract Software-defined networking (SDN) is a new paradigm that promises to change by breaking vertical integration, decoupling network control logic from the underlying routers and switches, promoting (logical) network control centralization, and introducing network programming. However, the controller is similarly vulnerable to a “single point of failure”, an attacker can execute a distributed denial of service (DDoS) attack that invalidates the controller and compromises the network security in SDN. To address the problem of DDoS traffic detection in SDN, a novel detection approach based on information entropy and deep neural network (DNN) is proposed. This approach contains a DNN-based DDoS traffic… More >

  • Open Access

    ARTICLE

    Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home

    Anusha Vangala1, Ashok Kumar Das1, YoungHo Park2,*, Sajjad Shaukat Jamal3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3549-3570, 2022, DOI:10.32604/cmc.2022.025660

    Abstract The recent surge in development of smart homes and smart cities can be observed in many developed countries. While the idea to control devices that are in home (embedded with the Internet of Things (IoT) smart devices) by the user who is outside the home might sound fancy, but it comes with a lot of potential threats. There can be many attackers who will be trying to take advantage of this. So, there is a need for designing a secure scheme which will be able to distinguish among genuine/authorized users of the system and attackers. And knowing about the details… More >

  • Open Access

    ARTICLE

    Multi-dimensional Security Range Query for Industrial IoT

    Abdallah Abdallah1, Ayman A. Aly2, Bassem F. Felemban2, Imran Khan3, Ki-Il Kim4,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 157-179, 2022, DOI:10.32604/cmc.2022.023907

    Abstract The Internet of Things (IoT) has allowed for significant advancements in applications not only in the home, business, and environment, but also in factory automation. Industrial Internet of Things (IIoT) brings all of the benefits of the IoT to industrial contexts, allowing for a wide range of applications ranging from remote sensing and actuation to decentralization and autonomy. The expansion of the IoT has been set by serious security threats and obstacles, and one of the most pressing security concerns is the secure exchange of IoT data and fine-grained access control. A privacy-preserving multi-dimensional secure query technique for fog-enhanced IIoT… More >

Displaying 21-30 on page 3 of 45. Per Page