Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    ARTICLE

    Data Secure Storage Mechanism for IIoT Based on Blockchain

    Jin Wang1,2, Guoshu Huang1, R. Simon Sherratt3, Ding Huang4, Jia Ni4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4029-4048, 2024, DOI:10.32604/cmc.2024.047468

    Abstract With the development of Industry 4.0 and big data technology, the Industrial Internet of Things (IIoT) is hampered by inherent issues such as privacy, security, and fault tolerance, which pose certain challenges to the rapid development of IIoT. Blockchain technology has immutability, decentralization, and autonomy, which can greatly improve the inherent defects of the IIoT. In the traditional blockchain, data is stored in a Merkle tree. As data continues to grow, the scale of proofs used to validate it grows, threatening the efficiency, security, and reliability of blockchain-based IIoT. Accordingly, this paper first analyzes the inefficiency of the traditional blockchain… More >

  • Open Access

    ARTICLE

    A Secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism

    Jian Shang1,2,*, Runmin Guan2, Wei Wang2

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2609-2626, 2023, DOI:10.32604/iasc.2023.037694

    Abstract The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years. In real-world scenarios, microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks. To meet the high hardware resource requirements, address the vulnerability to network attacks and poor reliability in the traditional centralized data storage schemes, this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph (DAG) consensus mechanism. Firstly, the microgrid data storage model is designed based on the edge computing technology. The blockchain, deployed on… More >

  • Open Access

    ARTICLE

    A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing

    Muhammad Usman Sana1,*, Zhanli Li1, Tayybah Kiren2, Hannan Bin Liaqat3, Shahid Naseem3, Atif Saeed4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2741-2757, 2023, DOI:10.32604/cmc.2023.036093

    Abstract Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being deployed. In cloud computation, data processing, storage, and transmission can be done through laptops and mobile devices. Data Storing in cloud facilities is expanding each day and data is the most significant asset of clients. The important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s data. They have to be… More >

  • Open Access

    ARTICLE

    Data Security Storage Mechanism Based on Blockchain Network

    Jin Wang1, Wei Ou1, Wenhai Wang2, R. Simon Sherratt3, Yongjun Ren4, Xiaofeng Yu5,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4933-4950, 2023, DOI:10.32604/cmc.2023.034148

    Abstract With the rapid development of information technology, the development of blockchain technology has also been deeply impacted. When performing block verification in the blockchain network, if all transactions are verified on the chain, this will cause the accumulation of data on the chain, resulting in data storage problems. At the same time, the security of data is also challenged, which will put enormous pressure on the block, resulting in extremely low communication efficiency of the block. The traditional blockchain system uses the Merkle Tree method to store data. While verifying the integrity and correctness of the data, the amount of… More >

  • Open Access

    ARTICLE

    DNA Computing with Water Strider Based Vector Quantization for Data Storage Systems

    A. Arokiaraj Jovith1, S. Rama Sree2, Gudikandhula Narasimha Rao3, K. Vijaya Kumar4, Woong Cho5, Gyanendra Prasad Joshi6, Sung Won Kim7,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6429-6444, 2023, DOI:10.32604/cmc.2023.031817

    Abstract The exponential growth of data necessitates an effective data storage scheme, which helps to effectively manage the large quantity of data. To accomplish this, Deoxyribonucleic Acid (DNA) digital data storage process can be employed, which encodes and decodes binary data to and from synthesized strands of DNA. Vector quantization (VQ) is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression efficiency. This article introduces a new DNA Computing with Water Strider Algorithm based Vector Quantization (DNAC-WSAVQ) technique for Data Storage Systems. The proposed DNAC-WSAVQ technique enables encoding data using… More >

  • Open Access

    REVIEW

    Intelligent Identification over Power Big Data: Opportunities, Solutions, and Challenges

    Liang Luo1, Xingmei Li1, Kaijiang Yang1, Mengyang Wei1, Jiong Chen1, Junqian Yang1, Liang Yao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1565-1595, 2023, DOI:10.32604/cmes.2022.021198

    Abstract The emergence of power dispatching automation systems has greatly improved the efficiency of power industry operations and promoted the rapid development of the power industry. However, with the convergence and increase in power data flow, the data dispatching network and the main station dispatching automation system have encountered substantial pressure. Therefore, the method of online data resolution and rapid problem identification of dispatching automation systems has been widely investigated. In this paper, we perform a comprehensive review of automated dispatching of massive dispatching data from the perspective of intelligent identification, discuss unresolved research issues and outline future directions in this… More >

  • Open Access

    ARTICLE

    Application and Challenge of Blockchain Technology in Medical Field

    Kaifeng Zhang1, Zhao Qiu1,*, Gengquan Xie1, Jiale Lin1, Tingting Zhang1, Yingsheng Lian1, Tao Chen1, Yunlong He2, Yu Yang2

    Journal of Cyber Security, Vol.4, No.2, pp. 95-107, 2022, DOI:10.32604/jcs.2022.029451

    Abstract Due to its unique security, blockchain technology is widely used in the financial field. Under the background of the rapid development of information technology and the rapid improvement of medical level, it is also a general trend to integrate blockchain technology into the medical field. According to the characteristics of blockchain and the research contents of many scholars on the application of blockchain in the medical field, this paper analyzes and summarizes the problems existing in the current development of blockchain, puts forward corresponding solutions, and looks forward to the further application of blockchain technology in the medical field. More >

  • Open Access

    ARTICLE

    Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage

    B. Venkatesan1,*, S. Chitra2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1603-1615, 2022, DOI:10.32604/iasc.2022.026049

    Abstract The cloud storage is essential environment for users to access high confidential data. Every single data is most valued by users. If we count, day by day information as well as, memory storage are increasing gradually. Cost of memory will increase when data increases with demand for storage. At present data duplication or redundant data storing in the cloud became hard for storage provider. Also, it makes security issue if repeated data from various users stored in the server. It makes data duplication, which is very efficient for intruders. Also, when same data stored in cloud, there will be a… More >

  • Open Access

    ARTICLE

    Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

    J. Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3,*, B. D. Parameshachari4, Celestine Iwendi5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 519-534, 2022, DOI:10.32604/cmc.2022.021269

    Abstract Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily… More >

  • Open Access

    ARTICLE

    Implementation and Validation of the Optimized Deduplication Strategy in Federated Cloud Environment

    Nipun Chhabra*, Manju Bala, Vrajesh Sharma

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 2019-2035, 2022, DOI:10.32604/cmc.2022.021797

    Abstract Cloud computing technology is the culmination of technical advancements in computer networks, hardware and software capabilities that collectively gave rise to computing as a utility. It offers a plethora of utilities to its clients worldwide in a very cost-effective way and this feature is enticing users/companies to migrate their infrastructure to cloud platform. Swayed by its gigantic capacity and easy access clients are uploading replicated data on cloud resulting in an unnecessary crunch of storage in datacenters. Many data compression techniques came to rescue but none could serve the purpose for the capacity as large as a cloud, hence, researches… More >

Displaying 1-10 on page 1 of 19. Per Page