Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (210)
  • Open Access

    ARTICLE

    Trust Management-Based Service Recovery and Attack Prevention in MANET

    V. Nivedita1,*, N. Nandhagopal2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 771-786, 2021, DOI:10.32604/iasc.2021.017547

    Abstract The mobile ad-hoc network (MANET) output is critically impaired by the versatility and resource constraint of nodes. Node mobility affects connection reliability, and node resource constraints can lead to congestion, which makes the design of a routing MANET protocol with quality of service (QoS) very difficult. An adaptive clustering reputation model (ACRM) method is proposed to improve energy efficiency with a cluster-based framework. The proposed framework is employed to overcome the problems of data protection, privacy, and policy. The proposed ACRM-MRT approach that includes direct and indirect node trust computation is introduced along with the master recovery timer (MRT) for… More >

  • Open Access

    ARTICLE

    Pseudonym Mutable Based Privacy for 5G User Identity

    Rashid A. Saeed1, Mamoon M. Saeed2,3, Rania A. Mokhtar1, Hesham Alhumyani1, S. Abdel-Khalek4,*

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 1-14, 2021, DOI:10.32604/csse.2021.015593

    Abstract Privacy, identity preserving and integrity have become key problems for telecommunication standards. Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed. As Internet of Things (IoT) and long-term evolution for machine type (LTE-m) are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase. For all the above issues standards’ bodies should ensure users’ identity and privacy in order to gain the trust of service providers and industries. Against such threats, 5G specifications require a rigid and robust privacy procedure. Many research studies have addressed… More >

  • Open Access

    ARTICLE

    NVM Storage in IoT Devices: Opportunities and Challenges

    Yang Liu1, Shan Zhao1,*, Wenhan Chen1, Xuran Ge1, Fang Liu2, Shuo Li3, Nong Xiao1

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 393-409, 2021, DOI:10.32604/csse.2021.017224

    Abstract Edge storage stores the data directly at the data collection point, and does not need to transmit the collected data to the storage central server through the network. It is a critical technology that supports applications such as edge computing and 5G network applications, with lower network communication overhead, lower interaction delay and lower bandwidth cost. However, with the explosion of data and higher real-time requirements, the traditional Internet of Things (IoT) storage architecture cannot meet the requirements of low latency and large capacity. Non-volatile memory (NVM) presents new possibilities regarding this aspect. This paper classifies the different storage architectures… More >

  • Open Access

    ARTICLE

    A Secure Rotation Invariant LBP Feature Computation in Cloud Environment

    Shiqi Wang1, Mingfang Jiang2,*, Jiaohua Qin1, Hengfu Yang2, Zhichen Gao3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2979-2993, 2021, DOI:10.32604/cmc.2021.017094

    Abstract In the era of big data, outsourcing massive data to a remote cloud server is a promising approach. Outsourcing storage and computation services can reduce storage costs and computational burdens. However, public cloud storage brings about new privacy and security concerns since the cloud servers can be shared by multiple users. Privacy-preserving feature extraction techniques are an effective solution to this issue. Because the Rotation Invariant Local Binary Pattern (RILBP) has been widely used in various image processing fields, we propose a new privacy-preserving outsourcing computation of RILBP over encrypted images in this paper (called PPRILBP). To protect image content,… More >

  • Open Access

    ARTICLE

    Extended Forgery Detection Framework for COVID-19 Medical Data Using Convolutional Neural Network

    Sajid Habib Gill1, Noor Ahmed Sheikh1, Samina Rajpar1, Zain ul Abidin2, N. Z. Jhanjhi3,*, Muneer Ahmad4, Mirza Abdur Razzaq1, Sultan S. Alshamrani5, Yasir Malik6, Fehmi Jaafar7

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3773-3787, 2021, DOI:10.32604/cmc.2021.016001

    Abstract Medical data tampering has become one of the main challenges in the field of secure-aware medical data processing. Forgery of normal patients’ medical data to present them as COVID-19 patients is an illegitimate action that has been carried out in different ways recently. Therefore, the integrity of these data can be questionable. Forgery detection is a method of detecting an anomaly in manipulated forged data. An appropriate number of features are needed to identify an anomaly as either forged or non-forged data in order to find distortion or tampering in the original data. Convolutional neural networks (CNNs) have contributed a… More >

  • Open Access

    ARTICLE

    XGBoost Algorithm under Differential Privacy Protection

    Yuanmin Shi1,2, Siran Yin1,2, Ze Chen1,2, Leiming Yan1,2,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 9-16, 2021, DOI:10.32604/jihpp.2021.012193

    Abstract Privacy protection is a hot research topic in information security field. An improved XGBoost algorithm is proposed to protect the privacy in classification tasks. By combining with differential privacy protection, the XGBoost can improve the classification accuracy while protecting privacy information. When using CART regression tree to build a single decision tree, noise is added according to Laplace mechanism. Compared with random forest algorithm, this algorithm can reduce computation cost and prevent overfitting to a certain extent. The experimental results show that the proposed algorithm is more effective than other traditional algorithms while protecting the privacy information in training data. More >

  • Open Access

    ARTICLE

    HealthyBlockchain for Global Patients

    Shada A. Alsalamah1,2,3,*, Hessah A. Alsalamah1,4, Thamer Nouh5, Sara A. Alsalamah6

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2431-2449, 2021, DOI:10.32604/cmc.2021.016618

    Abstract An emerging healthcare delivery model is enabling a new era of clinical care based on well-informed decision-making processes. Current healthcare information systems (HISs) fall short of adopting this model due to a conflict between information security needed to implement the new model and those already enforced locally to support traditional care models. Meanwhile, in recent times, the healthcare sector has shown a substantial interest in the potential of using blockchain technology for providing quality care to patients. No blockchain solution proposed so far has fully addressed emerging cross-organization information-sharing needs in healthcare. In this paper, we aim to study the… More >

  • Open Access

    ARTICLE

    Hyperledger Fabric Blockchain: Secure and Efficient Solution for Electronic Health Records

    Mueen Uddin1,*, M. S. Memon2, Irfana Memon2, Imtiaz Ali2, Jamshed Memon3, Maha Abdelhaq4, Raed Alsaqour5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2377-2397, 2021, DOI:10.32604/cmc.2021.015354

    Abstract Background: Electronic Health Record (EHR) systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally. However, the existing EHR systems mostly lack in providing appropriate security, entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures. Objective: To solve this delicate problem, we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems. Methodology: In our EHR blockchain system, Peer nodes from various organizations (stakeholders) create a ledger network, where… More >

  • Open Access

    ARTICLE

    Smart Contract: Security and Privacy

    Leena S. Alotaibi, Sultan S. Alshamrani*

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 93-101, 2021, DOI:10.32604/csse.2021.015547

    Abstract Smart contracts are simply self-activated contracts between two parties. The idea behind their implementation relies on the concept of blockchain, wherein the details and execution of the contract are turned into code and distributed among users of a network. This process controls counterfeiting and money laundering by its ability to trace who owes whom. It also boosts the general economy. This research paper shows how smart contracts in modern-day systems have changed the approach to money tracing. We present case studies about the uses of smart contracts with high levels of security and privacy. As a building block of smart… More >

  • Open Access

    ARTICLE

    Evaluating the Risk of Disclosure and Utility in a Synthetic Dataset

    Kang-Cheng Chen1, Chia-Mu Yu2,*, Tooska Dargahi3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 761-787, 2021, DOI:10.32604/cmc.2021.014984

    Abstract The advancement of information technology has improved the delivery of financial services by the introduction of Financial Technology (FinTech). To enhance their customer satisfaction, Fintech companies leverage artificial intelligence (AI) to collect fine-grained data about individuals, which enables them to provide more intelligent and customized services. However, although visions thereof promise to make customers’ lives easier, they also raise major security and privacy concerns for their users. Differential privacy (DP) is a common privacy-preserving data publishing technique that is proved to ensure a high level of privacy preservation. However, an important concern arises from the trade-off between the data utility… More >

Displaying 141-150 on page 15 of 210. Per Page