Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    A Scalable Double-Chain Storage Module for Blockchain

    Hui Han1,2, Wunan Wan1,2,*, Jinquan Zhang1,2, Zhi Qin1,2, Xiaofang Qiu1,2, Shibin Zhang1,2, Jinyue Xia3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2651-2662, 2022, DOI:10.32604/cmc.2022.028607 - 16 June 2022

    Abstract With the growing maturity of blockchain technology, its peer-to-peer model and fully duplicated data storage pattern enable blockchain to act as a distributed ledger in untrustworthy environments. Blockchain storage has also become a research hotspot in industry, finance, and academia due to its security, and its unique data storage management model is gradually becoming a key technology to play its value in various fields’ applications. However, with the increasing amount of data written into the blockchain, the blockchain system faces many problems in its actual implementation of the application, such as high storage space occupation,… More >

  • Open Access

    ARTICLE

    Fault Management Cyber-Physical Systems in Virtual Storage Model

    Kailash Kumar*, Ahmad Abdullah Aljabr

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3781-3801, 2022, DOI:10.32604/cmc.2022.020510 - 27 September 2021

    Abstract On average, every two years, the amount of data existing globally doubles. Software development will be affected and improved by Cyber-Physical Systems (CPS). The number of problems remained even though developments helped Information Technology experts extract better value from their storage investments. Because of poor interoperability between different vendors and devices, countless numbers of Storage Area Networks were created. Network setup used for data storage includes a complex and rigid arrangement of routers, switch, hosts/servers, storage arrays. We have evaluated the performance of routing protocol Transmission Control Protocol (TCP) and Fibre Channel Protocol (FCP) under More >

  • Open Access

    ARTICLE

    Data Security Storage Model of the Internet of Things Based on Blockchain

    Pingshui Wang1,2,*, Willy Susilo2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 213-224, 2021, DOI:10.32604/csse.2021.014541 - 23 December 2020

    Abstract With the development of information technology, the Internet of Things (IoT) has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet. The application of the IoT has brought great convenience to people’s production and life. However, the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them. The traditional centralized data storage and management model of the IoT is easy to cause transmission delay, single point of failure, privacy disclosure and other problems, and eventually leads to unpredictable behavior More >

Displaying 1-10 on page 1 of 3. Per Page