137 Hits in 4.0 sec

Security Data Sharing of Shipbuilding Information Based on Blockchain

Jun Zhu, Chaosong Yan, Yinglong Ouyang, Yao Chen, Xiaowan Wang
2022 Intelligent Automation and Soft Computing  
A time-dimensional shipbuilding information security sharing scheme based on an alliance chain is proposed to solve this problem.  ...  The scheme in this paper carries out theoretical analysis from three aspects of correctness, security and performance.  ...  Therefore, this article aims at the information encryption processing of the alliance chain and proposes a blockchain-based shipbuilding information security sharing scheme for the current innovation and  ... 
doi:10.32604/iasc.2022.026934 fatcat:wpjtbvdez5c3znqgcqaebowwsq

Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication

Mohamed EL GHAZOUANI, Moulay Ahmed EL KIRAM, Latifa Er-Rajy
2022 International Journal of Communication Networks and Information Security  
Therefore, this paper proposed an efficient, reliable and secure approach, in which the authors propose a Multi-Agent System in order to manipulate deduplication technique that permits to reduce data volumes  ...  Blockchain data structure and the efficient data deduplication represent possible solutions to address these exigencies.  ...  The authors have demonstrated the feasibility of using the Multi-agent System and Blockchain technologies to manage deduplication and auditing processes through the description of their proposed model.  ... 
doi:10.17762/ijcnis.v11i1.3880 fatcat:q6iy4ygu2bhhfl3zygqmds4e3a

Blockchain-based fair payment protocol for deduplication cloud storage system

Shangping Wang, Yuying Wang, Yaling Zhang
2019 IEEE Access  
Fair payment is one of key issues in the cloud deduplication storage system. At present, a variety of secure deduplication encryption schemes have been designed to protect the privacy of client data.  ...  Faced with this problem, in this paper, we propose a new decentralized fair payment protocol for cloud deduplication storage system by utilizing ethereum blockchain technology.  ...  SYSTEM MODEL AND SECURITY REQUIREMENTS Our scheme is improved on the cloud deduplication system [21] .  ... 
doi:10.1109/access.2019.2939492 fatcat:3wiogs6tzjemrdowcvu656pqc4

Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud

Mohamed El Ghazouani, My Ahmed El kiram, ER-RAJY Latifa, Yassine El Khanboubi
2020 International Journal of Interactive Multimedia and Artificial Intelligence  
The security of blockchain technology is enforced in a distributed and public way rather than relying on a central party to do so, as is the case for other databases.  ...  They thus presented a secure and efficient identity-based public auditing scheme using the RSA algorithm for cloud storage [14] . Lee et al.  ...  His research interests include Computer Network Security, Mobile and Wireless Communication Security.  ... 
doi:10.9781/ijimai.2020.08.001 fatcat:5kixwed37bempfpfqmv63kibee

Consensus Mechanism of Blockchain Based on PoR with Data Deduplication

Wei Zhou, Hao Wang, Ghulam Mohiuddin, Dan Chen, Yongjun Ren
2022 Intelligent Automation and Soft Computing  
In addition, the scheme uses ring signatures in the audit process to ensure user anonymity and data unlinkability, while providing highly reliable data storage, and ensuring data storage security through  ...  To this end, we propose to use the Proof of Retrievability with deduplication algorithm as the consensus mechanism of the blockchain system and design a blockchain consensus protocol suitable for distributed  ...  To enhance security and privacy protection, our proposed distributed storage scheme should satisfy validity, unforgeability and privacy protection.  ... 
doi:10.32604/iasc.2022.029657 fatcat:k3r47myyzrbmxmbe3g3nr6tgq4

2020 Index IEEE Transactions on Services Computing Vol. 13

2021 IEEE Transactions on Services Computing  
-Dec. 2020 1142-1151 Secure and Efficient Cloud Data Deduplication with Ownership Manage- ment. Jiang, S., +, TSC Nov.  ...  Cheng, L., +, TSC March-April 2020 368-380 Secure and Efficient Cloud Data Deduplication with Ownership Management. Jiang, S., +, TSC Nov.  ... 
doi:10.1109/tsc.2021.3055723 fatcat:eumbihmezvehxdfbmlp6ufzkwe

An extensive research survey on data integrity and deduplication towards privacy in cloud storage

Anil Kumar G., Shantala C. P.
2020 International Journal of Electrical and Computer Engineering (IJECE)  
The prime reason is that existing approaches of data privacy doesn't offer data integrity and secure data deduplication process at the same time, which is highly essential to ensure a higher degree of  ...  Owing to the highly distributed nature of the cloud storage system, it is one of the challenging tasks to incorporate a higher degree of security towards the vulnerable data.  ...  Auditing scheme can also be enhanced by using messaging factor as well blockchain.  ... 
doi:10.11591/ijece.v10i2.pp2011-2022 fatcat:n4u7snnterbcnltu5re3ey3v2e

Design scheme for copyright management system using Blockchain and IPFS

Ali Muwafaq Alchaqmaqchee, Saad Najim Alsaad
2021 International Journal of Computing and Digital Systems  
Blockchain technology evolvement has very changed the network that makes numerous applications become distributed and decentralized without loss of security.  ...  In this paper, a schema of copyright digital management system is designed based on blockchain, Inter Planetary File System (IPFS) and Perceptual hash image.  ...  SCHEME METHODOLOGY In this paper, a decentralized storage system is proposed based on the Blockchain technology and IPFS to store copyright information securely and to provide timestamp authentication.  ... 
doi:10.12785/ijcds/100159 fatcat:cuo44gzcurdl3nav4oa3xz526i

Table of Contents

2022 IEEE Transactions on Industrial Informatics  
Ge 2641 SPECIAL SECTION ON RELIABILITY AND SECURITY FOR INTELLIGENT WIRELESS SENSING AND CONTROL SYSTEMS Guest Editorial: Reliability and Security for Intelligent Wireless Sensing and Control Systems .  ...  Wang 2762 A Blockchain-Based Two-Stage Secure Spectrum Intelligent Sensing and Sharing Auction Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tii.2021.3136014 fatcat:a363pcbw5jfi3meuxcsfjgtwjq

Building Secure Clouds by Perpetual Auditing using Blockchain Technology.pdf

Balamurugan N
2020 Figshare  
Also, by implementing the blockchain technology, the user's data will be split into blocks and stored in different servers which makes the data more secure.  ...  But due to security and privacy concerns about the dependability of their CSP, consumers of Cloud service are irresolute to select cloud services.  ...  It is an effective and privacy-preserving auditing protocol [1] [2] . The Fog-assisted secure data deduplication scheme used to hide the user's identities during data collection. IV.  ... 
doi:10.6084/m9.figshare.12206003.v1 fatcat:kxffoal6erfqzplklt6ud4dkkq

BPS: Blockchain Based Decentralized Secure and Versatile Light Payment System

Shahed Ahamed, Moontaha Siddika, Saiful Islam, SadiaSaima Anika, Anika Anjum, Milon Biswas
2021 Asian Journal of Research in Computer Science  
Once accomplishedthe security of the transaction can no longer be guaranteed.  ...  Consumers along with vendorscan see the whole transaction date, time and everythingthatthey dealtwith when the transaction was held.  ...  DCAP: A secure and efficient decentralized conditional anonymous payment system based on blockchain.  ... 
doi:10.9734/ajrcos/2021/v8i430206 fatcat:txmz4v3r4nb2pllzsjs4mksxay

An Efficient Data Sharing Scheme for Privacy Protection Based on Blockchain and Edge Intelligence in 6G-VANET

Zhihua Wang, Yingheng Xu, Jiahao Liu, ZhenYu Li, Zeminghui Li, Hongyong Jia, Dinghua Wang, Zhaolong Ning
2022 Wireless Communications and Mobile Computing  
However, reliable transmission and secure storage of data have always been a great challenge in data sharing.  ...  The effectiveness of the proposed scheme is demonstrated by security analysis and experimental evaluation.  ...  Therefore, data sharing based on blockchain is a feasible solution to ensure reliable collection and secure data storage.  ... 
doi:10.1155/2022/5031112 fatcat:hgufcevhfzdtfo6ctmc4mdzfe4

Centralization of Big Data Using Distributed Computing Approach in IoT

Bishoy Sawiris, Helwan University, Sayed El-Gaber, Manal Abdel-Fattah, Helwan University, Helwan University
2021 International Journal of Intelligent Engineering and Systems  
Blockchain Based Secure Centralized Big Data model using distributed computing approach.  ...  These credentials are saved in Blockchain Security Entity for authentication verification.  ...  A distributed deduplication scheme is presented in [26] for big data in cloud environment. First, the client partitions the data and collects the fingerprints.  ... 
doi:10.22266/ijies2021.0831.35 fatcat:ipz463cj35bvreu7sjl6nhd4dy

UIDAI Aadhar Enrollment with P2P Blockchain Technologies

A blockchain-based Aadhaar would help UIDAI in truly complying with the data protection and privacy stipulations outlined in the Right to Privacy Act judgment  ...  Blockchain technologies are becoming more popular in securing the sensitive data such as government holding citizens' s wealth, health and personal information.  ...  Security The data in the distributed ledger is encrypted and hence cannot be read by unauthorized persons. Whereas, in the traditional RDBMS, the data is not encrypted.  ... 
doi:10.35940/ijitee.b1025.1292s19 fatcat:msbjrwpb6nffpjehoi5yq46na4

Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing

Yinghui Zhang, Haonan Su, Menglei Yang, Dong Zheng, Fang Ren, Qinglan Zhao
2018 Security and Communication Networks  
Our security analysis shows that the proposed schemes are secure against offline brute-force dictionary attacks. In addition, the random tag makes the second scheme more reliable.  ...  In this paper, we propose two secure data deduplication schemes based on Rabin fingerprinting over wireless sensing data in cloud computing.  ...  The first scheme is based on deterministic tags and the other one adopts random tags. Note that the randomized tag achieves more reliable security guarantees than the deterministic tag.  ... 
doi:10.1155/2018/9081814 fatcat:duj7j6xyynegplepxloetmvsyq
« Previous Showing results 1 — 15 out of 137 results