A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Data Sharing of Shipbuilding Information Based on Blockchain
2022
Intelligent Automation and Soft Computing
A time-dimensional shipbuilding information security sharing scheme based on an alliance chain is proposed to solve this problem. ...
The scheme in this paper carries out theoretical analysis from three aspects of correctness, security and performance. ...
Therefore, this article aims at the information encryption processing of the alliance chain and proposes a blockchain-based shipbuilding information security sharing scheme for the current innovation and ...
doi:10.32604/iasc.2022.026934
fatcat:wpjtbvdez5c3znqgcqaebowwsq
Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication
2022
International Journal of Communication Networks and Information Security
Therefore, this paper proposed an efficient, reliable and secure approach, in which the authors propose a Multi-Agent System in order to manipulate deduplication technique that permits to reduce data volumes ...
Blockchain data structure and the efficient data deduplication represent possible solutions to address these exigencies. ...
The authors have demonstrated the feasibility of using the Multi-agent System and Blockchain technologies to manage deduplication and auditing processes through the description of their proposed model. ...
doi:10.17762/ijcnis.v11i1.3880
fatcat:q6iy4ygu2bhhfl3zygqmds4e3a
Blockchain-based fair payment protocol for deduplication cloud storage system
2019
IEEE Access
Fair payment is one of key issues in the cloud deduplication storage system. At present, a variety of secure deduplication encryption schemes have been designed to protect the privacy of client data. ...
Faced with this problem, in this paper, we propose a new decentralized fair payment protocol for cloud deduplication storage system by utilizing ethereum blockchain technology. ...
SYSTEM MODEL AND SECURITY REQUIREMENTS Our scheme is improved on the cloud deduplication system [21] . ...
doi:10.1109/access.2019.2939492
fatcat:3wiogs6tzjemrdowcvu656pqc4
Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud
2020
International Journal of Interactive Multimedia and Artificial Intelligence
The security of blockchain technology is enforced in a distributed and public way rather than relying on a central party to do so, as is the case for other databases. ...
They thus presented a secure and efficient identity-based public auditing scheme using the RSA algorithm for cloud storage [14] . Lee et al. ...
His research interests include Computer Network Security, Mobile and Wireless Communication Security. ...
doi:10.9781/ijimai.2020.08.001
fatcat:5kixwed37bempfpfqmv63kibee
Consensus Mechanism of Blockchain Based on PoR with Data Deduplication
2022
Intelligent Automation and Soft Computing
In addition, the scheme uses ring signatures in the audit process to ensure user anonymity and data unlinkability, while providing highly reliable data storage, and ensuring data storage security through ...
To this end, we propose to use the Proof of Retrievability with deduplication algorithm as the consensus mechanism of the blockchain system and design a blockchain consensus protocol suitable for distributed ...
To enhance security and privacy protection, our proposed distributed storage scheme should satisfy validity, unforgeability and privacy protection. ...
doi:10.32604/iasc.2022.029657
fatcat:k3r47myyzrbmxmbe3g3nr6tgq4
2020 Index IEEE Transactions on Services Computing Vol. 13
2021
IEEE Transactions on Services Computing
-Dec. 2020 1142-1151
Secure and Efficient Cloud Data Deduplication with Ownership Manage-
ment. Jiang, S., +, TSC Nov. ...
Cheng, L., +, TSC March-April 2020 368-380 Secure and Efficient Cloud Data Deduplication with Ownership Management. Jiang, S., +, TSC Nov. ...
doi:10.1109/tsc.2021.3055723
fatcat:eumbihmezvehxdfbmlp6ufzkwe
An extensive research survey on data integrity and deduplication towards privacy in cloud storage
2020
International Journal of Electrical and Computer Engineering (IJECE)
The prime reason is that existing approaches of data privacy doesn't offer data integrity and secure data deduplication process at the same time, which is highly essential to ensure a higher degree of ...
Owing to the highly distributed nature of the cloud storage system, it is one of the challenging tasks to incorporate a higher degree of security towards the vulnerable data. ...
Auditing scheme can also be enhanced by using messaging factor as well blockchain. ...
doi:10.11591/ijece.v10i2.pp2011-2022
fatcat:n4u7snnterbcnltu5re3ey3v2e
Design scheme for copyright management system using Blockchain and IPFS
2021
International Journal of Computing and Digital Systems
Blockchain technology evolvement has very changed the network that makes numerous applications become distributed and decentralized without loss of security. ...
In this paper, a schema of copyright digital management system is designed based on blockchain, Inter Planetary File System (IPFS) and Perceptual hash image. ...
SCHEME METHODOLOGY In this paper, a decentralized storage system is proposed based on the Blockchain technology and IPFS to store copyright information securely and to provide timestamp authentication. ...
doi:10.12785/ijcds/100159
fatcat:cuo44gzcurdl3nav4oa3xz526i
Table of Contents
2022
IEEE Transactions on Industrial Informatics
Ge 2641 SPECIAL SECTION ON RELIABILITY AND SECURITY FOR INTELLIGENT WIRELESS SENSING AND CONTROL SYSTEMS Guest Editorial: Reliability and Security for Intelligent Wireless Sensing and Control Systems . ...
Wang 2762 A Blockchain-Based Two-Stage Secure Spectrum Intelligent Sensing and Sharing Auction Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.1109/tii.2021.3136014
fatcat:a363pcbw5jfi3meuxcsfjgtwjq
Building Secure Clouds by Perpetual Auditing using Blockchain Technology.pdf
2020
Figshare
Also, by implementing the blockchain technology, the user's data will be split into blocks and stored in different servers which makes the data more secure. ...
But due to security and privacy concerns about the dependability of their CSP, consumers of Cloud service are irresolute to select cloud services. ...
It is an effective and privacy-preserving auditing protocol [1] [2] . The Fog-assisted secure data deduplication scheme used to hide the user's identities during data collection.
IV. ...
doi:10.6084/m9.figshare.12206003.v1
fatcat:kxffoal6erfqzplklt6ud4dkkq
BPS: Blockchain Based Decentralized Secure and Versatile Light Payment System
2021
Asian Journal of Research in Computer Science
Once accomplishedthe security of the transaction can no longer be guaranteed. ...
Consumers along with vendorscan see the whole transaction date, time and everythingthatthey dealtwith when the transaction was held. ...
DCAP: A secure and efficient decentralized conditional anonymous payment system based on blockchain. ...
doi:10.9734/ajrcos/2021/v8i430206
fatcat:txmz4v3r4nb2pllzsjs4mksxay
An Efficient Data Sharing Scheme for Privacy Protection Based on Blockchain and Edge Intelligence in 6G-VANET
2022
Wireless Communications and Mobile Computing
However, reliable transmission and secure storage of data have always been a great challenge in data sharing. ...
The effectiveness of the proposed scheme is demonstrated by security analysis and experimental evaluation. ...
Therefore, data sharing based on blockchain is a feasible solution to ensure reliable collection and secure data storage. ...
doi:10.1155/2022/5031112
fatcat:hgufcevhfzdtfo6ctmc4mdzfe4
Centralization of Big Data Using Distributed Computing Approach in IoT
2021
International Journal of Intelligent Engineering and Systems
Blockchain Based Secure Centralized Big Data model using distributed computing approach. ...
These credentials are saved in Blockchain Security Entity for authentication verification. ...
A distributed deduplication scheme is presented in [26] for big data in cloud environment. First, the client partitions the data and collects the fingerprints. ...
doi:10.22266/ijies2021.0831.35
fatcat:ipz463cj35bvreu7sjl6nhd4dy
UIDAI Aadhar Enrollment with P2P Blockchain Technologies
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
A blockchain-based Aadhaar would help UIDAI in truly complying with the data protection and privacy stipulations outlined in the Right to Privacy Act judgment ...
Blockchain technologies are becoming more popular in securing the sensitive data such as government holding citizens' s wealth, health and personal information. ...
Security The data in the distributed ledger is encrypted and hence cannot be read by unauthorized persons. Whereas, in the traditional RDBMS, the data is not encrypted. ...
doi:10.35940/ijitee.b1025.1292s19
fatcat:msbjrwpb6nffpjehoi5yq46na4
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing
2018
Security and Communication Networks
Our security analysis shows that the proposed schemes are secure against offline brute-force dictionary attacks. In addition, the random tag makes the second scheme more reliable. ...
In this paper, we propose two secure data deduplication schemes based on Rabin fingerprinting over wireless sensing data in cloud computing. ...
The first scheme is based on deterministic tags and the other one adopts random tags. Note that the randomized tag achieves more reliable security guarantees than the deterministic tag. ...
doi:10.1155/2018/9081814
fatcat:duj7j6xyynegplepxloetmvsyq
« Previous
Showing results 1 — 15 out of 137 results