Lecture notes in networks and systems, Journal Year: 2022, Volume and Issue: unknown, P. 251 - 266
Published: Jan. 1, 2022
Language: Английский
Lecture notes in networks and systems, Journal Year: 2022, Volume and Issue: unknown, P. 251 - 266
Published: Jan. 1, 2022
Language: Английский
Journal of Grid Computing, Journal Year: 2024, Volume and Issue: 22(1)
Published: Jan. 20, 2024
Language: Английский
Citations
10Journal of Parallel and Distributed Computing, Journal Year: 2018, Volume and Issue: 123, P. 204 - 214
Published: Oct. 9, 2018
Language: Английский
Citations
71IEEE Access, Journal Year: 2019, Volume and Issue: 7, P. 51817 - 51826
Published: Jan. 1, 2019
The traditional food supervision system has problems such as lack of industry chain and data fragmentation, which caused the phenomenon field regulation to be uncomprehensive in existing regulatory disposal response lag. Combining characteristics blockchain distribution, transparent, collegiality with actual needs regional autonomy, we propose hierarchical multi-domain (HMDBC) network structure secondary-check mechanism, can support timely correction replacement malicious nodes by co-governance, auxiliary verification nodes, arbitration superior regions. In order optimize election, proposed fuzzy comprehensive evaluation model credibility, used objectively fairly evaluate reputation each node that region considering various influencing factors performance indicators. Furthermore, designed block model, supervisor replacement. Our perform automatic quality detection warning substandard entire industrial chain, use smart contracts combined standards. Finally, comparing complexity PBFT consortium, our is more secure, lower broadcast complexity.
Language: Английский
Citations
69IEEE Internet of Things Journal, Journal Year: 2020, Volume and Issue: 7(10), P. 10171 - 10188
Published: March 16, 2020
Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality, integrity, and availability violations. The loss information, denial access, information leakage, collusion, technical failures, data security breaches are difficult to predict anticipate in advance. These types nonstationarity one the main issues design reliable IoT infrastructure capable mitigating their consequences. It is not sufficient propose solutions for given scenario, but mechanisms adapt current solution changes environment. In this article, we present multicloud storage architecture called WA-MRC-RRNS that combines weighted access scheme, threshold secret sharing, redundant residue number system multiple failure detection/recovery homomorphic ciphers. We provide theoretical analysis probability loss, redundancy, speed encoding/decoding, show how dynamically configure parameters cope different objective preferences, workloads, cloud properties. multiobjective optimization mechanism adjust encryption-decryption speed, probability. Comprehensive experimental real shows our approach provides secure way mitigate uncertainty use untrusted infrastructure.
Language: Английский
Citations
51Computers, Journal Year: 2023, Volume and Issue: 12(2), P. 46 - 46
Published: Feb. 20, 2023
The pervasiveness of healthcare data to create better facilities and opportunities is one the most-imperative parts human life that offers radical advancements in services practiced through blockchain-based management, analysis, storage, sharing health-related big data. Researchers can accelerate challenges developing a secure, scalable, accessible dynamic infrastructure by extensive exchange required individual microservices privacy-preserving health management ledgers Healthcare Industry 4.0. Conducting secure platforms primitive cryptographic algorithms risky be serious concern as need authenticate store sensitive automatically are increasingly high. To achieve interoperability, security, efficiency, scalability, availability, accountability among providers heterogeneous networks, this paper proposes blockchain-enabled decentralized, trustworthy platform industry. In healthcare-chain system, blockchain provides an appreciated environment for ledger hash processing, which updates high storage immutability, authentication functionality with integrated attribute signature accessing prescribed block This article describes new retention design, evidence collection, evaluation mechanism integrity–confidentiality–availability enforce access control policies transactions microservices. scheme revealed optimal performance terms mining size, average response time, transaction latency, throughput secured networks.
Language: Английский
Citations
17Sensors, Journal Year: 2020, Volume and Issue: 20(21), P. 6267 - 6267
Published: Nov. 3, 2020
The health industry is one of the most auspicious domains for application Internet Things (IoT) based technologies. Lots studies have been carried out in field to minimize use resources and increase efficiency. IoT combined with other technologies has brought quality advancement sector at minimum expense. One such technology wireless body area networks (WBANs), which will help patients incredibly future make them more productive because there be no need staying home or a hospital long time. WBANs an integrated as WBANs, like any application, are collection heterogeneous sensor-based devices. For better amalgamation several hindrances blocking their integration addressed. problem efficient routing data limited resource sensor nodes (SNs) WBANs. To solve this problems, transmission duplicate sensed data, network lifetime, etc., energy harvested cooperative-enabled protocol (EHCRP) IoT-WBANs proposed. proposed considers multiple parameters residual SNs, number hops towards sink, node congestion levels, signal-to-noise ratio (SNR) available bandwidth. A path cost estimation function calculated select forwarder using these parameters. Due path-cost process, mechanism achieves effective multi-hop improves reliability efficiency over network. After extensive simulations, achieved results compared state-of-the-art techniques, i.e., E-HARP, EB-MADM, PCRP EERP. show significant improvement throughout, end-to-end delay.
Language: Английский
Citations
34Algorithms, Journal Year: 2022, Volume and Issue: 15(6), P. 205 - 205
Published: June 13, 2022
Combinatorial optimization problems (COPs) are a class of NP-hard with great practical significance. Traditional approaches for COPs suffer from high computational time and reliance on expert knowledge, machine learning (ML) methods, as powerful tools have been used to overcome these problems. In this review, the in energy areas series modern ML approaches, i.e., interdisciplinary COPs, areas, mainly investigated. Recent works solving using sorted out firstly by methods which include supervised (SL), deep (DL), reinforcement (RL) recently proposed game theoretic then where timeline improvements some fundamental is layout. Practical applications including petroleum supply chain, steel-making, electric power system wind power, summarized first time, challenges field analyzed.
Language: Английский
Citations
20Electronics, Journal Year: 2018, Volume and Issue: 7(12), P. 389 - 389
Published: Dec. 4, 2018
With the increasing size of cloud data centers, number users and virtual machines (VMs) increases rapidly. The requests are entertained by VMs residing on physical servers. dramatic growth internet services results in unbalanced network resources. Resource management is an important factor for performance a cloud. Various techniques used to manage resources efficiently. VM-consolidation intelligent efficient strategy balance load centers. VM-placement subproblem problem that needs be resolved. basic objective minimize utilization rate (PMs). save energy cost. An enhanced levy-based particle swarm optimization algorithm with variable sized bin packing (PSOLBP) proposed solving problem. Moreover, best-fit also (VSBPP). Simulations done authenticate adaptivity algorithm. Three algorithms implemented Matlab. given compared simple (PSO) hybrid levy flight (LFPSO). efficiently minimized running PMs. NP-hard problem, however, outperformed other two algorithms.
Language: Английский
Citations
37Mathematical Problems in Engineering, Journal Year: 2022, Volume and Issue: 2022, P. 1 - 11
Published: Jan. 30, 2022
Cloud computing provides unprecedented advantages of using resources with very less efforts and cost. The energy utilization in cloud data centers has forced the service providers to raise expense its services increased carbon footprints environment. Many static bin-packing algorithms exist which can reduce by some percentage, but new era digitization, advanced dynamic techniques are required serve heterogeneous users random users’ requests. Thus, this paper, two best-fit decreasing-based proposed wherein first technique is for focuses on increasing server second approach acts as a switcher harness best results among all algorithms. Both deliberately achieve high performance terms total consumption, resource utilization, makespan along serving continuous varying requests from customers. simulations performed Java. exhibited that DEE-BFD escalate 96% EM consumption 49% 56%.
Language: Английский
Citations
18Future Generation Computer Systems, Journal Year: 2019, Volume and Issue: 99, P. 356 - 364
Published: April 30, 2019
Language: Английский
Citations
28