ICST Transactions on Scalable Information Systems,
Journal Year:
2018,
Volume and Issue:
unknown, P. 173161 - 173161
Published: July 13, 2018
By
using
the
traditional
methods,
feature
information
extracted
from
vehicle
target
detection
is
insufficient,
which
leads
to
low
accuracy
in
identifying
small
vehicles
or
blocked
targets.
Therefore,
we
propose
a
region
proposal
network
(RPN)
based
on
context
fus
IEEE Access,
Journal Year:
2022,
Volume and Issue:
10, P. 122679 - 122695
Published: Jan. 1, 2022
With
the
rapid
enhancement
in
design
and
development
of
Internet
Things
creates
a
new
research
interest
adaptation
industrial
domains.
It
is
due
to
impact
distributed
emerging
technology
topology
security-related
resource
constraints
5.0.
This
conducts
paradigm
along
with
critical
challenges
existing
information
preservation,
node
transactions
communication,
transmission,
trust
privacy,
security
protection
related
problems.
These
aspects
pose
serious
limitations
issues
for
industry
provide
data
integrity,
exchange
reliability,
provenance,
trustworthiness
overall
activities
service
delivery
prospects.
In
addition,
intersection
blockchain
IoT
has
gained
more
consideration
interest.
However,
there
an
limitation
between
inadequate
performance
connected
nodes,
high
requirement
permissioned
private
ledger
not
yet
been
tackled
complete
solution.
Due
introductions
NuCypher
Re-Encryption
infrastructure,
hashing
tree
allocation,
deployment
proof-of-work
required
computational
power
as
well.
paper
divided
into
three
different
folds;
first,
we
studied
various
literature
blockchain-enabling
its
implementation
challenging
Secondly,
proposed
hyperledger
sawtooth-enabled
framework.
framework
provides
secure
trusted
execution
environment,
which
mechanisms
protocols
are
designed
acknowledgment,
including
immutable
storage
security,
peer-to-peer
network
on-chain
off-chain
communication
activities.
Thirdly,
pseudo-chain
codes
consensus
smooth
streamline
broadcast
content.
The
multiple
investigated
simulated
using
Hyperledger
Sawtooth-enabled
docker
testing
devices
within
limited
usage
constraints.
IEEE Access,
Journal Year:
2022,
Volume and Issue:
10, P. 78887 - 78898
Published: Jan. 1, 2022
Owing
to
the
sensitive
nature
of
healthcare
data,
aforementioned
approach
transferring
patient
data
central
servers
creates
serious
security
and
privacy
issues.
In
addition,
blockchain
distributed
ledger
technology
has
introduced
immutable
storage
decentralized
management
capability,
which
handles
a
large
number
nodes
E-Healthcare
transactions
via
serverless
network,
but
in
limited
manner
because
blockchain-enabled
resources.
this
scenario,
medical
industries
are
concerned
about
constituting
an
innovation
health
information
preservation
exchanging
service
delivery
protocols
without
connectivity
untrusted
third-party
infrastructure.
study,
we
proposed
hyperledger
fabric-enabled
consortium
architecture
called
BIoMT,
provides
security,
integrity,
transparency,
provenance
health-related
exchanges
clinical
peer-to-peer
(P2P)
secure
network
environment.
A
consensus
is
designed
created
reduce
rate
resource
constraints
on
Internet
Medical
Things
(IoMT).
The
individual
before
sharing
protected
using
NuCypher
Re-Encryption
mechanism,
increases
integrity
transparency.
Smart
contracts
deployed
automate
device
registration,
exchange
transactions,
(filecoin)
after
cross
verification
validation.
experimental
results
show
that
BIoMT
reduces
computational
cost
by
26.13%,
robust
node
generation
60.37%.
Thus,
only
31.79%
74.21%
IoMT-related
P2P
usage
maintained
saved,
respectively.
IEEE Sensors Journal,
Journal Year:
2023,
Volume and Issue:
23(20), P. 25144 - 25151
Published: May 11, 2023
The
industrial
Internet
of
Things
(IIoT)
has
gained
more
attention
because
the
self-governing
nature
system
configuration
with
interoperable
application
connectivity.
In
E-healthcare
environment,
it
cooperates
medical
sensors
to
capture,
examine,
analyze,
preserve,
and
document
day-to-day
transactions
patients
in
real-time.
integration
IIoT
provides
an
analytical
platform
handle
a
large
amount
data
low
cost
cloud-enabling
scalable
storage.
Throughout
transformation,
patients'
personal
information
is
at
risk
while
exchanging
records
over
centralized
server-based
systems.
Thus,
rate
node
connectivity,
failure
parallel
sharing,
deliverance-related
issues
increase.
this
article,
we
present
solutions
three
folds.
First,
article
proposes
novel
secure
architecture
for
security
using
blockchain-distributed
ledger
technology
named
BHIIoT.
Second,
transformation
lifecycle
wireless
sensor
networks
(WSNs)
management
optimization
distributed
layered
hierarchy
developed,
which
enhances
network
resources
increases
trust
blockchain-enabled
peer-to-peer
(P2P)
environment.
Third,
proposed
BHIIoT
uses
NuCypher
threshold
re-encryption
mechanism
encryption
protects
shared
form
blocks
preserved
blockchain
immutable
For
instance,
chain
codes
are
deployed
automate
authentication,
logging,
index
deliverance,
trace
resist
illegal
activities
application.
customized
lightweight
multi-proof-of-work
(PoW)
multi-proof-of-stake
(PoS)
designed
digital
signature
improving
consumption
reducing
load
storage
transaction
process
scheduled.
Electronics,
Journal Year:
2021,
Volume and Issue:
10(24), P. 3083 - 3083
Published: Dec. 10, 2021
Quality-of-service
(QoS)
is
the
term
used
to
evaluate
overall
performance
of
a
service.
In
healthcare
applications,
efficient
computation
QoS
one
mandatory
requirements
during
processing
medical
records
through
smart
measurement
methods.
Medical
services
often
involve
transmission
demanding
information.
Thus,
there
are
stringent
for
secure,
intelligent,
public-network
quality-of-service.
This
paper
contributes
three
different
aspects.
First,
we
propose
novel
metaheuristic
approach
cost-efficient
task
schedules,
where
an
intelligent
scheduler
manages
tasks,
such
as
rate
service
schedule,
and
lists
items
utilized
by
users
data
fog
node.
Second,
efficient-computation
algorithm,
which
effectively
monitors
according
indicator
(parameter)
with
analysis
mechanism
quality-of-experience
(QoE),
has
been
developed.
Third,
framework
blockchain-distributed
technology-enabled
(QoS-ledger)
in
applications
proposed
permissionless
public
peer-to-peer
(P2P)
network,
stores
processed
information
distributed
ledger.
We
have
designed
deployed
contracts
secure
medical-data
serverless
peering
networks
handled
node-protected
interactions
preserved
logs
blockchain
The
simulation
result
shows
that
computed
on
network
power
=
average
−10
−17
dBm,
jitter
34
ms,
delay
87
95
throughput
185
bytes,
duty
cycle
8%,
route
delivery
response
back
variable.
QoS-ledger
potential
candidate
quality-of-service
not
limited
e-healthcare
applications.
Alexandria Engineering Journal,
Journal Year:
2022,
Volume and Issue:
64, P. 749 - 760
Published: Nov. 2, 2022
Rapid
development
and
massive
use
of
Information
Technology
(IT)
have
since
produced
a
amount
electronic
data.
In
tandem,
the
demand
for
data
outsourcing
associated
security
is
increasing
exponentially.
Small
organizations
are
often
finding
it
expensive
to
save
process
their
huge
data,
keep
secure
from
unauthorized
access.
Cloud
computing
suitable
affordable
platform
provide
services
on
user
demand.
The
cloud
preferable
used
by
individuals,
Small,
Medium
Enterprises
(SMEs)
that
cannot
afford
large-scale
hardware,
software,
maintenance
cost.
Storage
processing
big
in
becoming
key
appealing
features
SMEs
individuals.
However,
facing
two
issues
such
as
stored
system
overload
due
volume
These
storage
methods
plain
text
encrypted
storage.
Both
strengths
limitations.
fundamental
issue
high
risk
breaches;
whereas,
storage,
encryption
complete
file
may
cause
overload.
This
paper
propose
feasible
solution
address
these
with
new
service
model
called
Confidentiality-based
Classification-as-a-Service
(C2aaS)
performs
treating
dynamically
according
level
preparation
storing
cloud.
comparison
conventional
methods,
our
proposed
strongly
showing
good
confidential
proficient
reducing
overloading.
Applied Sciences,
Journal Year:
2022,
Volume and Issue:
12(3), P. 1487 - 1487
Published: Jan. 29, 2022
Distributed
forecasting
of
agriculture
commodity
prices
has
an
attractive
research
perspective
that
delivers
active
breakthrough
analysis
the
rapid
fluctuations
in
pricing
forecasts
for
participating
stakeholders
without
being
manually
dispatched
lists.
The
increased
use
efficient
mechanism
information
management
generated
records
and
processing
creates
emerging
challenges
limitations.
These
include
new
government
mandates
regulations,
price
land
expansion,
growing
demand
commodities,
global
financial
market,
food
security,
bio-based
fuels.
Building
deploying
distributed
dynamic
scheduling,
management,
monitoring
systems
agricultural
activities
supply
chains
require
a
significant
secure
approach.
Thus,
this
paper
discusses
collaborative
approach
where
two
different
folds
are
demonstrated
to
cover
distinct
aspects
with
objectives.
A
metaheuristic-enabled
genetic
algorithm
is
designed
receive
day-to-day
production
details
process
analyze
forecast
from
by
managing,
them
real-time.
blockchain
hyperledger
sawtooth
modular
technology
provides
communication
channel
between
stakeholders,
private
network,
protects
ledger,
adds
updates
prices,
preserves
node
transactions
immutable
ledger
(IPFS).
To
accomplish
this,
we
design,
develop,
deploy
smart
contracts
register
system’s
actual
allow
addition
exchanges.
second
contract
distributes
it
while
preserving
detailed
addresses
storage.
simulation
results
proposed
deliver
E-agriculture
accuracy
95.3%.
It
also
maintains
transparency,
integrity,
provenance,
availability,
operational
control
access
activities.
Applied Sciences,
Journal Year:
2022,
Volume and Issue:
12(5), P. 2534 - 2534
Published: Feb. 28, 2022
This
paper
proposes
a
novel
and
secure
blockchain
hyperledger
sawtooth-enabled
consortium
analytical
model
for
smart
educational
accreditation
credential
evaluation.
Indeed,
candidate
academic
credentials
are
generated,
verified,
validated
by
the
universities
transmitted
to
Higher
Education
Department
(HED).
The
objective
is
enable
procedure
of
verification
analyze
tamper-proof
forged
records
before
validation.
For
this
reason,
we
designed
created
an
investigate
individual
collected
from
examine
candidates’
credibility
using
machine
learning
techniques
maintain
all
these
aspects
analysis
addresses
in
distributed
storage
with
hash-encryption
(SHA-256)
network,
which
runs
on
peer-to-peer
(P2P)
structure.
In
proposed
model,
deployed
mechanism
examiner
analyst
processes
protection
criteria,
referred
as
chaincodes
or
contracts.
These
automate
schedule,
generation,
verification,
validation,
monitoring
overall
nodes’
transactions.
include
registration
associated
university
(candidateReg()),
certificate-related
update
(CIssuanceTrans()),
every
node’s
transactions
preservation
immutable
(ULedgerAV())
further
investigations.
simulates
benchmark
dataset.
result
shows
merit
our
model.
Through
extensive
simulations,
blockchain-enabled
provides
robust
performance
terms
management
problems.
Wireless Communications and Mobile Computing,
Journal Year:
2022,
Volume and Issue:
2022, P. 1 - 14
Published: Sept. 21, 2022
This
paper
presents
a
layered
hierarchy
that
depicts
the
progressive
relationship
between
data,
information,
knowledge,
and
wisdom.
To
begin
with,
data
is
gathered
organized
into
information.
Information
gathered,
filtered,
refined,
put
through
an
investigation
process
to
create
knowledge.
Wisdom
attained
after
knowledge
discovery
of
filtration
aggregation
experience.
The
in
domain
e-healthcare
necessitates
higher
scheduling
costs
for
collection,
processing
wisdom,
management,
which
also
insecure
untrustworthy
medical
service.
industry
faces
difficult
problem
providing
collected
integrity,
information
reliability,
trustworthiness
service
relationships
face
increasing
number
day-to-day
records.
blockchain
consortium
hyperledger
(fabric)
has
been
used
this
act
as
bridge
bridges
gap
electronic
wisdom
(DIKW)
movement
processes
by
enabling
schedule
management
security
transparency.
For
privacy,
DIKW-ledger,
such
patients’
consultancy
availing
services,
personal
records,
appointments,
treatment
details,
other
health-related
transactions,
fabric-enabled
efficient
architecture
proposed.
proposed
creates
two
networks:
public
network
stakeholders
exchange
agree
on
specific
activities
before
being
preserved
distributed
storage
(read-only
record
registration)
private
complete
DIKW
management.
We
designed
created
smart
contracts
purpose,
well
use-case
diagrams
describe
overall
execution
process.
architectural
solution
provides
more
provenance,
procedures
immutably
preserve
ledger
permissioned
hash-encrypted
structure.