期刊文献+
共找到2,025篇文章
< 1 2 102 >
每页显示 20 50 100
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles 被引量:1
1
作者 Xiaoming Yuan Jiahui Chen +4 位作者 Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen 《Engineering》 SCIE EI CAS CSCD 2024年第2期178-189,共12页
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV. 展开更多
关键词 Knowledge sharing Internet of Vehicles Federated learning Broad learning Reconfigurable intelligent surfaces Resource allocation
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
2
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
Mutual Information Maximization via Joint Power Allocation in Integrated Sensing and Communications System
3
作者 Jia Zhu Junsheng Mu +1 位作者 Yuanhao Cui Xiaojun Jing 《China Communications》 SCIE CSCD 2024年第2期129-142,共14页
In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ... In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance. 展开更多
关键词 COEXISTENCE COMMUNICATIONS multicarrier radar mutual information spectrum sharing
下载PDF
Blockchain-Based MCS Detection Framework of Abnormal Spectrum Usage for Satellite Spectrum Sharing Scenario
4
作者 Ning Yang Heng Wang +3 位作者 Jingming Hu Bangning Zhang Daoxing Guo Yuan Liu 《China Communications》 SCIE CSCD 2024年第2期32-48,共17页
In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit... In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework. 展开更多
关键词 blockchain hypothesis test mobile crowdsensing satellite communication spectrum sharing
下载PDF
A Framework Based on the DAO and NFT in Blockchain for Electronic Document Sharing
5
作者 Lin Chen Jiaming Zhu +2 位作者 Yuting Xu Huanqin Zheng Shen Su 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2373-2395,共23页
In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright ... In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright infringements occur frequently due to the ease of copying,which not only infringes on the rights of creators but also weakens their creative enthusiasm.Therefore,it is crucial to establish an e-document sharing system that enforces copyright protection.However,the existing centralized system has outstanding vulnerabilities,and the plagiarism detection algorithm used cannot fully detect the context,semantics,style,and other factors of the text.Digital watermark technology is only used as a means of infringement tracing.This paper proposes a decentralized framework for e-document sharing based on decentralized autonomous organization(DAO)and non-fungible token(NFT)in blockchain.The use of blockchain as a distributed credit base resolves the vulnerabilities inherent in traditional centralized systems.The e-document evaluation and plagiarism detection mechanisms based on the DAO model effectively address challenges in comprehensive text information checks,thereby promoting the enhancement of e-document quality.The mechanism for protecting and circulating e-document copyrights using NFT technology ensures effective safeguarding of users’e-document copyrights and facilitates e-document sharing.Moreover,recognizing the security issues within the DAO governance mechanism,we introduce an innovative optimization solution.Through experimentation,we validate the enhanced security of the optimized governance mechanism,reducing manipulation risks by up to 51%.Additionally,by utilizing evolutionary game analysis to deduce the equilibrium strategies of the framework,we discovered that adjusting the reward and penalty parameters of the incentive mechanism motivates creators to generate superior quality and unique e-documents,while evaluators are more likely to engage in assessments. 展开更多
关键词 Electronic document sharing blockchain DAO NFT evolutionary game
下载PDF
FADSF:A Data Sharing Model for Intelligent Connected Vehicles Based on Blockchain Technology
6
作者 Yan Sun Caiyun Liu +1 位作者 Jun Li Yitong Liu 《Computers, Materials & Continua》 SCIE EI 2024年第8期2351-2362,共12页
With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is ... With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security. 展开更多
关键词 Blockchain connected vehicles data sharing smart contracts credible traceability
下载PDF
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
7
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing Internet of Things ORACLE
下载PDF
Blockchain-Enabled Federated Learning for Privacy-Preserving Non-IID Data Sharing in Industrial Internet
8
作者 Qiuyan Wang Haibing Dong +2 位作者 Yongfei Huang Zenglei Liu Yundong Gou 《Computers, Materials & Continua》 SCIE EI 2024年第8期1967-1983,共17页
Sharing data while protecting privacy in the industrial Internet is a significant challenge.Traditional machine learning methods require a combination of all data for training;however,this approach can be limited by d... Sharing data while protecting privacy in the industrial Internet is a significant challenge.Traditional machine learning methods require a combination of all data for training;however,this approach can be limited by data availability and privacy concerns.Federated learning(FL)has gained considerable attention because it allows for decentralized training on multiple local datasets.However,the training data collected by data providers are often non-independent and identically distributed(non-IID),resulting in poor FL performance.This paper proposes a privacy-preserving approach for sharing non-IID data in the industrial Internet using an FL approach based on blockchain technology.To overcome the problem of non-IID data leading to poor training accuracy,we propose dynamically updating the local model based on the divergence of the global and local models.This approach can significantly improve the accuracy of FL training when there is relatively large dispersion.In addition,we design a dynamic gradient clipping algorithm to alleviate the influence of noise on the model accuracy to reduce potential privacy leakage caused by sharing model parameters.Finally,we evaluate the performance of the proposed scheme using commonly used open-source image datasets.The simulation results demonstrate that our method can significantly enhance the accuracy while protecting privacy and maintaining efficiency,thereby providing a new solution to data-sharing and privacy-protection challenges in the industrial Internet. 展开更多
关键词 Federated learning data sharing non-IID data differential privacy blockchain
下载PDF
Starlet:Network defense resource allocation with multi-armed bandits for cloud-edge crowd sensing in IoT
9
作者 Hui Xia Ning Huang +2 位作者 Xuecai Feng Rui Zhang Chao Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第3期586-596,共11页
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense ... The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility. 展开更多
关键词 Internet of things Defense resource sharing Multi-armed bandits Defense resource allocation
下载PDF
Steering the energy sharing of electrons in nonsequential double ionization with orthogonally polarized two-color field
10
作者 樊光琦 杨志杰 +4 位作者 孙烽豪 郑金梅 韩云天 黄明谦 刘情操 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期248-252,共5页
Using the semiclassical ensemble model,the dependence of relative amplitude for the recollision dynamics in nonsequential double ionization(NSDI)of neon atom driven by the orthogonally polarized two-color field(OTC)la... Using the semiclassical ensemble model,the dependence of relative amplitude for the recollision dynamics in nonsequential double ionization(NSDI)of neon atom driven by the orthogonally polarized two-color field(OTC)laser field is theoretically studied.And the dynamics in two typical collision pathways,recollision-impact-ionization(RII)and recollisionexcitation with subsequent ionization(RESI),is systematically explored.Our results reveal that the V-shaped structure in the correlated momentum distribution is mainly caused by the RII mechanism when the relative amplitude of the OTC laser field is zero,and the first ionized electrons will quickly skim through the nucleus and share few energy with the second electron.As the relative amplitude increases,the V-shaped structure gradually disappears and electrons are concentrated on the diagonal in the electron correlation spectrum,indicating that the energy sharing after electrons collision is symmetric for OTC laser fields with large relative amplitudes.Our studies show that changing the relative amplitude of the OTC laser field can efficiently control the electron–electron collisions and energy exchange efficiency in the NSDI process. 展开更多
关键词 nonsequential double ionization correlated electron–electron momentum distribution energy sharing of electrons orthogonally polarized two-color field laser field semiclassical ensemble models
下载PDF
Development of a Decision Aid for Family Surrogate Decision Makers of Critically Ill Patients Requiring Renal Replacement Therapy in ICU:A User-Centered Design for Rapid Prototyping
11
作者 Miao Zheng Yong-Hui Zhang +2 位作者 Ying Cao Chang-Lin Yin Li-Hua Wang 《Chinese Medical Sciences Journal》 CAS CSCD 2024年第2期91-101,共11页
Objectives Renal replacement therapy(RRT)is increasingly adopted for critically ill patients diagnosed with acute kidney injury,but the optimal time for initiation remains unclear and prognosis is uncertain,leading to... Objectives Renal replacement therapy(RRT)is increasingly adopted for critically ill patients diagnosed with acute kidney injury,but the optimal time for initiation remains unclear and prognosis is uncertain,leading to medical complexity,ethical conflicts,and decision dilemmas in intensive care unit(ICU)settings.This study aimed to develop a decision aid(DA)for the family surrogate of critically ill patients to support their engagement in shared decision-making process with clinicians.Methods Development of DA employed a systematic process with user-centered design(UCD)principle,which included:(i)competitive analysis:searched,screened,and assessed the existing DAs to gather insights for design strategies,developmental techniques,and functionalities;(ii)user needs assessment:interviewed family surrogates in our hospital to explore target user group's decision-making experience and identify their unmet needs;(iii)evidence syntheses:integrate latest clinical evidence and pertinent information to inform the content development of DA.Results The competitive analysis included 16 relevant DAs,from which we derived valuable insights using existing resources.User decision needs were explored among a cohort of 15 family surrogates,revealing four thematic issues in decision-making,including stuck into dilemmas,sense of uncertainty,limited capacity,and delayed decision confirmation.A total of 27 articles were included for evidence syntheses.Relevant decision making knowledge on disease and treatment,as delineated in the literature sourced from decision support system or clinical guidelines,were formatted as the foundational knowledge base.Twenty-one items of evidence were extracted and integrated into the content panels of benefits and risks of RRT,possible outcomes,and reasons to choose.The DA was drafted into a web-based phototype using the elements of UCD.This platform could guide users in their preparation of decision-making through a sequential four-step process:identifying treatment options,weighing the benefits and risks,clarifying personal preferences and values,and formulating a schedule for formal shared decision-making with clinicians.Conclusions We developed a rapid prototype of DA tailored for family surrogate decision makers of critically ill patients in need of RRT in ICU setting.Future studies are needed to evaluate its usability,feasibility,and clinical effects of this intervention. 展开更多
关键词 decision aids renal replacement therapy intensive care units shared decision-making user-centered design surrogate
下载PDF
Taxation Models and Improvement Proposals for Personal Income Tax in the Sharing Economy
12
作者 Xinyao Ruan 《Proceedings of Business and Economic Studies》 2024年第3期220-226,共7页
As an innovative economic model,the sharing economy has seen rapid growth globally in recent years.It has not only brought a profound impact on traditional economies but also injected new vitality and momentum into th... As an innovative economic model,the sharing economy has seen rapid growth globally in recent years.It has not only brought a profound impact on traditional economies but also injected new vitality and momentum into the sustainable development of the social economy.However,for the sharing economy,the process of collecting personal income tax is facing several issues,such as the ambiguity of tax policies regarding personal income,challenges in identifying taxpayers,and difficulties in defining income.To achieve the fairness and efficiency of personal income tax collection in the sharing economy,this study proposes optimized regulatory mechanisms and conducts in-depth discussions on the adjustment of personal income tax policies,innovation in tax management technology,and improvement in the quality of personal income tax services. 展开更多
关键词 sharing economy Personal income tax Taxation models
下载PDF
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes 被引量:8
13
作者 Yizhou Shen Shigen Shen +3 位作者 Qi Li Haiping Zhou Zongda Wu Youyang Qu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期906-919,共14页
The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high freq... The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high frequency.Thus,the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge nodes.To address the identified issue,we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing scheme.In particular,we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes,where IoT devices and edge nodes are two parties of the game.IoT devices may make malicious requests to achieve their goals of stealing privacy.Accordingly,edge nodes should deny malicious IoT device requests to prevent IoT data from being disclosed.They dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs.Built upon a developed application framework to illustrate the concrete data sharing architecture,a novel algorithm is proposed that can derive the optimal evolutionary learning strategy.Furthermore,we numerically simulate evolutionarily stable strategies,and the final results experimentally verify the correctness of the IoT data sharing privacy preservation scheme.Therefore,the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared. 展开更多
关键词 Privacy preservation Internet of things Evolutionary game Data sharing Edge computing
下载PDF
Federated Learning with Blockchain for Privacy-Preserving Data Sharing in Internet of Vehicles 被引量:3
14
作者 Wenxian Jiang Mengjuan Chen Jun Tao 《China Communications》 SCIE CSCD 2023年第3期69-85,共17页
Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic management.Meanwhile,the main concerns have been raised abou... Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic management.Meanwhile,the main concerns have been raised about the security and privacy of vehicle data.The mobility and real-time characteristics of vehicle data make data sharing more difficult in Io V.The emergence of blockchain and federated learning brings new directions.In this paper,a data-sharing model that combines blockchain and federated learning is proposed to solve the security and privacy problems of data sharing in Io V.First,we use federated learning to share data instead of exposing actual data and propose an adaptive differential privacy scheme to further balance the privacy and availability of data.Then,we integrate the verification scheme into the consensus process,so that the consensus computation can filter out low-quality models.Experimental data shows that our data-sharing model can better balance the relationship between data availability and privacy,and also has enhanced security. 展开更多
关键词 blockchain federated learning PRIVACY data sharing Internet of Vehicles
下载PDF
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms 被引量:1
15
作者 Keyao Li Yiming Wang +6 位作者 Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第1期28-35,共8页
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since... Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display. 展开更多
关键词 holographic encryption optical secret sharing cascaded liquid crystal hologram multi-dimensional multiplexing
下载PDF
BC-PC-Share:Blockchain-Based Patient-Centric Data Sharing Scheme for PHRs in Cloud Computing
16
作者 Caihui Lan Haifeng Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期2985-3010,共26页
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver sett... Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed.For instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious purposes.Thus,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity verification.Fortunately,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs data.To this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled access.The security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium blockchain. 展开更多
关键词 Blockchain patient-centric personal health records data sharing attribute-based encryption
下载PDF
An Adaptive Wireless Power Sharing Control for Multiterminal HVDC
17
作者 Hasan Alrajhi 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期117-129,共13页
Power sharing among multiterminal high voltage direct current terminals(MT-HVDC)is mainly developed based on a priority or sequential manners,which uses to prevent the problem of overloading due to a predefined contro... Power sharing among multiterminal high voltage direct current terminals(MT-HVDC)is mainly developed based on a priority or sequential manners,which uses to prevent the problem of overloading due to a predefined controller coefficient.Furthermore,fixed power sharing control also suffers from an inability to identify power availability at a rectification station.There is a need for a controller that ensures an efficient power sharing among the MT-HVDC terminals,prevents the possibility of overloading,and utilizes the available power sharing.A new adaptive wireless control for active power sharing among multiterminal(MT-HVDC)systems,including power availability and power management policy,is proposed in this paper.The proposed control strategy solves these issues and,this proposed controller strategy is a generic method that can be applied for unlimited number of converter stations.The rational of this proposed controller is to increase the system reliability by avoiding the necessity of fast communication links.The test system in this paper consists of four converter stations based on three phase-two AC voltage levels.The proposed control strategy for a multiterminal HVDC system is conducted in the power systems computer aided design/electromagnetic transient design and control(PSCAD/EMTDC)simulation environment.The simulation results significantly show the flexibility and usefulness of the proposed power sharing control provided by the new adaptive wireless method. 展开更多
关键词 Active power control fixed power sharing current control HVDC transmission MTDC voltage source converter(VSC) power sharing control adaptive wireless control power conversion
下载PDF
A Systematic Review of Blockchain Technology for Government Information Sharing
18
作者 Lu Zhang Jiarong Mao +4 位作者 Yuting An Tianshuo Zhang Jixin Ma Chen Feng Xiaoyi Zhou 《Computers, Materials & Continua》 SCIE EI 2023年第1期1161-1181,共21页
Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.Howeve... Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.However,the existing GIS has low transparency and is lack of flexibility between different departments.Aiming at such problems,this paper takes blockchain as a solusion,and systematically summarizes the development of digital GIS,the advantages and challenges of blockchain and its theoretical research and practical applications.Specifically,it reviews e-government interactive structure,big data and other solutions,analyses their imperfections,and puts forward blockchain-based solutions.The blockchain improves government service efficiency and data security,meanwhile it faces challenges in throughput and supervision.In order to meet these challenges,researchers propose solutions based on three data exchange scenarios:government-to-government,government-to-enterprise and government-toindividual.In addition to researches,blockchain-based GIS is put into use.The electronic licensing project of Nanjing(China)government is taken as an example to illustrate that blockchain has the ability to openly and securely verify,track,and exchange data,so as to improve management ability and public service level of government agencies. 展开更多
关键词 Blockchain information sharing GOVERNMENT cross-chain
下载PDF
Research and Implementation of Credit Investigation Sharing Platform Based on Double Blockchain
19
作者 Han Yanyan Wei Wanqi +1 位作者 Dou Kaili Li Peng 《Computers, Materials & Continua》 SCIE EI 2023年第6期5193-5211,共19页
As the development of the modern economy is increasingly insep-arable from credit support,the traditional credit investigation mode has yet to meet this demand.Because of the difficulties in conventional credit data s... As the development of the modern economy is increasingly insep-arable from credit support,the traditional credit investigation mode has yet to meet this demand.Because of the difficulties in conventional credit data sharing among credit investigation agencies,poor data portability,and centralized supervision,this paper proposes a data-sharing scheme for credit investigation agencies based on a double blockchain.Given the problems such as difficult data sharing,difficult recovery of damaged data,and accessible data leakage between institutions and users with non-traditional credit inves-tigation data other than credit,this paper proposes a data-sharing scheme for credit investigation subjects based on the digital envelope.Based on the above two solutions,this paper designs a double blockchain credit data-sharing plat-form based on the“public chain+alliance chain”from credit investigation agencies’and visiting subjects’perspectives.The sharing platform uses the alliance chain as the management chain to solve the problem of complex data sharing between credit bureaus and centralized supervision,uses the public chain as the use chain to solve the problem of complex data sharing between the access subject and the credit bureaus,uses the interplanetary file system and digital envelope and other technologies to solve the problem of difficult recovery of damaged data,data leakage,and other issues.After the upload test,the average upload speed reaches 80.6 M/s.The average download speed of the system is 88.7 M/s after the download test.The multi-thread stress test tests the linkage port on the system package,and the average response time for the hypertext transfer protocol(HTTP)is 0.6 ms.The system performance and security analysis show that the sharing platform can provide safe and reliable credit-sharing services for organizations and users and high working efficiency. 展开更多
关键词 Dual blockchain credit data sharing truffle framework digital envelope ipfs
下载PDF
Directed Acyclic Graph Blockchain for Secure Spectrum Sharing and Energy Trading in Power IoT
20
作者 Zixi Zhang Mingxia Zhang +2 位作者 Yu Li Bo Fan Li Jiang 《China Communications》 SCIE CSCD 2023年第5期182-197,共16页
Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing an... Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing and energy trading confronts security and privacy challenges.In this paper,we exploit consortium blockchain and Directed Acyclic Graph(DAG)to propose a new secure and distributed spectrum sharing and energy trading framework in power IoT,named spectrum-energy chain,where a set of local aggregators(LAGs)cooperatively confirm the identity of the power devices by utilizing consortium blockchain,so as to form a main chain.Then,the local power devices verify spectrum and energy micro-transactions simultaneously but asynchronously to form local spectrum tangle and local energy tangle,respectively.Moreover,an iterative double auction based micro transactions scheme is designed to solve the spectrum and energy pricing and the amount of shared spectrum and energy among power devices.Security analysis and numerical results illustrate that the developed spectrum-energy chain and the designed iterative double auction based microtransactions scheme are secure and efficient for spectrum sharing and energy trading in power IoT. 展开更多
关键词 power Internet of Things(IoT) spectrum sharing energy trading security and privacy consortium blockchain Directed Acyclic Graph(DAG) iterative double auction
下载PDF
上一页 1 2 102 下一页 到第
使用帮助 返回顶部