Health information Systems (HIS) have the potential to improve the productivity and efficiency of healthcare staff. However, the adoption of HIS has been lower in Sri Lanka compared to developed countries. This study ...
详细信息
With the rapid development of network technology and terminal devices, we have entered a digital age, where data generation and exchange have become the core of modern society. In this context, green computing and com...
详细信息
ISBN:
(纸本)9798350309461
With the rapid development of network technology and terminal devices, we have entered a digital age, where data generation and exchange have become the core of modern society. In this context, green computing and communication issues are becoming increasingly important. Traditional key management methods have some issues, including centralization risks, high energy consumption, and complex management processes. These problems are contrary to the principles of green computing and communication. The introduction of blockchain and group key technologies provides an innovative approach to solving these issues. Firstly, blockchain utilizes a decentralized distributed ledger that disperses key management tasks to multiple nodes within the network. This reduces centralization risks and enhances the security and trustworthiness of the system. Additionally, blockchain transaction records are tamper-resistant, ensuring transparency and traceability in data exchange. Moreover, blockchain-based group key management methods help reduce the need for centralized servers, thus decreasing energy consumption and aligning with the principles of green computing. In this context, this paper proposes a blockchain-based group key management method for edge device transactions. This method constructs groups based on the inherent attributes of edge device nodes, and effectively reduces the system overhead caused by rederiving new keys due to node additions or removals within the group, as well as the key transmission between nodes. The paper first utilized OpenEthereum to build a blockchain network for testing the proposed group key management algorithm, thus demonstrating the scalability of the proposed solution.
This paper studies data organization, node coding and multi-view conversion in ship product data management, and proposes a product data organization structure compatible with system design and partition construction,...
详细信息
As informationtechnology advances, smart healthcare has become a key avenue for enhancing the quality and efficiency of medical services. Cloud computing plays a central role by providing robust data processing capab...
详细信息
An image encryption algorithm based on chaotic scrambling and DNA sequence multi-rule coding is proposed. Through the research of related algorithms, the original image and the chaotic sequence generated by Logistic c...
详细信息
Due to its many uses and ability to save and restore data, whether for businesses or individuals, cloud computing has become one of the mainstays in the technology world over the past few years. However, the limitatio...
详细信息
ISBN:
(纸本)9781665456456
Due to its many uses and ability to save and restore data, whether for businesses or individuals, cloud computing has become one of the mainstays in the technology world over the past few years. However, the limitations on speeds and sizes as well as the evolving of the Internet of Things made it challenging to rely on the cloud due to the extremely slow data processing. Therefore, to store and interpret the massive amount of data rapidly, programmers switched towards a new technology which is fog computing. This mini survey paper will outline fog computing as an integral part of cloud and edge computing for improving security and data protection. A systematic literature review of selected research papers that include findings and algorithms used to enhance security-related problems such as availability, latency, and intrusion detection will be discussed. This mini review paper finds out a state-of-the-art on the cybersecurity issues in fog computing using blockchain.
Recent advancements in large-scale language models, as exemplified by ChatGPT, have undergone rapid and substantial development. Their efficacy in natural language processing (NLP) and related domains has notably surp...
详细信息
Optical pulse coding technique can improve some performance such as sensing distance of Brillouin optical time-domain analyzers (BOTDA) with the compatibility of its conventional device, and it often apply the field p...
详细信息
Cloud computing has become integral to informationtechnology, offering a flexible and scalable way to access and utilize computing resources. In cloud computing, task scheduling policies can affect the resource usage...
详细信息
Healthcare data contains large amounts of personal information and is privacy sensitive. The healthcare sector needs privacy protection to keep private and sensitive information safe from unauthorized access. Security...
详细信息
暂无评论