scispace - formally typeset
Search or ask a question

Showing papers in "Future Generation Computer Systems in 2017"


Journal ArticleDOI
TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.

1,743 citations


Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors conduct a systematic study on the security threats to blockchain and survey the corresponding real attacks by examining popular blockchain systems. And they also review the security enhancement solutions for blockchain, which could be used in the development of various blockchain systems, and suggest some future directions to stir research efforts into this area.

1,071 citations


Journal ArticleDOI
TL;DR: The experiments have shown that the distributed attack detection system is superior to centralized detection systems using deep learning model, and it has been demonstrated that the deep model is more effective in attack detection than its shallow counter parts.

624 citations


Journal ArticleDOI
TL;DR: The proposed solutions for collecting and managing sensors’ data in a smart building could lead us in an energy efficient smart building, and thus in a Green Smart Building.

460 citations


Journal ArticleDOI
TL;DR: A new architecture for the implementation of IoT to store and process scalable sensor data (big data) for health care applications and uses MapReduce based prediction model to predict the heart diseases is proposed.

393 citations


Journal ArticleDOI
TL;DR: This work presents a basic scheme based on multi-key fully homomorphic encryption (MK-FHE), and proposes a hybrid structure scheme by combining the double decryption mechanism and FHE, and proves that these two multi- key privacy-preserving deep learning schemes over encrypted data are secure.

386 citations


Journal ArticleDOI
TL;DR: The goal of the special issue is to bring together scholars, professors, researchers, engineers and administrators resorting to the state-of-the-art technologies and ideas to significantly improve the field of Smart City based on IoT.

300 citations


Journal ArticleDOI
TL;DR: This paper presents the definitions of the MEC given by researchers and discusses the opportunities brought by the M EC and some of the important research challenges highlighted in MEC environment.

273 citations


Journal ArticleDOI
TL;DR: This paper defines the major requirements for building SH and seven unique requirement recommendations are defined and classified according to the specific quality of the SH building blocks.

265 citations


Journal ArticleDOI
TL;DR: An Efficient Algorithm for Media-based Surveillance System (EAMSuS) is proposed in IoT network for Smart City Framework, which merges two algorithms introduced by other researchers for WSN packet routing and security, while it reclaims the new media compression standard, High Efficiency Video Coding (HEVC).

264 citations


Journal ArticleDOI
TL;DR: This paper discusses the mainstream blockchain consensus algorithms and how the classic Byzantine consensus can be revisited for the blockchain context and warns about the dangers of using these blockchains without understanding precisely the guarantees their consensus algorithm offers.

Journal ArticleDOI
TL;DR: Extensive simulation results show that the energy consumption is much reduced, the network lifetime is prolonged, and the transmission delay is reduced in the proposed routing algorithm than some other popular routing algorithms.

Journal ArticleDOI
TL;DR: The experimental results show that iDoctor provides a higher predication rating and increases the accuracy of healthcare recommendation significantly, and is compared with previous healthcare recommendation methods using real datasets.

Journal ArticleDOI
TL;DR: The proposed hybrid approach can alleviate both the cold-start and data sparsity problems by making use of ontological domain knowledge and learner’s sequential access pattern respectively before the initial data to work on is available in the recommender system.

Journal ArticleDOI
TL;DR: This work proposes a robust and lightweight authentication scheme for WMSNs, which meets the common security requirements, and keeps away user tracking from attackers, and is suitable for PHSs.

Journal ArticleDOI
TL;DR: To compare and contrast a range of existing container-based technologies for the Cloud and evaluate their pros and cons and overall performances, the OpenStack-based Australia-wide NeCTAR Research Cloud was used for this purpose.

Journal ArticleDOI
TL;DR: The objective is to find temporal patterns whose true prevalence values vary similar to a reference support time sequence satisfying subset constraints through estimating temporal pattern support bounds and using a novel fuzzy dissimilarity measure, named G-SPAMINE.

Journal ArticleDOI
TL;DR: This paper presents a password-based conditional privacy preserving authentication and group-key generation (PW-CPPA-GKA) protocol for VANETs, which is lightweight in terms computation and communication since it can be designed without bilinear-pairing and elliptic curve.

Journal ArticleDOI
TL;DR: A prototype workflow executor functions using AWS Lambda and Google Cloud Functions, coupled with the HyperFlow workflow engine are developed, which can run workflow tasks in AWS and Google infrastructures, and feature such capabilities as data staging to/from S3 or Google Cloud Storage and execution of custom application binaries.

Journal ArticleDOI
TL;DR: This survey categorize and evaluate state-of-the-art electronic health system research based on their architecture, as well as services including access control, emergency access, sharing, searching, and anonymity methods by considering their cryptographic approaches.

Journal ArticleDOI
TL;DR: A biometrics-based authentication scheme for multi-cloud-server environment deployment is devised that makes use of bio-hashing to improve the accuracy of biometric pattern matching and is analysed to demonstrate its utility.

Journal ArticleDOI
TL;DR: This framework aims at adding an extra security level at the early stages of the CSDLC, which has been further illustrated by a case study showing the applicability of the framework.

Journal ArticleDOI
TL;DR: This work explores the suitability of the Bitcoin blockchain to create a novel solution for choreographies and enables a seamless execution monitoring and verification of choreographies, while at the same time preserving anonymity and independence of the process participants.

Journal ArticleDOI
TL;DR: The privacy problems of one of the key enablers of the IoT, namely wireless sensor networks, are looked at and how these problems may evolve with the development of this complex paradigm is analyzed.

Journal ArticleDOI
TL;DR: A provable secure CP-ABSC scheme for cloud-based PHR sharing system that has ability to provide fine-grained access control, confidentiality, authenticity, signcryptor privacy and public verifiability, simultaneously is proposed.

Journal ArticleDOI
TL;DR: This paper proposes an integrated trust evaluation method via combining objective trust assessment and subjective trust assessment, and shows that the proposed method significantly outperforms the other trust and reputation methods.

Journal ArticleDOI
TL;DR: This work proposes a fog structure composed of multiple mobile sinks that significantly outperforms traditional solutions for data collection from WSNs to the Cloud and designed a detailed routing algorithm for sensors considering hops and energy consumption.

Journal ArticleDOI
TL;DR: A three-tier system architecture is proposed and mathematically characterize each tier in terms of energy consumption and latency so that the transmission latency and bandwidth burden caused by cloud computing can be effectively reduced.

Journal ArticleDOI
TL;DR: A cloud-assisted framework for secure video transmission and sharing, where mobile clients have limited capabilities; however, users need to share videos seamlessly without sacrificing integrity and quality is proposed.

Journal ArticleDOI
TL;DR: This work design a novel remote user authentication scheme using wireless sensor networks for agriculture monitoring using random oracle model and shows that the proposed protocol is secure and resists various kinds of malicious attacks.