Pub Date : 2023-01-01DOI: 10.1504/ijguc.2023.10057772
M. K. Prasad, S. Chintalapudi, P. A. Reddy
{"title":"Strongly correlated high utility item-sets recommendation in e-commerce applications using EGUI-tree over data stream","authors":"M. K. Prasad, S. Chintalapudi, P. A. Reddy","doi":"10.1504/ijguc.2023.10057772","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10057772","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijguc.2023.10060445
Monica Mehrotra, Swati Singh, Taran Singh Bharti
{"title":"Developing software predictive model for examining software bugs using machine learning","authors":"Monica Mehrotra, Swati Singh, Taran Singh Bharti","doi":"10.1504/ijguc.2023.10060445","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10060445","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135705080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijguc.2023.10058853
Yonghui Ren, Chenglin Li, Yanxu Jin, Yan Shi, Donghui Mei, Shenzhang Li, Wenwei Su, Jing Zhou, Shaolong Li, Lin Wang, Yingjun He, Wenhui Ouyang
{"title":"Cloud computing data privacy protection method based on blockchain","authors":"Yonghui Ren, Chenglin Li, Yanxu Jin, Yan Shi, Donghui Mei, Shenzhang Li, Wenwei Su, Jing Zhou, Shaolong Li, Lin Wang, Yingjun He, Wenhui Ouyang","doi":"10.1504/ijguc.2023.10058853","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10058853","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijguc.2023.133452
Jagdeep Singh, Sanjay Kumar Dhurandher
This paper proposes a novel Secure Multi-Geocasting Scheme for IoT-based Opportunistic Networks called 'SMGSAF', which uses secret sharing and disjoint path routing to secure the privacy of messages. Encryption is a proven way to ensure this but classical encryption techniques are not well suited for the opportunistic paradigm. Therefore we have used secret sharing and disjoint path routing to protect the privacy of messages. The mathematical analysis of the proposed SMGSAF protocol provides the intended security but at the expense of performance, which is within acceptable limits. Simulations are conducted using the ONE Simulator, showing that when time-to-live is varied, (1) the proposed SMGSAF scheme outperforms MGSAF by 14.05%, 9.4%, 5.81% respectively in terms of delivery probability, overhead ratio, and average latency; (2) it also outperforms GSAF by 16.17%, 9.2%, 6.85%, respectively in terms of delivery probability, overhead ratio, and average latency.
{"title":"SMGSAF: a secure multi-geocasting scheme for opportunistic networks","authors":"Jagdeep Singh, Sanjay Kumar Dhurandher","doi":"10.1504/ijguc.2023.133452","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133452","url":null,"abstract":"This paper proposes a novel Secure Multi-Geocasting Scheme for IoT-based Opportunistic Networks called 'SMGSAF', which uses secret sharing and disjoint path routing to secure the privacy of messages. Encryption is a proven way to ensure this but classical encryption techniques are not well suited for the opportunistic paradigm. Therefore we have used secret sharing and disjoint path routing to protect the privacy of messages. The mathematical analysis of the proposed SMGSAF protocol provides the intended security but at the expense of performance, which is within acceptable limits. Simulations are conducted using the ONE Simulator, showing that when time-to-live is varied, (1) the proposed SMGSAF scheme outperforms MGSAF by 14.05%, 9.4%, 5.81% respectively in terms of delivery probability, overhead ratio, and average latency; (2) it also outperforms GSAF by 16.17%, 9.2%, 6.85%, respectively in terms of delivery probability, overhead ratio, and average latency.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijguc.2023.131008
Kun Tang
{"title":"Optimising sports marketing strategy by the internet of things and blockchain technology","authors":"Kun Tang","doi":"10.1504/ijguc.2023.131008","DOIUrl":"https://doi.org/10.1504/ijguc.2023.131008","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135784042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijguc.2023.132615
Bharati Mishra, Debasish Jena, Srikanta Patnaik
{"title":"Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme","authors":"Bharati Mishra, Debasish Jena, Srikanta Patnaik","doi":"10.1504/ijguc.2023.132615","DOIUrl":"https://doi.org/10.1504/ijguc.2023.132615","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135828114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New principles of finding and removing elements of mathematical model for reducing computational and time complexity","authors":"Yaroslav Matviychuk, Natalia Kryvinska, Nataliya Shakhovska, Aneta Poniszewska Maranda","doi":"10.1504/ijguc.2023.132625","DOIUrl":"https://doi.org/10.1504/ijguc.2023.132625","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135828117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijguc.2023.133443
Yu Ning
{"title":"Research on the extraction of accounting multi-relationship information based on cloud computing and multimedia","authors":"Yu Ning","doi":"10.1504/ijguc.2023.133443","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133443","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}