首页 > 最新文献

Cluster Computing最新文献

英文 中文
BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm BOC-PDO:使用二元对立蜂窝草原犬优化算法的入侵检测模型
Pub Date : 2024-07-20 DOI: 10.1007/s10586-024-04674-2
Bilal H. Abed-alguni, Basil M. Alzboun, Noor Aldeen Alawad

Intrusion detection datasets are highly likely to contain numerous redundant, irrelevant, and noisy features that slow the performance of the machine learning techniques and classifiers that may be applied to them. The feature selection approach is used for reducing the number of features in intrusion detection datasets and eliminating those that are not important. One of the most powerful structured population approaches is the Cellular Automata approach, which is used to enhance the diversity and convergence of population-based optimization algorithms. In this work, the Cellular Automata approach, Mixed opposition-based learning, and the K-Nearest Neighbor classifier are incorporated with the Prairie dog optimization algorithm (PDO) in a new intrusion detection framework called Binary Opposition Cellular Prairie dog optimization algorithm (BOC-PDO). The proposed framework contains four key features. First, the Cellular Automata model is utilized to enhance the population of feasible solutions in the PDO. Second, four S-shaped and four V-shaped Binary Transfer Functions are used to convert the continuous solutions in BOC-PDO to binary ones. Third, the Mixed opposition-based learning approach is used at the end of the optimization loop of BOC-PDO to improve capacity for exploration. Fourth, the K-Nearest Neighbor classifier is used as the main learning model in BOC-PDO. Eleven famous intrusion detection datasets were employed in the evaluation of the effectiveness of BOC-PDO compared to eight popular binary optimization algorithms and four machine learning approaches. According to the overall simulation results, BOC-PDO scored the highest accuracy, best objective value, and fewest selected features for each of the eleven intrusion detection datasets. Besides, the reliability and consistency of the simulation results of BOC-PDO compared to the other tested algorithms were established using Friedman and Wilcoxon statistical tests.

入侵检测数据集很可能包含大量冗余、不相关和嘈杂的特征,这些特征会降低应用于这些数据集的机器学习技术和分类器的性能。特征选择方法用于减少入侵检测数据集中的特征数量,并剔除那些不重要的特征。最强大的结构化群体方法之一是蜂窝自动机方法,该方法用于增强基于群体的优化算法的多样性和收敛性。在这项工作中,蜂窝自动机方法、基于混合对立的学习和 K-近邻分类器与草原犬优化算法(PDO)相结合,形成了一种新的入侵检测框架,称为二元对立蜂窝草原犬优化算法(BOC-PDO)。建议的框架包含四个主要特征。首先,利用蜂窝自动机模型来增加 PDO 中可行解的数量。第二,使用四个 S 型和四个 V 型二进制转移函数将 BOC-PDO 中的连续解转换为二进制解。第三,在 BOC-PDO 优化循环的末端使用基于混合对立的学习方法,以提高探索能力。第四,将 K-近邻分类器作为 BOC-PDO 的主要学习模型。在评估 BOC-PDO 与 8 种流行的二进制优化算法和 4 种机器学习方法的有效性时,采用了 11 个知名的入侵检测数据集。根据整体仿真结果,BOC-PDO 在 11 个入侵检测数据集中的准确率最高、目标值最佳、所选特征最少。此外,与其他测试算法相比,BOC-PDO 的模拟结果通过 Friedman 和 Wilcoxon 统计检验确定了可靠性和一致性。
{"title":"BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm","authors":"Bilal H. Abed-alguni, Basil M. Alzboun, Noor Aldeen Alawad","doi":"10.1007/s10586-024-04674-2","DOIUrl":"https://doi.org/10.1007/s10586-024-04674-2","url":null,"abstract":"<p>Intrusion detection datasets are highly likely to contain numerous redundant, irrelevant, and noisy features that slow the performance of the machine learning techniques and classifiers that may be applied to them. The feature selection approach is used for reducing the number of features in intrusion detection datasets and eliminating those that are not important. One of the most powerful structured population approaches is the Cellular Automata approach, which is used to enhance the diversity and convergence of population-based optimization algorithms. In this work, the Cellular Automata approach, Mixed opposition-based learning, and the K-Nearest Neighbor classifier are incorporated with the Prairie dog optimization algorithm (PDO) in a new intrusion detection framework called Binary Opposition Cellular Prairie dog optimization algorithm (BOC-PDO). The proposed framework contains four key features. First, the Cellular Automata model is utilized to enhance the population of feasible solutions in the PDO. Second, four S-shaped and four V-shaped Binary Transfer Functions are used to convert the continuous solutions in BOC-PDO to binary ones. Third, the Mixed opposition-based learning approach is used at the end of the optimization loop of BOC-PDO to improve capacity for exploration. Fourth, the K-Nearest Neighbor classifier is used as the main learning model in BOC-PDO. Eleven famous intrusion detection datasets were employed in the evaluation of the effectiveness of BOC-PDO compared to eight popular binary optimization algorithms and four machine learning approaches. According to the overall simulation results, BOC-PDO scored the highest accuracy, best objective value, and fewest selected features for each of the eleven intrusion detection datasets. Besides, the reliability and consistency of the simulation results of BOC-PDO compared to the other tested algorithms were established using Friedman and Wilcoxon statistical tests.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service management 智能城市的区块链安全智能医疗系统:关于架构、技术和服务管理的系统综述
Pub Date : 2024-07-20 DOI: 10.1007/s10586-024-04661-7
Bhabani Sankar Samantray, K Hemant Kumar Reddy

Recently, the spotlight has been cast on smart healthcare by many researchers to provide better facilities to patients. Improved services, such as reducing health hazards, monitoring patient health, tracking disease trends, and enhancing service quality, can be offered by smart healthcare. Despite its numerous potential benefits, smart healthcare is associated with some security challenges. These challenges can be mitigated by utilizing blockchain technology, which is characterized by decentralization, cryptography, consensus mechanisms, transparency and accountability, smart contracts, ownership of data, immutability, and distributed ledger. Therefore, the latest blockchain technology is focused in this article to address the security challenges of smart healthcare. In this article, attention is given to smart healthcare, smart cities for smart healthcare, smart and secure healthcare, and cutting-edge technologies for smart cities and smart healthcare.Please provide author biography and photo.

最近,智能医疗成为许多研究人员关注的焦点,目的是为患者提供更好的设施。智能医疗可以提供更好的服务,如减少健康危害、监测病人健康、跟踪疾病趋势和提高服务质量。尽管智能医疗具有众多潜在优势,但也存在一些安全挑战。区块链技术的特点是去中心化、加密技术、共识机制、透明度和问责制、智能合约、数据所有权、不变性和分布式账本,利用区块链技术可以减轻这些挑战。因此,本文将重点介绍最新的区块链技术,以应对智能医疗的安全挑战。本文关注智慧医疗、智慧城市促进智慧医疗、智慧安全医疗以及智慧城市和智慧医疗的前沿技术。请提供作者简介和照片。
{"title":"Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service management","authors":"Bhabani Sankar Samantray, K Hemant Kumar Reddy","doi":"10.1007/s10586-024-04661-7","DOIUrl":"https://doi.org/10.1007/s10586-024-04661-7","url":null,"abstract":"<p>Recently, the spotlight has been cast on smart healthcare by many researchers to provide better facilities to patients. Improved services, such as reducing health hazards, monitoring patient health, tracking disease trends, and enhancing service quality, can be offered by smart healthcare. Despite its numerous potential benefits, smart healthcare is associated with some security challenges. These challenges can be mitigated by utilizing blockchain technology, which is characterized by decentralization, cryptography, consensus mechanisms, transparency and accountability, smart contracts, ownership of data, immutability, and distributed ledger. Therefore, the latest blockchain technology is focused in this article to address the security challenges of smart healthcare. In this article, attention is given to smart healthcare, smart cities for smart healthcare, smart and secure healthcare, and cutting-edge technologies for smart cities and smart healthcare.Please provide author biography and photo.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TFCNN-BiGRU with self-attention mechanism for automatic human emotion recognition using multi-channel EEG data 具有自我关注机制的 TFCNN-BiGRU,利用多通道脑电图数据自动识别人类情绪
Pub Date : 2024-07-19 DOI: 10.1007/s10586-024-04590-5
Essam H. Houssein, Asmaa Hammad, Nagwan Abdel Samee, Manal Abdullah Alohali, Abdelmgeid A. Ali

Electroencephalograms (EEG)-based technology for recognizing emotions has attracted a lot of interest lately. However, there is still work to be done on the efficient fusion of different temporal and spatial features of EEG signals to improve performance in emotion recognition. Therefore, this study suggests a new deep learning architecture that combines a time–frequency convolutional neural network (TFCNN), a bidirectional gated recurrent unit (BiGRU), and a self-attention mechanism (SAM) to categorize emotions based on EEG signals and automatically extract features. The first step is to use the continuous wavelet transform (CWT), which responds more readily to temporal frequency variations within EEG recordings, as a layer inside the convolutional layers, to create 2D scalogram images from EEG signals for time series and spatial representation learning. Second, to encode more discriminative features representing emotions, two-dimensional (2D)-CNN, BiGRU, and SAM are trained on these scalograms simultaneously to capture the appropriate information from spatial, local, temporal, and global aspects. Finally, EEG signals are categorized into several emotional states. This network can learn the temporal dependencies of EEG emotion signals with BiGRU, extract local spatial features with TFCNN, and improve recognition accuracy with SAM, which is applied to explore global signal correlations by reassigning weights to emotion features. Using the SEED and GAMEEMO datasets, the suggested strategy was evaluated on three different classification tasks: one with two target classes (positive and negative), one with three target classes (positive, neutral, and negative), and one with four target classes (boring, calm, horror, and funny). Based on the comprehensive results of the experiments, the suggested approach achieved a 93.1%, 96.2%, and 92.9% emotion detection accuracy in two, three, and four classes, respectively, which are 0.281%, 1.98%, and 2.57% higher than the existing approaches working on the same datasets for different subjects, respectively. The open source codes are available at https://www.mathworks.com/matlabcentral/fileexchange/165126-tfcnn-bigru

最近,基于脑电图(EEG)的情绪识别技术引起了广泛关注。然而,如何有效融合脑电信号的不同时空特征以提高情绪识别性能,仍有许多工作要做。因此,本研究提出了一种新的深度学习架构,将时频卷积神经网络(TFCNN)、双向门控递归单元(BiGRU)和自我注意机制(SAM)结合起来,根据脑电信号对情绪进行分类,并自动提取特征。第一步是使用连续小波变换(CWT)作为卷积层内部的一层,它更容易响应脑电图记录中的时间频率变化,从而从脑电图信号中创建二维扫描图像,用于时间序列和空间表示学习。其次,为了编码代表情绪的更具区分性的特征,二维(2D)-CNN、BiGRU 和 SAM 同时在这些扫描图上进行训练,以捕捉空间、局部、时间和全局方面的适当信息。最后,脑电信号被分为几种情绪状态。该网络可以利用 BiGRU 学习脑电图情绪信号的时间依赖性,利用 TFCNN 提取局部空间特征,并利用 SAM 提高识别准确率。利用 SEED 和 GAMEEMO 数据集,在三个不同的分类任务中对所建议的策略进行了评估:一个是两个目标类别(积极和消极),一个是三个目标类别(积极、中性和消极),还有一个是四个目标类别(无聊、平静、恐怖和滑稽)。根据实验的综合结果,所建议的方法在两类、三类和四类中的情感检测准确率分别达到了 93.1%、96.2% 和 92.9%,比现有的针对不同主题的相同数据集的方法分别高出 0.281%、1.98% 和 2.57%。开放源代码见 https://www.mathworks.com/matlabcentral/fileexchange/165126-tfcnn-bigru
{"title":"TFCNN-BiGRU with self-attention mechanism for automatic human emotion recognition using multi-channel EEG data","authors":"Essam H. Houssein, Asmaa Hammad, Nagwan Abdel Samee, Manal Abdullah Alohali, Abdelmgeid A. Ali","doi":"10.1007/s10586-024-04590-5","DOIUrl":"https://doi.org/10.1007/s10586-024-04590-5","url":null,"abstract":"<p>Electroencephalograms (EEG)-based technology for recognizing emotions has attracted a lot of interest lately. However, there is still work to be done on the efficient fusion of different temporal and spatial features of EEG signals to improve performance in emotion recognition. Therefore, this study suggests a new deep learning architecture that combines a time–frequency convolutional neural network (TFCNN), a bidirectional gated recurrent unit (BiGRU), and a self-attention mechanism (SAM) to categorize emotions based on EEG signals and automatically extract features. The first step is to use the continuous wavelet transform (CWT), which responds more readily to temporal frequency variations within EEG recordings, as a layer inside the convolutional layers, to create 2D scalogram images from EEG signals for time series and spatial representation learning. Second, to encode more discriminative features representing emotions, two-dimensional (2D)-CNN, BiGRU, and SAM are trained on these scalograms simultaneously to capture the appropriate information from spatial, local, temporal, and global aspects. Finally, EEG signals are categorized into several emotional states. This network can learn the temporal dependencies of EEG emotion signals with BiGRU, extract local spatial features with TFCNN, and improve recognition accuracy with SAM, which is applied to explore global signal correlations by reassigning weights to emotion features. Using the SEED and GAMEEMO datasets, the suggested strategy was evaluated on three different classification tasks: one with two target classes (positive and negative), one with three target classes (positive, neutral, and negative), and one with four target classes (boring, calm, horror, and funny). Based on the comprehensive results of the experiments, the suggested approach achieved a 93.1%, 96.2%, and 92.9% emotion detection accuracy in two, three, and four classes, respectively, which are 0.281%, 1.98%, and 2.57% higher than the existing approaches working on the same datasets for different subjects, respectively. The open source codes are available at https://www.mathworks.com/matlabcentral/fileexchange/165126-tfcnn-bigru</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved honey badger algorithm for global optimization and multilevel thresholding segmentation: real case with brain tumor images 用于全局优化和多级阈值分割的改进型蜜獾算法:脑肿瘤图像的实际案例
Pub Date : 2024-07-19 DOI: 10.1007/s10586-024-04525-0
Essam H. Houssein, Marwa M. Emam, Narinder Singh, Nagwan Abdel Samee, Maali Alabdulhafith, Emre Çelik

Global optimization and biomedical image segmentation are crucial in diverse scientific and medical fields. The Honey Badger Algorithm (HBA) is a newly developed metaheuristic that draws inspiration from the foraging behavior of honey badgers. Similar to other metaheuristic algorithms, HBA encounters difficulties associated with exploitation, being trapped in local optima, and the pace at which it converges. This study aims to improve the performance of the original HBA by implementing the Enhanced Solution Quality (ESQ) method. This strategy helps to prevent becoming stuck in local optima and speeds up the convergence process. We conducted an assessment of the enhanced algorithm, mHBA, by utilizing a comprehensive collection of benchmark functions from IEEE CEC’2020. In this evaluation, we compared mHBA with well-established metaheuristic algorithms. mHBA demonstrates exceptional performance, as shown by both qualitative and quantitative assessments. Our study not only focuses on global optimization but also investigates the field of biomedical image segmentation, which is a crucial process in numerous applications involving digital image analysis and comprehension. We specifically focus on the problem of multi-level thresholding (MT) for medical image segmentation, which is a difficult process that becomes more challenging as the number of thresholds needed increases. In order to tackle this issue, we suggest a revised edition of the standard HBA, known as mHBA, which utilizes the ESQ approach. We utilized this methodology for the segmentation of Magnetic Resonance Images (MRI). The evaluation of mHBA utilizes existing metrics to gauge the quality and performance of its segmentation. This evaluation showcases the resilience of mHBA in comparison to many established optimization algorithms, emphasizing the effectiveness of the suggested technique.

全局优化和生物医学图像分割在各种科学和医学领域都至关重要。蜜獾算法(HBA)是从蜜獾的觅食行为中汲取灵感而新开发的元启发式算法。与其他元启发式算法类似,蜜獾算法在利用、陷入局部最优以及收敛速度等方面也遇到了困难。本研究旨在通过实施增强解质量(ESQ)方法来提高原始 HBA 的性能。这一策略有助于防止陷入局部最优状态,并加快收敛过程。我们利用 IEEE CEC'2020 的一系列基准函数对增强算法 mHBA 进行了评估。在评估中,我们将 mHBA 与成熟的元启发式算法进行了比较。mHBA 在定性和定量评估中都表现出了卓越的性能。我们的研究不仅关注全局优化,而且还调查了生物医学图像分割领域,这是涉及数字图像分析和理解的众多应用中的一个关键过程。我们特别关注用于医学图像分割的多级阈值(MT)问题,这是一个困难的过程,随着所需的阈值数量的增加而变得更具挑战性。为了解决这个问题,我们提出了一种利用 ESQ 方法的标准 HBA 修订版,即 mHBA。我们将这种方法用于磁共振成像(MRI)的分割。对 mHBA 的评估利用现有指标来衡量其分割的质量和性能。与许多成熟的优化算法相比,该评估展示了 mHBA 的适应能力,强调了所建议技术的有效性。
{"title":"An improved honey badger algorithm for global optimization and multilevel thresholding segmentation: real case with brain tumor images","authors":"Essam H. Houssein, Marwa M. Emam, Narinder Singh, Nagwan Abdel Samee, Maali Alabdulhafith, Emre Çelik","doi":"10.1007/s10586-024-04525-0","DOIUrl":"https://doi.org/10.1007/s10586-024-04525-0","url":null,"abstract":"<p>Global optimization and biomedical image segmentation are crucial in diverse scientific and medical fields. The Honey Badger Algorithm (HBA) is a newly developed metaheuristic that draws inspiration from the foraging behavior of honey badgers. Similar to other metaheuristic algorithms, HBA encounters difficulties associated with exploitation, being trapped in local optima, and the pace at which it converges. This study aims to improve the performance of the original HBA by implementing the Enhanced Solution Quality (ESQ) method. This strategy helps to prevent becoming stuck in local optima and speeds up the convergence process. We conducted an assessment of the enhanced algorithm, mHBA, by utilizing a comprehensive collection of benchmark functions from IEEE CEC’2020. In this evaluation, we compared mHBA with well-established metaheuristic algorithms. mHBA demonstrates exceptional performance, as shown by both qualitative and quantitative assessments. Our study not only focuses on global optimization but also investigates the field of biomedical image segmentation, which is a crucial process in numerous applications involving digital image analysis and comprehension. We specifically focus on the problem of multi-level thresholding (MT) for medical image segmentation, which is a difficult process that becomes more challenging as the number of thresholds needed increases. In order to tackle this issue, we suggest a revised edition of the standard HBA, known as mHBA, which utilizes the ESQ approach. We utilized this methodology for the segmentation of Magnetic Resonance Images (MRI). The evaluation of mHBA utilizes existing metrics to gauge the quality and performance of its segmentation. This evaluation showcases the resilience of mHBA in comparison to many established optimization algorithms, emphasizing the effectiveness of the suggested technique.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive detection and mitigation mechanism to protect SD-IoV systems against controller-targeted DDoS attacks 保护 SD-IoV 系统免受以控制器为目标的 DDoS 攻击的综合检测和缓解机制
Pub Date : 2024-07-19 DOI: 10.1007/s10586-024-04660-8
Behaylu Tadele Alemu, Alemu Jorgi Muhammed, Habtamu Molla Belachew, Mulatu Yirga Beyene

Software-defined networking (SDN) has emerged as a transformative technology that separates the control plane from the data plane, providing advantages such as flexibility, centralized control, and programmability. This innovation proves particularly beneficial for Internet of Vehicles (IoV) networks, which amalgamate the Internet of Things (IoT) and Vehicular Ad Hoc Network (VANET) to implement Intelligent Transportation Systems (ITS). IoV provides a safe and secured vehicular environment by supporting V2V, V2I, V2S, and V2P. By employing an SDN controller, IoV networks can leverage centralized control and enhanced manageability, leading to the emergence of Software-Defined Internet of Vehicles (SD-IoV) as a promising solution for future communications. However, the SD-IoV networks introduces a potential vulnerability in the form of a single point of failure, particularly susceptible to Distributed Denial of Service (DDoS) attacks. This is because of the centralized nature of SDN and the dynamic nature of IoV. In this context, the SDN controller becomes a prime target for attackers who flood it with massive packet-in messages. To address this security concern, we propose an efficient and lightweight attack detection and mitigation scheme within the SDN controller. The scheme includes a detection module that utilizes entropy and flow rate to identify patterns indicative of attack traffic behavior. Additionally, a mitigation module is designed to minimize the effect of attack traffic on the normal operation, this is performed through analysis of payload lengths.The mitigation flow rule is set for specific traffic type if its payload is less than the threshold value to decrease the false positive rate. An adaptive threshold computation for all parameter values enhances the scheme’s effectiveness. We conducted simulations using SUMO, Mininet-WiFi, and Scapy. We evaluated the system performance by using Mininet-wifi SDN simulation tool and Ryu controller for control plane. The system detects DDoS attack traffic within a single window by checking both entropy and flow rate simultaneously. The simulation results demonstrate the efficacy of our proposed scheme in terms of detection time, accuracy, mitigation efficiency, controller load, and link bandwidth consumption, showcasing its superiority compared to existing works in the field.

软件定义网络(SDN)是一种变革性技术,它将控制平面与数据平面分开,具有灵活性、集中控制和可编程性等优势。事实证明,这种创新对车联网(IoV)网络尤其有益,它将物联网(IoT)和车载 Ad Hoc 网络(VANET)融合在一起,以实现智能交通系统(ITS)。IoV 支持 V2V、V2I、V2S 和 V2P,可提供安全可靠的车辆环境。通过采用 SDN 控制器,IoV 网络可以利用集中控制和增强的可管理性,从而使软件定义的车联网(SD-IoV)成为未来通信的一种有前途的解决方案。然而,SD-IoV 网络存在单点故障的潜在漏洞,特别容易受到分布式拒绝服务 (DDoS) 攻击。这是因为 SDN 的集中性和 IoV 的动态性。在这种情况下,SDN 控制器就成了攻击者的主要目标,他们会向控制器发送大量的数据包信息。为了解决这一安全问题,我们在 SDN 控制器中提出了一种高效、轻量级的攻击检测和缓解方案。该方案包括一个检测模块,利用熵和流速来识别表明攻击流量行为的模式。此外,还设计了一个缓解模块,通过分析有效载荷长度将攻击流量对正常运行的影响降至最低。如果有效载荷小于阈值,则为特定流量类型设置缓解流量规则,以降低误报率。对所有参数值进行自适应阈值计算可提高方案的有效性。我们使用 SUMO、Mininet-WiFi 和 Scapy 进行了模拟。我们使用 Mininet-wifi SDN 仿真工具和用于控制平面的 Ryu 控制器评估了系统性能。系统通过同时检查熵和流量,在一个窗口内检测到 DDoS 攻击流量。仿真结果表明,我们提出的方案在检测时间、准确性、缓解效率、控制器负载和链路带宽消耗等方面都很有效,与该领域的现有作品相比更具优势。
{"title":"A comprehensive detection and mitigation mechanism to protect SD-IoV systems against controller-targeted DDoS attacks","authors":"Behaylu Tadele Alemu, Alemu Jorgi Muhammed, Habtamu Molla Belachew, Mulatu Yirga Beyene","doi":"10.1007/s10586-024-04660-8","DOIUrl":"https://doi.org/10.1007/s10586-024-04660-8","url":null,"abstract":"<p>Software-defined networking (SDN) has emerged as a transformative technology that separates the control plane from the data plane, providing advantages such as flexibility, centralized control, and programmability. This innovation proves particularly beneficial for Internet of Vehicles (IoV) networks, which amalgamate the Internet of Things (IoT) and Vehicular Ad Hoc Network (VANET) to implement Intelligent Transportation Systems (ITS). IoV provides a safe and secured vehicular environment by supporting V2V, V2I, V2S, and V2P. By employing an SDN controller, IoV networks can leverage centralized control and enhanced manageability, leading to the emergence of Software-Defined Internet of Vehicles (SD-IoV) as a promising solution for future communications. However, the SD-IoV networks introduces a potential vulnerability in the form of a single point of failure, particularly susceptible to Distributed Denial of Service (DDoS) attacks. This is because of the centralized nature of SDN and the dynamic nature of IoV. In this context, the SDN controller becomes a prime target for attackers who flood it with massive packet-in messages. To address this security concern, we propose an efficient and lightweight attack detection and mitigation scheme within the SDN controller. The scheme includes a detection module that utilizes entropy and flow rate to identify patterns indicative of attack traffic behavior. Additionally, a mitigation module is designed to minimize the effect of attack traffic on the normal operation, this is performed through analysis of payload lengths.The mitigation flow rule is set for specific traffic type if its payload is less than the threshold value to decrease the false positive rate. An adaptive threshold computation for all parameter values enhances the scheme’s effectiveness. We conducted simulations using SUMO, Mininet-WiFi, and Scapy. We evaluated the system performance by using Mininet-wifi SDN simulation tool and Ryu controller for control plane. The system detects DDoS attack traffic within a single window by checking both entropy and flow rate simultaneously. The simulation results demonstrate the efficacy of our proposed scheme in terms of detection time, accuracy, mitigation efficiency, controller load, and link bandwidth consumption, showcasing its superiority compared to existing works in the field.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme 物流监控系统中的视频安全:基于区块链的安全存储和访问控制方案
Pub Date : 2024-07-18 DOI: 10.1007/s10586-024-04667-1
Zigang Chen, Fan Liu, Danlong Li, Yuhong Liu, Xingchun Yang, Haihua Zhu

With the rapid development of the logistics industry and the continuous growth of e-commerce, effectively monitoring logistics warehouses has become increasingly important to ensure the security of goods and oversee activities within storage facilities. Although current surveillance systems provide a certain level of security for logistics warehouses, they still face issues such as data tampering, storage, and access management. These challenges can compromise the integrity of surveillance video data, making the system vulnerable to unauthorized access. To address these challenges, this paper proposes the implementation of blockchain-based security management and access control of video data in logistics warehouses. Specifically, the solution employs the Hyperledger Fabric consortium blockchain to execute smart contracts and store the hash values of video data, thereby detecting any tampering and enhancing the security and integrity of the data. Additionally, hybrid encryption technology is utilized to ensure the confidentiality of video data during transmission and storage. Furthermore, the solution leverages the InterPlanetary File System (IPFS) for distributed video storage. This not only increases the redundancy and accessibility of data storage but also reduces the risk of single-point failures. A Role-Based Access Control (RBAC) mechanism is also introduced to strictly manage access permissions to video data, ensuring that only authorized users can access the data, thereby effectively preventing unauthorized access and data breaches. Through a comprehensive analysis of computational and communication costs and the evaluation of blockchain performance at 100 transactions per second for different transaction volumes using Hyperledger Caliper, the results demonstrate the effectiveness and efficiency of the proposed method. Compared to current research, this solution exhibits higher security, providing a new approach for the secure management and access control of video data in logistics warehouses.

随着物流业的快速发展和电子商务的持续增长,有效监控物流仓库对于确保货物安全和监督仓储设施内的活动变得越来越重要。尽管当前的监控系统为物流仓库提供了一定程度的安全保障,但仍面临着数据篡改、存储和访问管理等问题。这些挑战会损害监控视频数据的完整性,使系统容易受到未经授权的访问。为应对这些挑战,本文提出在物流仓库中实现基于区块链的视频数据安全管理和访问控制。具体来说,该解决方案采用 Hyperledger Fabric 联盟区块链来执行智能合约并存储视频数据的哈希值,从而检测任何篡改行为并增强数据的安全性和完整性。此外,还利用混合加密技术确保视频数据在传输和存储过程中的保密性。此外,该解决方案还利用专有文件系统(IPFS)进行分布式视频存储。这不仅增加了数据存储的冗余性和可访问性,还降低了单点故障的风险。此外,还引入了基于角色的访问控制(RBAC)机制,严格管理视频数据的访问权限,确保只有授权用户才能访问数据,从而有效防止未经授权的访问和数据泄露。通过对计算成本和通信成本的综合分析,以及使用 Hyperledger Caliper 对不同交易量下每秒 100 笔交易的区块链性能进行评估,结果证明了所提方法的有效性和高效性。与目前的研究相比,该解决方案具有更高的安全性,为物流仓库视频数据的安全管理和访问控制提供了一种新方法。
{"title":"Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme","authors":"Zigang Chen, Fan Liu, Danlong Li, Yuhong Liu, Xingchun Yang, Haihua Zhu","doi":"10.1007/s10586-024-04667-1","DOIUrl":"https://doi.org/10.1007/s10586-024-04667-1","url":null,"abstract":"<p>With the rapid development of the logistics industry and the continuous growth of e-commerce, effectively monitoring logistics warehouses has become increasingly important to ensure the security of goods and oversee activities within storage facilities. Although current surveillance systems provide a certain level of security for logistics warehouses, they still face issues such as data tampering, storage, and access management. These challenges can compromise the integrity of surveillance video data, making the system vulnerable to unauthorized access. To address these challenges, this paper proposes the implementation of blockchain-based security management and access control of video data in logistics warehouses. Specifically, the solution employs the Hyperledger Fabric consortium blockchain to execute smart contracts and store the hash values of video data, thereby detecting any tampering and enhancing the security and integrity of the data. Additionally, hybrid encryption technology is utilized to ensure the confidentiality of video data during transmission and storage. Furthermore, the solution leverages the InterPlanetary File System (IPFS) for distributed video storage. This not only increases the redundancy and accessibility of data storage but also reduces the risk of single-point failures. A Role-Based Access Control (RBAC) mechanism is also introduced to strictly manage access permissions to video data, ensuring that only authorized users can access the data, thereby effectively preventing unauthorized access and data breaches. Through a comprehensive analysis of computational and communication costs and the evaluation of blockchain performance at 100 transactions per second for different transaction volumes using Hyperledger Caliper, the results demonstrate the effectiveness and efficiency of the proposed method. Compared to current research, this solution exhibits higher security, providing a new approach for the secure management and access control of video data in logistics warehouses.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy-aware ant colony optimization strategy for virtual machine placement in cloud computing 云计算中虚拟机放置的能量感知蚁群优化策略
Pub Date : 2024-07-18 DOI: 10.1007/s10586-024-04670-6
Lin-Tao Duan, Jin Wang, Hai-Ying Wang

Virtual machine placement (VMP) directly impacts the energy consumption, resource utilization, and service quality of cloud data centers (CDCs), and it has become an active research topic in cloud computing. Inspired by the ant colony system (ACS) which has been proven effective metaheuristic approach for solving NP-hard problems, this paper proposes an improved ACS-based energy efficiency strategy (EEACS) for VMP problems. Our approach considers each virtual machine (VM) as an energy-consuming block, taking into account its individual energy requirements. EEACS ranks the physical machines (PMs) in a CDC in descending order based on their energy efficiency and optimizes both server selection and pheromone updating rules within the ACS. By guiding artificial ants towards promising solutions that balance energy consumption and resource utilization, EEACS ensures that VMs are placed efficiently based on pheromone and heuristic information. Extensive simulations in both homogeneous and heterogeneous computing environments demonstrate the effectiveness of our proposed strategy. The experimental results show that the EEACS enhances the resource utilization and achieves a notable reduction in energy consumption in comparison to conventional heuristic and evolutionary-based algorithms.

虚拟机放置(VMP)直接影响云数据中心(CDC)的能耗、资源利用率和服务质量,已成为云计算领域一个活跃的研究课题。蚁群系统(ACS)已被证明是解决 NP 难问题的有效元启发式方法,受此启发,本文针对 VMP 问题提出了一种基于 ACS 的改进型能效策略(EEACS)。我们的方法将每个虚拟机(VM)视为一个耗能块,并考虑到其各自的能源需求。EEACS 根据能源效率对 CDC 中的物理机(PM)进行降序排列,并优化 ACS 中的服务器选择和信息素更新规则。EEACS 通过引导人工蚂蚁选择能耗和资源利用率相平衡的可行解决方案,确保根据信息素和启发式信息高效地放置虚拟机。在同构和异构计算环境中进行的大量仿真证明了我们提出的策略的有效性。实验结果表明,与传统的启发式算法和基于进化的算法相比,EEACS 提高了资源利用率,并显著降低了能耗。
{"title":"An energy-aware ant colony optimization strategy for virtual machine placement in cloud computing","authors":"Lin-Tao Duan, Jin Wang, Hai-Ying Wang","doi":"10.1007/s10586-024-04670-6","DOIUrl":"https://doi.org/10.1007/s10586-024-04670-6","url":null,"abstract":"<p>Virtual machine placement (VMP) directly impacts the energy consumption, resource utilization, and service quality of cloud data centers (CDCs), and it has become an active research topic in cloud computing. Inspired by the ant colony system (ACS) which has been proven effective metaheuristic approach for solving NP-hard problems, this paper proposes an improved ACS-based energy efficiency strategy (EEACS) for VMP problems. Our approach considers each virtual machine (VM) as an energy-consuming block, taking into account its individual energy requirements. EEACS ranks the physical machines (PMs) in a CDC in descending order based on their energy efficiency and optimizes both server selection and pheromone updating rules within the ACS. By guiding artificial ants towards promising solutions that balance energy consumption and resource utilization, EEACS ensures that VMs are placed efficiently based on pheromone and heuristic information. Extensive simulations in both homogeneous and heterogeneous computing environments demonstrate the effectiveness of our proposed strategy. The experimental results show that the EEACS enhances the resource utilization and achieves a notable reduction in energy consumption in comparison to conventional heuristic and evolutionary-based algorithms.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study 5G sub-6 GHz 频段的 ML 模型性能分析:实验研究
Pub Date : 2024-07-18 DOI: 10.1007/s10586-024-04677-z
Avuthu Avinash Reddy, Ramesh babu Battula, Dinesh Gopalani

Massive Machine Type Communication (mMTC) uses sub-6 GHz bands frequency bands for their applications in the 5G network. The exponential growth of mMTC wireless networks has made these bands overcrowded. Due to the increase in wireless traffic, spectrum scarcity is a significant constraint at sub-6 GHz bands for the 5G and beyond networks. Cognitive radio technology uses spectrum sensing (SS) techniques to access the spectrum opportunistically to resolve this issue where signal processing techniques (SPTs) are considered to design SS. However, the adaptiveness of SPTs is not feasible in the real-time environment due to the random spectrum access behaviour of the primary user and the fading environment. To minimize this issue, machine learning (ML) models are adapted. Different ML models are examined, and their performance is analyzed to find a better accuracy model in spectrum hole identification at 5G sub-6 GHz bands. The dataset of large-scale frequency samples is built from a universal software radio peripheral (USRP—2953R) at sub-6 GHz bands over (eta - mu) fading environmental conditions. A highly imbalanced dataset issue is reduced and compared with varying resampling techniques, and random oversampling is best to resolve the anomalies in the dataset. Random forest, naive Bayes, logistic regression, K-nearest neighbor, and decision trees are primary classifiers to train and detect the spectrum holes at 5G sub-6 GHz bands. Random forest outperforms the remaining ML models in spectrum hole identification in terms of probability of detection and accuracy.

大规模机器类型通信(mMTC)在 5G 网络中的应用使用 6 GHz 以下的频段。mMTC 无线网络的指数级增长使这些频段变得拥挤不堪。由于无线通信量的增加,频谱稀缺成为 5G 及其他网络 6 GHz 以下频段的一个重大制约因素。认知无线电技术利用频谱感知(SS)技术伺机访问频谱,以解决这一问题,其中信号处理技术(SPT)被认为是设计 SS 的关键。然而,由于主用户的随机频谱访问行为和衰减环境,SPT 的适应性在实时环境中并不可行。为了尽量减少这一问题,我们采用了机器学习(ML)模型。对不同的 ML 模型进行了研究,并分析了它们的性能,以便在 5G sub-6 GHz 频段的频谱洞识别中找到精度更高的模型。大规模频率样本数据集是在6GHz以下频段,在(ea - mu)衰减环境条件下,通过通用软件无线电外设(USRP-2953R)建立的。高度不平衡的数据集问题被减少,并与不同的重采样技术进行比较,随机超采样是解决数据集异常的最佳方法。随机森林、天真贝叶斯、逻辑回归、K-近邻和决策树是训练和检测 5G sub-6 GHz 频段频谱空洞的主要分类器。在频谱空洞识别方面,随机森林在检测概率和准确性方面优于其余的 ML 模型。
{"title":"Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study","authors":"Avuthu Avinash Reddy, Ramesh babu Battula, Dinesh Gopalani","doi":"10.1007/s10586-024-04677-z","DOIUrl":"https://doi.org/10.1007/s10586-024-04677-z","url":null,"abstract":"<p>Massive Machine Type Communication (mMTC) uses sub-6 GHz bands frequency bands for their applications in the 5G network. The exponential growth of mMTC wireless networks has made these bands overcrowded. Due to the increase in wireless traffic, spectrum scarcity is a significant constraint at sub-6 GHz bands for the 5G and beyond networks. Cognitive radio technology uses spectrum sensing (SS) techniques to access the spectrum opportunistically to resolve this issue where signal processing techniques (SPTs) are considered to design SS. However, the adaptiveness of SPTs is not feasible in the real-time environment due to the random spectrum access behaviour of the primary user and the fading environment. To minimize this issue, machine learning (ML) models are adapted. Different ML models are examined, and their performance is analyzed to find a better accuracy model in spectrum hole identification at 5G sub-6 GHz bands. The dataset of large-scale frequency samples is built from a universal software radio peripheral (USRP—2953R) at sub-6 GHz bands over <span>(eta - mu)</span> fading environmental conditions. A highly imbalanced dataset issue is reduced and compared with varying resampling techniques, and random oversampling is best to resolve the anomalies in the dataset. Random forest, naive Bayes, logistic regression, K-nearest neighbor, and decision trees are primary classifiers to train and detect the spectrum holes at 5G sub-6 GHz bands. Random forest outperforms the remaining ML models in spectrum hole identification in terms of probability of detection and accuracy.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel estimation for RIS-aided MIMO systems in MmWave wireless communications with a few active elements 具有少量有源元件的毫米波无线通信中 RIS 辅助多输入多输出系统的信道估计
Pub Date : 2024-07-17 DOI: 10.1007/s10586-024-04627-9
Walid K. Ghamry, Suzan Shukry

Accurate channel estimation poses a significant challenge in the reconfigurable intelligent surface (RIS)-aided millimeter-wave (mmWave) wireless communication system. The fully passive nature of the RIS primarily relies on cascaded channel estimation, given its limitation in transmitting and receiving signals. Although the advantageous of this approach, the increase in the number of RIS elements leads to an exponential growth in the channel coefficient, resulting in costly pilot overhead. To address this challenge, the paper proposes a two-phase framework for separate channel estimation. The framework involves incorporating a few active elements within the passive RIS, enabling the reception and processing of pilot signals at the RIS. Through leveraging the difference in coherence time of the channel, the estimation of the time-varying channel among user equipment (UE) and RIS, as well as the estimation of the pseudo-static channel among RIS and base station (BS), can be performed separately. The two-phase separate channel estimation framework operates as follows: In the first phase, the BS-RIS channel is estimated at the RIS through the utilization of the few active elements. An iterative weighting methodology is employed to formulate the mathematical optimization problem for estimating the BS-RIS signal model. Subsequently, a proposed algorithm grounded on gradient descent (GD) is introduced to efficiently address and solve the optimization problem. In the second phase, the estimation of the UE-RIS channel is achieved by transforming the signal model of the received channel into an analogous tensor model known as Parallel Factor (PARAFAC). This transformation is followed by the application of the least squares (LS) algorithm within this tensor-based representation at BS. The effectiveness of the proposed framework is demonstrated through simulation findings, considering minimum pilot overhead, average spectral efficiency, and normalized mean square error (NMSE). A comparative analysis is performed with three other state-of-the-art existing schemes.

在可重构智能表面(RIS)辅助毫米波(mmWave)无线通信系统中,精确的信道估计是一项重大挑战。由于 RIS 在发射和接收信号方面的限制,其完全被动的特性主要依赖于级联信道估计。虽然这种方法很有优势,但随着 RIS 元素数量的增加,信道系数也会呈指数级增长,从而导致昂贵的先导开销。为应对这一挑战,本文提出了一种两阶段独立信道估计框架。该框架包括在无源 RIS 中加入一些有源元件,使 RIS 能够接收和处理先导信号。通过利用信道相干时间的差异,用户设备(UE)和 RIS 之间的时变信道估计以及 RIS 和基站(BS)之间的伪静态信道估计可以分别进行。两阶段独立信道估计框架的工作原理如下:在第一阶段,通过利用为数不多的活动信元,在 RIS 估算 BS-RIS 信道。采用迭代加权方法来制定估计 BS-RIS 信号模型的数学优化问题。随后,提出了一种基于梯度下降(GD)的算法,以有效处理和解决优化问题。在第二阶段,UE-RIS 信道的估计是通过将接收信道的信号模型转换成一个类似的张量模型(称为并行因子 (PARAFAC))来实现的。转换之后,在 BS 上应用基于张量表示的最小二乘(LS)算法。考虑到最小先导开销、平均频谱效率和归一化均方误差 (NMSE),模拟结果证明了所提框架的有效性。与其他三种最先进的现有方案进行了比较分析。
{"title":"Channel estimation for RIS-aided MIMO systems in MmWave wireless communications with a few active elements","authors":"Walid K. Ghamry, Suzan Shukry","doi":"10.1007/s10586-024-04627-9","DOIUrl":"https://doi.org/10.1007/s10586-024-04627-9","url":null,"abstract":"<p>Accurate channel estimation poses a significant challenge in the reconfigurable intelligent surface (RIS)-aided millimeter-wave (mmWave) wireless communication system. The fully passive nature of the RIS primarily relies on cascaded channel estimation, given its limitation in transmitting and receiving signals. Although the advantageous of this approach, the increase in the number of RIS elements leads to an exponential growth in the channel coefficient, resulting in costly pilot overhead. To address this challenge, the paper proposes a two-phase framework for separate channel estimation. The framework involves incorporating a few active elements within the passive RIS, enabling the reception and processing of pilot signals at the RIS. Through leveraging the difference in coherence time of the channel, the estimation of the time-varying channel among user equipment (UE) and RIS, as well as the estimation of the pseudo-static channel among RIS and base station (BS), can be performed separately. The two-phase separate channel estimation framework operates as follows: In the first phase, the BS-RIS channel is estimated at the RIS through the utilization of the few active elements. An iterative weighting methodology is employed to formulate the mathematical optimization problem for estimating the BS-RIS signal model. Subsequently, a proposed algorithm grounded on gradient descent (GD) is introduced to efficiently address and solve the optimization problem. In the second phase, the estimation of the UE-RIS channel is achieved by transforming the signal model of the received channel into an analogous tensor model known as Parallel Factor (PARAFAC). This transformation is followed by the application of the least squares (LS) algorithm within this tensor-based representation at BS. The effectiveness of the proposed framework is demonstrated through simulation findings, considering minimum pilot overhead, average spectral efficiency, and normalized mean square error (NMSE). A comparative analysis is performed with three other state-of-the-art existing schemes.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141717443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing 在云计算中利用局部主导模式和水印加密技术实现基于内容的安全高效图像检索
Pub Date : 2024-07-17 DOI: 10.1007/s10586-024-04635-9
G. Sucharitha, Deepthi Godavarthi, Janjhyam Venkata Naga Ramesh, M. Ijaz Khan

The relevance of images in people's daily lives is growing, and content-based image retrieval (CBIR) has received a lot of attention in research. Images are much better at communicating information than text documents. This paper deals with security and efficient retrieval of images based on the texture features extracted by the dominant local patterns of an image in cloud. Here, we proposed a method that supports secure and efficient image retrieval over cloud. The images are encrypted with the watermark before deploying the image database to the cloud, this process prevents from the outflow of sensitive information to the cloud. A reduced dimension feature vector database has been created for all the images using relative directional edge patterns (RDEP), facilitating efficient storage and retrieval. The significance of the specified local pattern for effectively extracting texture information has been demonstrated. A notable level of accuracy has been established when compared to existing algorithms in terms of precision and recall. Additionally, a watermark-based system is proposed to prevent unauthorized query users from illicitly copying and distributing the acquired images to others. An inimitable watermark is entrenched into the image by the encryption module before storing into the cloud. Hence, when an image copy is discovered, the watermark extraction can be used to track down the illegal query image user who circulated the image. The proposed method's significance is assessed by comparing it to other existing feature extractors incorporating watermark encryption. Additionally, the effectiveness of the method is demonstrated across various numbers of watermark bits. Trials and security analyses affirm that the suggested approach is both robust and efficient.

图像在人们日常生活中的重要性与日俱增,而基于内容的图像检索(CBIR)在研究中受到了广泛关注。与文本文档相比,图像的信息传达能力更强。本文探讨了基于云图像局部主导模式提取的纹理特征的安全、高效图像检索。在此,我们提出了一种支持云端安全高效图像检索的方法。在将图像数据库部署到云端之前,先用水印对图像进行加密,这一过程可防止敏感信息外流到云端。利用相对方向边缘模式(RDEP)为所有图像创建了一个缩减维度的特征向量数据库,从而提高了存储和检索效率。指定的局部模式对于有效提取纹理信息的重要性已得到证实。与现有算法相比,在精确度和召回率方面都达到了显著的准确水平。此外,还提出了一种基于水印的系统,以防止未经授权的查询用户非法复制和向他人传播获取的图像。在将图像存储到云端之前,加密模块会在图像中植入不可模仿的水印。因此,当发现图像拷贝时,可以通过提取水印来追踪传播图像的非法查询用户。通过与其他包含水印加密的现有特征提取器进行比较,评估了所提出方法的重要性。此外,还展示了该方法在不同水印位数下的有效性。试验和安全分析表明,建议的方法既稳健又高效。
{"title":"Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing","authors":"G. Sucharitha, Deepthi Godavarthi, Janjhyam Venkata Naga Ramesh, M. Ijaz Khan","doi":"10.1007/s10586-024-04635-9","DOIUrl":"https://doi.org/10.1007/s10586-024-04635-9","url":null,"abstract":"<p>The relevance of images in people's daily lives is growing, and content-based image retrieval (CBIR) has received a lot of attention in research. Images are much better at communicating information than text documents. This paper deals with security and efficient retrieval of images based on the texture features extracted by the dominant local patterns of an image in cloud. Here, we proposed a method that supports secure and efficient image retrieval over cloud. The images are encrypted with the watermark before deploying the image database to the cloud, this process prevents from the outflow of sensitive information to the cloud. A reduced dimension feature vector database has been created for all the images using relative directional edge patterns (RDEP), facilitating efficient storage and retrieval. The significance of the specified local pattern for effectively extracting texture information has been demonstrated. A notable level of accuracy has been established when compared to existing algorithms in terms of precision and recall. Additionally, a watermark-based system is proposed to prevent unauthorized query users from illicitly copying and distributing the acquired images to others. An inimitable watermark is entrenched into the image by the encryption module before storing into the cloud. Hence, when an image copy is discovered, the watermark extraction can be used to track down the illegal query image user who circulated the image. The proposed method's significance is assessed by comparing it to other existing feature extractors incorporating watermark encryption. Additionally, the effectiveness of the method is demonstrated across various numbers of watermark bits. Trials and security analyses affirm that the suggested approach is both robust and efficient.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1