Pub Date : 2025-06-19DOI: 10.1016/j.csi.2025.104034
Mazin Taha , Ting Zhong , Rashad Elhabob , Hu Xiong , Mohammed Amoon , Saru Kumari
Integrating the Industrial Internet of Things (IIoT) and cloud computing is increasingly prevalent in modern business. However, to safeguard data privacy in the cloud server (CS), sensitive information must be encrypted prior to uploading to a CS. The real challenge is searching encrypted data without compromising speed or security. Public Key Encryption with Keyword Search (PEKS) schemes enable the search of ciphertexts without exposing sensitive information. This article introduces a novel Certificateless Searchable Encryption with Cryptographic Reverse Firewalls (CL-SE-CRF). Meanwhile, the proposed scheme addresses the PEKS limitations by removing the requirement for conventional certificate management and addressing concerns related to key escrow. In addition, the security analysis demonstrates that the CL-SE-CRF scheme can prevent and resist keyword guessing attacks (KGA), algorithm substitution attacks (ASA), and chosen keyword attacks (CKA). Furthermore, experimental results demonstrate that the CL-SE-CRF significantly reduces communication and computation costs in the IIoT compared to similar protocols. Therefore, the proposed scheme is helpful for IIoT applications.
{"title":"Certificateless searchable encryption with cryptographic reverse firewalls for IIoT","authors":"Mazin Taha , Ting Zhong , Rashad Elhabob , Hu Xiong , Mohammed Amoon , Saru Kumari","doi":"10.1016/j.csi.2025.104034","DOIUrl":"10.1016/j.csi.2025.104034","url":null,"abstract":"<div><div>Integrating the Industrial Internet of Things (IIoT) and cloud computing is increasingly prevalent in modern business. However, to safeguard data privacy in the cloud server (CS), sensitive information must be encrypted prior to uploading to a CS. The real challenge is searching encrypted data without compromising speed or security. Public Key Encryption with Keyword Search (PEKS) schemes enable the search of ciphertexts without exposing sensitive information. This article introduces a novel Certificateless Searchable Encryption with Cryptographic Reverse Firewalls (CL-SE-CRF). Meanwhile, the proposed scheme addresses the PEKS limitations by removing the requirement for conventional certificate management and addressing concerns related to key escrow. In addition, the security analysis demonstrates that the CL-SE-CRF scheme can prevent and resist keyword guessing attacks (KGA), algorithm substitution attacks (ASA), and chosen keyword attacks (CKA). Furthermore, experimental results demonstrate that the CL-SE-CRF significantly reduces communication and computation costs in the IIoT compared to similar protocols. Therefore, the proposed scheme is helpful for IIoT applications.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104034"},"PeriodicalIF":4.1,"publicationDate":"2025-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144522219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-06-19DOI: 10.1016/j.csi.2025.104020
Antonio López Martínez , Montassar Naghmouchi , Maryline Laurent , Joaquín García Alfaro , Manuel Gil Pérez , Antonio Ruiz Martínez
The digitization of healthcare data has heightened concerns about security, privacy, and interoperability. Traditional centralized systems are vulnerable to cyberattacks and data breaches, risking the exposure of sensitive patient information and decreasing trust in digital healthcare services. In addition, healthcare stakeholders use various standards and formats, creating challenges for data sharing and seamless communication. To address these points, this article identifies all the healthcare stakeholders and translates each useful element of a patient’s electronic health record (EHR) into Fast Healthcare Interoperability Resources (FHIR), to propose a complete role-based access control model that specifies which FHIR resources an actor is allowed to access. To validate this role model, three new use cases are defined, in which the various stakeholders interact and access the FHIR resources. Moreover, specific smart contracts are detailed to implement the role model in an automated way and provide a robust access control mechanism within healthcare organizations. The feasibility of the proposed access control mechanism is demonstrated through proof-of-concept and test performance measurements. Finally, the solution is validated as a realistic solution adapted to the scale of a country based on health statistics.
{"title":"Breaking barriers in healthcare: A secure identity framework for seamless access","authors":"Antonio López Martínez , Montassar Naghmouchi , Maryline Laurent , Joaquín García Alfaro , Manuel Gil Pérez , Antonio Ruiz Martínez","doi":"10.1016/j.csi.2025.104020","DOIUrl":"10.1016/j.csi.2025.104020","url":null,"abstract":"<div><div>The digitization of healthcare data has heightened concerns about security, privacy, and interoperability. Traditional centralized systems are vulnerable to cyberattacks and data breaches, risking the exposure of sensitive patient information and decreasing trust in digital healthcare services. In addition, healthcare stakeholders use various standards and formats, creating challenges for data sharing and seamless communication. To address these points, this article identifies all the healthcare stakeholders and translates each useful element of a patient’s electronic health record (EHR) into Fast Healthcare Interoperability Resources (FHIR), to propose a complete role-based access control model that specifies which FHIR resources an actor is allowed to access. To validate this role model, three new use cases are defined, in which the various stakeholders interact and access the FHIR resources. Moreover, specific smart contracts are detailed to implement the role model in an automated way and provide a robust access control mechanism within healthcare organizations. The feasibility of the proposed access control mechanism is demonstrated through proof-of-concept and test performance measurements. Finally, the solution is validated as a realistic solution adapted to the scale of a country based on health statistics.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104020"},"PeriodicalIF":4.1,"publicationDate":"2025-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144470925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-06-18DOI: 10.1016/j.csi.2025.104029
Xinrong Sun , Fanyu Kong , Yunting Tao , Pengyu Cui , Guoyan Zhang , Chunpeng Ge , Baodong Qin
With the widespread deployment of smart sensors, multi-view data has been widely used. Accordingly, multi-view processing algorithms are increasingly researched, among which the cluster-weighted kernel k-means method is an effective approach to dig up information of different views. However, large-scale multi-view data make it difficult to conduct processing algorithms. Therefore, outsourcing complex computations to servers based on privacy-preserving techniques is an effective solution that enables efficient multi-view data analysis. In previous secure outsourcing schemes, the efficiency of the outsourcing process and the fairness of outsourcing transactions are still challenging issues that have not been addressed. In this paper, we propose a blockchain-aided secure and fair multi-view data outsourcing computation scheme. We present an efficient matrix encryption method utilizing a novel secret key matrix to complete cluster-weighted kernel k-means algorithm securely. Different from previous works, we first apply the sparse symmetric orthogonal matrix to encrypt and decrypt sensitive data matrices, which avoids inverse or transposed secret key matrix computation and enhances the efficiency of the outsourcing process. Additionally, we introduce smart contracts to achieve fair outsourcing transactions aided by blockchain. We verify the returned result with the assistance of verifiers based on encrypted data, which improves the efficiency and security of outsourcing transactions. The experimental results indicate that our scheme is 4.72% to 8.52% superior to the state-of-the-art matrix outsourcing computation schemes and achieves 55.79% to 91.95% efficiency improvement compared to the original multi-view data processing method.
{"title":"Blockchain-aided secure and fair multi-view data outsourcing computation scheme","authors":"Xinrong Sun , Fanyu Kong , Yunting Tao , Pengyu Cui , Guoyan Zhang , Chunpeng Ge , Baodong Qin","doi":"10.1016/j.csi.2025.104029","DOIUrl":"10.1016/j.csi.2025.104029","url":null,"abstract":"<div><div>With the widespread deployment of smart sensors, multi-view data has been widely used. Accordingly, multi-view processing algorithms are increasingly researched, among which the cluster-weighted kernel k-means method is an effective approach to dig up information of different views. However, large-scale multi-view data make it difficult to conduct processing algorithms. Therefore, outsourcing complex computations to servers based on privacy-preserving techniques is an effective solution that enables efficient multi-view data analysis. In previous secure outsourcing schemes, the efficiency of the outsourcing process and the fairness of outsourcing transactions are still challenging issues that have not been addressed. In this paper, we propose a blockchain-aided secure and fair multi-view data outsourcing computation scheme. We present an efficient matrix encryption method utilizing a novel secret key matrix to complete cluster-weighted kernel k-means algorithm securely. Different from previous works, we first apply the sparse symmetric orthogonal matrix to encrypt and decrypt sensitive data matrices, which avoids inverse or transposed secret key matrix computation and enhances the efficiency of the outsourcing process. Additionally, we introduce smart contracts to achieve fair outsourcing transactions aided by blockchain. We verify the returned result with the assistance of verifiers based on encrypted data, which improves the efficiency and security of outsourcing transactions. The experimental results indicate that our scheme is 4.72% to 8.52% superior to the state-of-the-art matrix outsourcing computation schemes and achieves 55.79% to 91.95% efficiency improvement compared to the original multi-view data processing method.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104029"},"PeriodicalIF":4.1,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144470974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-06-16DOI: 10.1016/j.csi.2025.104032
Qihong Chen, Changgen Peng, Dequan Xu
In this paper, we construct a lattice-based fuzzy Password Authentication Key Exchange protocol in universal composable model. Through the known Password Authentication Key Exchange scheme, the Randomized Fuzzy Equality protocol and the Oblivious Transfer protocol are introduced to improve Password Authentication Key Exchange into fuzzy Password Authentication Key Exchange. First, the parties go through two rounds of Oblivious Transfer protocol, and then the key exchange is achieved based on the information exchanged. fuzzy Password Authentication Key Exchange satisfies that even if there is noise in the passwords between users, key exchange is still possible. Therefore, fuzzy Password Authentication Key Exchange is suitable for more application scenarios compared to Password Authentication Key Exchange, and the construction is universal composable security.
{"title":"Fuzzy Password Authentication Key Exchange protocol in universal composable framework for blockchain privacy protection","authors":"Qihong Chen, Changgen Peng, Dequan Xu","doi":"10.1016/j.csi.2025.104032","DOIUrl":"10.1016/j.csi.2025.104032","url":null,"abstract":"<div><div>In this paper, we construct a lattice-based fuzzy Password Authentication Key Exchange protocol in universal composable model. Through the known Password Authentication Key Exchange scheme, the Randomized Fuzzy Equality protocol and the Oblivious Transfer protocol are introduced to improve Password Authentication Key Exchange into fuzzy Password Authentication Key Exchange. First, the parties go through two rounds of Oblivious Transfer protocol, and then the key exchange is achieved based on the information exchanged. fuzzy Password Authentication Key Exchange satisfies that even if there is noise in the passwords between users, key exchange is still possible. Therefore, fuzzy Password Authentication Key Exchange is suitable for more application scenarios compared to Password Authentication Key Exchange, and the construction is universal composable security.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104032"},"PeriodicalIF":4.1,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144331256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-06-03DOI: 10.1016/j.csi.2025.104031
Morgan E. Edwards , Jing Chen , Jeremiah D. Still
Phishing attacks, a common cybersecurity threat, aim to deceive end-users into revealing sensitive information. While Human Factors researchers have extensively examined phishing in the email vector, the emergence of phishing in the SMS vector, known as SMiShing, has presented a new challenge. This study breaks new ground by investigating whether a conventional behavioral nudge intervention designed to combat email phishing can be effectively applied to SMiShing. A reflective nudge was implemented, providing participants with a message to encourage appropriate behavior. They were then tasked to sort email and text messages based on legitimacy. We manipulated the presence of nudge (present or absent) and the platform (email or text). Participants’ performance was measured using Signal Detection Theory, and they were asked to provide confidence ratings for each legitimacy decision. Our key findings revealed that the conventional nudge improved performance for email decisions, although it decreased user confidence. For text messages, the nudge hindered participants’ discrimination ability and did not significantly influence response bias performance or confidence ratings. Unfortunately, the effectiveness of the nudge did not simply transfer to text messages. We reflect on how to redesign the conventional nudge to increase its effectiveness against SMiShing.
{"title":"Can a conventional email phishing nudge help fight SMiShing attacks?","authors":"Morgan E. Edwards , Jing Chen , Jeremiah D. Still","doi":"10.1016/j.csi.2025.104031","DOIUrl":"10.1016/j.csi.2025.104031","url":null,"abstract":"<div><div>Phishing attacks, a common cybersecurity threat, aim to deceive end-users into revealing sensitive information. While Human Factors researchers have extensively examined phishing in the email vector, the emergence of phishing in the SMS vector, known as SMiShing, has presented a new challenge. This study breaks new ground by investigating whether a conventional behavioral nudge intervention designed to combat email phishing can be effectively applied to SMiShing. A reflective nudge was implemented, providing participants with a message to encourage appropriate behavior. They were then tasked to sort email and text messages based on legitimacy. We manipulated the presence of nudge (present or absent) and the platform (email or text). Participants’ performance was measured using Signal Detection Theory, and they were asked to provide confidence ratings for each legitimacy decision. Our key findings revealed that the conventional nudge improved performance for email decisions, although it decreased user confidence. For text messages, the nudge hindered participants’ discrimination ability and did not significantly influence response bias performance or confidence ratings. Unfortunately, the effectiveness of the nudge did not simply transfer to text messages. We reflect on how to redesign the conventional nudge to increase its effectiveness against SMiShing.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104031"},"PeriodicalIF":4.1,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144255459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-06-03DOI: 10.1016/j.csi.2025.104033
P. Dhavakumar , S. Vengadeswaran
The major objective of Software Defect Prediction (SDP) is to detect code location where errors are likely to occur to focus testing efforts on more suspect areas. Therefore, a high-quality software is developed that takes lesser time without effort. The dataset used for SDP usually contains more non-defective examples than defective examples. SDP is an important activity in software engineering that detect potential defects in software systems before they occur. For that, this paper proposes a Software Defect Prediction using Graph Sample and Aggregate-Attention Network optimized with Nomadic people Optimizer for enhancing the Software Reliability (graphSAGE-NPO-SDP). Here, the data are taken from Promise Repository dataset and given to the pre-processing. The pre-processing is done by normalization techniques of Min-Max Scaling. After preprocessing, the features are selected under Univariate Ensemble Feature Selection technique (UEFST). The classification process is performed by graphSAGE. The classification results are classified as defect class and non-defective class. The performance metrics, like Accuracy, Execution time, F-measure, Precision, Root Mean Square Error, Sensitivity, and Specificity is examined. The proposed graphSAGE-NPO-SDP method attains higher accuracy 32.45 %, 36.48 % and 28.34 % when compared to the existing models: Complexity-based over sampling technique in SDP (COT-ACI-SDP), Classification Method for SDP utilizing multiple filter feature selection approach (MLP-SDP), Boosted WOA-SDP and hybrid model depending on deep neural network based for SDP under Software Metrics (DNN-GA-SDP) respectively.
{"title":"Software defect prediction using graph sample and aggregate-attention network optimized with nomadic people optimizer for enhancing the software reliability","authors":"P. Dhavakumar , S. Vengadeswaran","doi":"10.1016/j.csi.2025.104033","DOIUrl":"10.1016/j.csi.2025.104033","url":null,"abstract":"<div><div>The major objective of Software Defect Prediction (SDP) is to detect code location where errors are likely to occur to focus testing efforts on more suspect areas. Therefore, a high-quality software is developed that takes lesser time without effort. The dataset used for SDP usually contains more non-defective examples than defective examples. SDP is an important activity in software engineering that detect potential defects in software systems before they occur. For that, this paper proposes a Software Defect Prediction using Graph Sample and Aggregate-Attention Network optimized with Nomadic people Optimizer for enhancing the Software Reliability (graphSAGE-NPO-SDP). Here, the data are taken from Promise Repository dataset and given to the pre-processing. The pre-processing is done by normalization techniques of Min-Max Scaling. After preprocessing, the features are selected under Univariate Ensemble Feature Selection technique (UEFST). The classification process is performed by graphSAGE. The classification results are classified as defect class and non-defective class. The performance metrics, like Accuracy, Execution time, F-measure, Precision, Root Mean Square Error, Sensitivity, and Specificity is examined. The proposed graphSAGE-NPO-SDP method attains higher accuracy 32.45 %, 36.48 % and 28.34 % when compared to the existing models: Complexity-based over sampling technique in SDP (COT-ACI-SDP), Classification Method for SDP utilizing multiple filter feature selection approach (MLP-SDP), Boosted WOA-SDP and hybrid model depending on deep neural network based for SDP under Software Metrics (DNN-GA-SDP) respectively.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104033"},"PeriodicalIF":4.1,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144262586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-28DOI: 10.1016/j.csi.2025.104019
Hongtao Li , Xinyu Li , Ximeng Liu , Bo Wang , Jie Wang , Youliang Tian
A large-scale model is typically trained on an extensive dataset to update its parameters and enhance its classification capabilities. However, directly using such data can raise significant privacy concerns, especially in the medical field, where datasets often contain sensitive patient information. Federated Learning (FL) offers a solution by enabling multiple parties to collaboratively train a high-performance model without sharing their raw data. Despite this, during the federated training process, attackers can still potentially extract private information from local models. To bolster privacy protections, Differential Privacy (DP) has been introduced to FL, providing stringent safeguards. However, the combination of DP and data heterogeneity can often lead to reduced model accuracy. To tackle these challenges, we introduce a sampling-memory mechanism, FedSam, which improves the accuracy of the global model while maintaining the required noise levels for differential privacy. This mechanism also mitigates the adverse effects of data heterogeneity in heterogeneous federated environments, thereby improving the global model’s overall performance. Experimental evaluations on datasets demonstrate the superiority of our approach. FedSam achieves a classification accuracy of 95.03%, significantly outperforming traditional DP-FedAvg (91.74%) under the same privacy constraints, highlighting FedSam’s robustness and efficiency.
{"title":"FedSam: Enhancing federated learning accuracy with differential privacy and data heterogeneity mitigation","authors":"Hongtao Li , Xinyu Li , Ximeng Liu , Bo Wang , Jie Wang , Youliang Tian","doi":"10.1016/j.csi.2025.104019","DOIUrl":"10.1016/j.csi.2025.104019","url":null,"abstract":"<div><div>A large-scale model is typically trained on an extensive dataset to update its parameters and enhance its classification capabilities. However, directly using such data can raise significant privacy concerns, especially in the medical field, where datasets often contain sensitive patient information. Federated Learning (FL) offers a solution by enabling multiple parties to collaboratively train a high-performance model without sharing their raw data. Despite this, during the federated training process, attackers can still potentially extract private information from local models. To bolster privacy protections, Differential Privacy (DP) has been introduced to FL, providing stringent safeguards. However, the combination of DP and data heterogeneity can often lead to reduced model accuracy. To tackle these challenges, we introduce a sampling-memory mechanism, FedSam, which improves the accuracy of the global model while maintaining the required noise levels for differential privacy. This mechanism also mitigates the adverse effects of data heterogeneity in heterogeneous federated environments, thereby improving the global model’s overall performance. Experimental evaluations on datasets demonstrate the superiority of our approach. FedSam achieves a classification accuracy of 95.03%, significantly outperforming traditional DP-FedAvg (91.74%) under the same privacy constraints, highlighting FedSam’s robustness and efficiency.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104019"},"PeriodicalIF":4.1,"publicationDate":"2025-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144177794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Green Computing systems bank on sustainable energy sources for service management and request processing. The Internet of Things (IoT) assimilates such computing systems for resource sharing and service distribution. For providing optimized energy balancing and effective utilization of available energy, this research paper proposes a novel flexible energy management technique using federated learning i.e., (FEMT-FT) for reliable energy management between the computing IoT nodes. The equivalent energy management process verifies the energy availability for request processing whereas the reliable energy part identifies the terminating interval to replace the communicating devices. For this purpose, the computing devices' draining and required energy levels are identified in all the request processing and service disseminating instances. The learning trains different energy balancing models that achieve a better service dissemination ratio. In this method, interval termination and new interval allocations are continuous to maximize service dissemination and novel request processing. For the varying requests, the proposed method achieves 8.92 %, 12.31 %, and 8.55 % high service dissemination, energy conservation, and request processing rate respectively.
绿色计算系统以可持续能源为基础进行服务管理和请求处理。物联网(Internet of Things, IoT)吸收了这样的计算系统,用于资源共享和服务分配。为了提供优化的能量平衡和有效利用可用能量,本研究提出了一种新的灵活的能量管理技术,使用联邦学习即(FEMT-FT)在计算物联网节点之间进行可靠的能量管理。等效能量管理过程验证请求处理的能量可用性,而可靠能量部分识别替换通信设备的终止间隔。为此,在所有请求处理和服务传播实例中确定计算设备的消耗和所需的能量水平。学习训练不同的能量平衡模型,以达到更好的服务传播率。在该方法中,区间终止和新区间分配是连续的,以最大限度地提高服务的传播和新请求的处理。对于不同的请求,该方法的服务分发率、节能率和请求处理率分别达到8.92%、12.31%和8.55%。
{"title":"FEMT-FL: A novel flexible energy management technique using federated learning for energy management in IoT-based distributed green computing systems","authors":"Jaikumar R , Arun Sekar Rajasekaran , M.V. Nageswara Rao , Anand Nayyar","doi":"10.1016/j.csi.2025.104017","DOIUrl":"10.1016/j.csi.2025.104017","url":null,"abstract":"<div><div>Green Computing systems bank on sustainable energy sources for service management and request processing. The Internet of Things (IoT) assimilates such computing systems for resource sharing and service distribution. For providing optimized energy balancing and effective utilization of available energy, this research paper proposes a novel flexible energy management technique using federated learning i.e., (FEMT-FT) for reliable energy management between the computing IoT nodes. The equivalent energy management process verifies the energy availability for request processing whereas the reliable energy part identifies the terminating interval to replace the communicating devices. For this purpose, the computing devices' draining and required energy levels are identified in all the request processing and service disseminating instances. The learning trains different energy balancing models that achieve a better service dissemination ratio. In this method, interval termination and new interval allocations are continuous to maximize service dissemination and novel request processing. For the varying requests, the proposed method achieves 8.92 %, 12.31 %, and 8.55 % high service dissemination, energy conservation, and request processing rate respectively.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104017"},"PeriodicalIF":4.1,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143948945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-05DOI: 10.1016/j.csi.2025.104016
Meijuan Huang , Jingjie Gan , Bo Yang , Hongzhen Du , Yanqi Zhao
The issue of searching for data within ciphertext files in cloud storage is effectively resolved through public key encryption with keyword search (PEKS). The main security problem it has is the internal keyword guessing attack (IKGA), for which Huang et al. proposed a novel scheme, public key authenticated encryption with keyword search (PAEKS), which employs a combination of encryption and authentication to enhance the security of the scheme. Most PAEKS algorithms utilize bilinear pairings, which are inherently costly from a computational perspective and also offer only single-keyword ciphertext security guarantees. In light of the aforementioned considerations, this paper presents a PAEKS scheme that does not employ bilinear pairings. The scheme is demonstrated to satisfy the criteria of multi-ciphertext and multi-trapdoor security, based on the DDH assumption. Furthermore, the parallel search method is employed during the search phase with the objective of enhancing the overall efficiency of the search process. Ultimately, the experimental results demonstrate that the computational time of the proposed scheme is reduced by a factor of 7 to 28 compared to other schemes using bilinear pairings, and our scheme has higher search efficiency and is more suitable for practical applications.
{"title":"Efficient public key authenticated searchable encryption scheme without bilinear pairings","authors":"Meijuan Huang , Jingjie Gan , Bo Yang , Hongzhen Du , Yanqi Zhao","doi":"10.1016/j.csi.2025.104016","DOIUrl":"10.1016/j.csi.2025.104016","url":null,"abstract":"<div><div>The issue of searching for data within ciphertext files in cloud storage is effectively resolved through public key encryption with keyword search (PEKS). The main security problem it has is the internal keyword guessing attack (IKGA), for which Huang et al. proposed a novel scheme, public key authenticated encryption with keyword search (PAEKS), which employs a combination of encryption and authentication to enhance the security of the scheme. Most PAEKS algorithms utilize bilinear pairings, which are inherently costly from a computational perspective and also offer only single-keyword ciphertext security guarantees. In light of the aforementioned considerations, this paper presents a PAEKS scheme that does not employ bilinear pairings. The scheme is demonstrated to satisfy the criteria of multi-ciphertext and multi-trapdoor security, based on the DDH assumption. Furthermore, the parallel search method is employed during the search phase with the objective of enhancing the overall efficiency of the search process. Ultimately, the experimental results demonstrate that the computational time of the proposed scheme is reduced by a factor of 7 to 28 compared to other schemes using bilinear pairings, and our scheme has higher search efficiency and is more suitable for practical applications.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104016"},"PeriodicalIF":4.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143922938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-04DOI: 10.1016/j.csi.2025.104018
Zeynep İlkiliç Aytaç , İsmail İşeri , Beşir Dandil
Thyroid cancer is one of the most common endocrine malignancies, and early diagnosis is crucial for effective treatment. Fine-needle aspiration biopsy (FNAB) is widely used for diagnosis, but its accuracy depends on expert interpretation, which can be subjective. Recent advances in deep learning, particularly Convolutional Neural Networks (CNNs), have shown promise in automating and improving diagnostic accuracy from biopsy images. However, optimizing CNN architectures remains a challenge, as selecting the best layer parameters significantly impacts performance. Traditional approaches for selecting optimal CNN parameters often depend on exhaustive trial-and-error methods, which are computationally expensive and do not always yield globally optimal solutions. This process is both time-consuming and does not guarantee the precise attainment of an optimal CNN model. In this study, a novel approach is introduced to optimize CNN parameters by utilizing the COOT Metaheuristic Optimization Algorithm, proposing a new model named COOT-CNN for thyroid cancer detection. The COOT algorithm, formulated in 2021 and inspired by the behavioral optimization of waterfowl, is employed in this research to determine the optimal layers and parameters of the CNN model for thyroid cancer diagnosis. This method facilitates efficient optimization of layer parameters through a well-designed coding scheme. The model’s efficacy is assessed using thyroid fine needle aspiration biopsy data, categorized into two classes. Performance of the proposed approach is evaluated by comparing it with traditional CNN, Particle Swarm Optimization-based CNN model (PSOCNN), and Gray Wolf Optimization-based CNN model (GWOCNN). The proposed model was found to achieve higher accuracy compared to conventional CNN, PSOCNN, and GWOCNN models.
{"title":"A hybrid coot based CNN model for thyroid cancer detection","authors":"Zeynep İlkiliç Aytaç , İsmail İşeri , Beşir Dandil","doi":"10.1016/j.csi.2025.104018","DOIUrl":"10.1016/j.csi.2025.104018","url":null,"abstract":"<div><div>Thyroid cancer is one of the most common endocrine malignancies, and early diagnosis is crucial for effective treatment. Fine-needle aspiration biopsy (FNAB) is widely used for diagnosis, but its accuracy depends on expert interpretation, which can be subjective. Recent advances in deep learning, particularly Convolutional Neural Networks (CNNs), have shown promise in automating and improving diagnostic accuracy from biopsy images. However, optimizing CNN architectures remains a challenge, as selecting the best layer parameters significantly impacts performance. Traditional approaches for selecting optimal CNN parameters often depend on exhaustive trial-and-error methods, which are computationally expensive and do not always yield globally optimal solutions. This process is both time-consuming and does not guarantee the precise attainment of an optimal CNN model. In this study, a novel approach is introduced to optimize CNN parameters by utilizing the COOT Metaheuristic Optimization Algorithm, proposing a new model named COOT-CNN for thyroid cancer detection. The COOT algorithm, formulated in 2021 and inspired by the behavioral optimization of waterfowl, is employed in this research to determine the optimal layers and parameters of the CNN model for thyroid cancer diagnosis. This method facilitates efficient optimization of layer parameters through a well-designed coding scheme. The model’s efficacy is assessed using thyroid fine needle aspiration biopsy data, categorized into two classes. Performance of the proposed approach is evaluated by comparing it with traditional CNN, Particle Swarm Optimization-based CNN model (PSO<img>CNN), and Gray Wolf Optimization-based CNN model (GWO<img>CNN). The proposed model was found to achieve higher accuracy compared to conventional CNN, PSO<img>CNN, and GWO<img>CNN models.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104018"},"PeriodicalIF":4.1,"publicationDate":"2025-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143922937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}