Pub Date : 2024-06-29DOI: 10.1016/j.csi.2024.103883
Bich-Ngan T. Nguyen , Phuong N.H. Pham , Canh V. Pham , Vaclav Snasel
The Submodular Cover () problem has attracted the attention of researchers because of its wide variety of applications in many domains. Previous studies on this problem have focused on solving it under the assumption of a non-noise environment or using the greedy algorithm to solve it under noise. However, in some applications, the data is often large-scale and brings a noisy version, so the existing solutions are ineffective or not applicable to large and noisy data. Motivated by this phenomenon, we study the Submodular Cover under Noises () problem and propose two efficient streaming algorithms, which provide a solution with theoretical bounds under two common noise models, multiplicative and additive noises. The experimental results indicate that our proposed algorithms not only provide the solution with a high objective function value but also outperform the state-of-the-art algorithm in terms of both the number of queries and the running time.
{"title":"Fast bicriteria streaming algorithms for submodular cover problem under noise models","authors":"Bich-Ngan T. Nguyen , Phuong N.H. Pham , Canh V. Pham , Vaclav Snasel","doi":"10.1016/j.csi.2024.103883","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103883","url":null,"abstract":"<div><p>The Submodular Cover (<span><math><mi>SC</mi></math></span>) problem has attracted the attention of researchers because of its wide variety of applications in many domains. Previous studies on this problem have focused on solving it under the assumption of a non-noise environment or using the greedy algorithm to solve it under noise. However, in some applications, the data is often large-scale and brings a noisy version, so the existing solutions are ineffective or not applicable to large and noisy data. Motivated by this phenomenon, we study the Submodular Cover under Noises (<span><math><mi>SCN</mi></math></span>) problem and propose two efficient streaming algorithms, which provide a solution with theoretical bounds under two common noise models, multiplicative and additive noises. The experimental results indicate that our proposed algorithms not only provide the solution with a high objective function value but also outperform the state-of-the-art algorithm in terms of both the number of queries and the running time.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103883"},"PeriodicalIF":4.1,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-24DOI: 10.1016/j.csi.2024.103879
Ivan García , Carla Pacheco , Itahí López , Jose A. Calvo-Manzano , Brenda L. Flores-Rios
The educational use of serious games has increased in recent years and their pedagogical benefits have been widely documented, especially for teaching specialized knowledge on Software Engineering at undergraduate level. The results achieved by several studies in this area show that it has been possible to increase the student interest and motivation in learning complex topics that tend to be difficult to understand when knowledge is imparted through traditional lectures, as is the case with software process standards. In this regard, the ISO/IEC/IEEE 15939:2017 standard describes a software measurement process, one of the main topics that must be addressed in any curriculum for undergraduate degree programs in Software Engineering. However, despite their relevance in industry, many students are leaving university without basic software measurement skills. With the aim of identifying serious games for teaching the software measurement process at undergraduate level, a Systematic Literature Review was conducted in order to collect, classify and analyze information which enabled the authors of this study to propose a serious game that improves the understanding and education on the ISO/IEC/IEEE 15939:2017 standard. The results from an empirical evaluation involving Computer Science undergraduates provided evidence that positive learning experiences occurred when playing the created serious game.
{"title":"Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering course","authors":"Ivan García , Carla Pacheco , Itahí López , Jose A. Calvo-Manzano , Brenda L. Flores-Rios","doi":"10.1016/j.csi.2024.103879","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103879","url":null,"abstract":"<div><p>The educational use of serious games has increased in recent years and their pedagogical benefits have been widely documented, especially for teaching specialized knowledge on Software Engineering at undergraduate level. The results achieved by several studies in this area show that it has been possible to increase the student interest and motivation in learning complex topics that tend to be difficult to understand when knowledge is imparted through traditional lectures, as is the case with software process standards. In this regard, the ISO/IEC/IEEE 15939:2017 standard describes a software measurement process, one of the main topics that must be addressed in any curriculum for undergraduate degree programs in Software Engineering. However, despite their relevance in industry, many students are leaving university without basic software measurement skills. With the aim of identifying serious games for teaching the software measurement process at undergraduate level, a Systematic Literature Review was conducted in order to collect, classify and analyze information which enabled the authors of this study to propose a serious game that improves the understanding and education on the ISO/IEC/IEEE 15939:2017 standard. The results from an empirical evaluation involving Computer Science undergraduates provided evidence that positive learning experiences occurred when playing the created serious game.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103879"},"PeriodicalIF":4.1,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-22DOI: 10.1016/j.csi.2024.103881
Valeria Henriquez , Jose A. Calvo-Manzano , Ana M. Moreno , Tomas San Feliu
Agile is now a mainstream approach used by developer teams at software organizations. However, many of these organizations still employ traditional governance methods, negatively impacting agile team performance, quality and morale. To address this issue, we applied the Design Science Research Framework to develop Agile governance guidelines by harmonizing CMMI V2.0 and SAFe 5.0. Specifically, we matched CMMI V2.0 governance practices to SAFe 5.0 roles, practices and artefacts. The resulting guidelines were validated, first by means of a survey and then through interviews with process improvement practitioners and agile experts who worked on a fictitious case study. The survey participants, especially those more familiar with SAFe practices, stated that the proposed harmonization was meaningful. Agile experts participating in the case study confirmed that the proposed guidelines were practical and comprehensive, as well as consistent and complete. Pending further empirical validation, these guidelines constitute a crucial step towards Agile governance.
{"title":"Agile governance practices by aligning CMMI V2.0 with portfolio SAFe 5.0","authors":"Valeria Henriquez , Jose A. Calvo-Manzano , Ana M. Moreno , Tomas San Feliu","doi":"10.1016/j.csi.2024.103881","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103881","url":null,"abstract":"<div><p>Agile is now a mainstream approach used by developer teams at software organizations. However, many of these organizations still employ traditional governance methods, negatively impacting agile team performance, quality and morale. To address this issue, we applied the Design Science Research Framework to develop Agile governance guidelines by harmonizing CMMI V2.0 and SAFe 5.0. Specifically, we matched CMMI V2.0 governance practices to SAFe 5.0 roles, practices and artefacts. The resulting guidelines were validated, first by means of a survey and then through interviews with process improvement practitioners and agile experts who worked on a fictitious case study. The survey participants, especially those more familiar with SAFe practices, stated that the proposed harmonization was meaningful. Agile experts participating in the case study confirmed that the proposed guidelines were practical and comprehensive, as well as consistent and complete. Pending further empirical validation, these guidelines constitute a crucial step towards Agile governance.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103881"},"PeriodicalIF":4.1,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-22DOI: 10.1016/j.csi.2024.103882
Jesús Rosa-Bilbao , Juan Boubeta-Puig , Jesús Lagares-Galán , Mark Vella
Blockchain is a relatively recent technology that provides immutability, traceability and transparency of information, thus building trust in the digital society. Blockchain networks generate a large amount of logs which capture and describe data flowing through the network in the form of transactions, blocks and events. Monitoring these blockchain data from the off-chain world is needed to detect anomalies with the aim of mitigating the risks that may arise as a result of using blockchain technology. However, the real-time monitoring of these logs by off-chain systems has become a challenge from the beginning of 2018 when the blockchain networks reached a high number of daily transactions. In this paper, we propose a portable, maintainable and easily configurable architecture integrating blockchain and complex event processing technologies that allows for both the real-time monitoring of logs generated in Ethereum Virtual Machine (EVM)-compatible blockchain networks and the automatic detection of anomalies in these networks by matching event patterns. This architecture was tested by using vast amounts of blockchain data already publicly registered in Ethereum and Polygon networks. The results demonstrate that the proposed architecture is able to automatically detect anomalies which occur in different blockchain networks, making analytics of blockchain data possible by off-chain systems.
{"title":"Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks","authors":"Jesús Rosa-Bilbao , Juan Boubeta-Puig , Jesús Lagares-Galán , Mark Vella","doi":"10.1016/j.csi.2024.103882","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103882","url":null,"abstract":"<div><p>Blockchain is a relatively recent technology that provides immutability, traceability and transparency of information, thus building trust in the digital society. Blockchain networks generate a large amount of logs which capture and describe data flowing through the network in the form of transactions, blocks and events. Monitoring these blockchain data from the off-chain world is needed to detect anomalies with the aim of mitigating the risks that may arise as a result of using blockchain technology. However, the real-time monitoring of these logs by off-chain systems has become a challenge from the beginning of 2018 when the blockchain networks reached a high number of daily transactions. In this paper, we propose a portable, maintainable and easily configurable architecture integrating blockchain and complex event processing technologies that allows for both the real-time monitoring of logs generated in Ethereum Virtual Machine (EVM)-compatible blockchain networks and the automatic detection of anomalies in these networks by matching event patterns. This architecture was tested by using vast amounts of blockchain data already publicly registered in Ethereum and Polygon networks. The results demonstrate that the proposed architecture is able to automatically detect anomalies which occur in different blockchain networks, making analytics of blockchain data possible by off-chain systems.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103882"},"PeriodicalIF":4.1,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000515/pdfft?md5=894c93d9ed7ae669b6deb8fe4431f790&pid=1-s2.0-S0920548924000515-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Secret handshake schemes allow members from the same organization to authenticate each other anonymously. After its proposal, various schemes have been introduced to achieve advanced privacy protection. Regrettably, all the schemes based on number theoretic assumptions are insecure under quantum computers, and the known post-quantum designs are impractical because of the overhead cost ( 10 MB). To fill the gap, we present the first isogeny-based secret handshake scheme (i.e., ) with a friendly communication cost (67 KB). In particular, we apply the CSI-FiSh signature scheme to generate group keys and credentials. For each zero-knowledge transcript in the credential, we generate a signature for handshake via the Fiat–Shamir paradigm, while it fails anonymous authentication. To fix the issue, we modify the Fiat–Shamir-type signature by embedding the CSIDH ephemeral private key into the challenge space. After verifying the modified signatures, two users recover the right ephemeral private key if they are in the same group, then they can negotiate a session key and authenticate each other. Our scheme is proved secure under the Group Action Inverse Problems (GAIP) in the random oracle model, and deniability, as an attractive property, also holds for , enabling user’s ability to deny their interactions in the finished handshakes. Via choosing appropriate parameters, the communication cost surpasses all the existing post-quantum secret handshakes.
{"title":"ISH: Isogeny-based Secret Handshakes with friendly communication costs","authors":"Chao Chen , Fangguo Zhang , Zhiyuan An , Jing Zhang","doi":"10.1016/j.csi.2024.103880","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103880","url":null,"abstract":"<div><p>Secret handshake schemes allow members from the same organization to authenticate each other anonymously. After its proposal, various schemes have been introduced to achieve advanced privacy protection. Regrettably, all the schemes based on number theoretic assumptions are insecure under quantum computers, and the known post-quantum designs are impractical because of the overhead cost (<span><math><mo>></mo></math></span> 10 MB). To fill the gap, we present the first isogeny-based secret handshake scheme (i.e., <span><math><mi>ISH</mi></math></span>) with a friendly communication cost (67 KB). In particular, we apply the CSI-FiSh signature scheme to generate group keys and credentials. For each zero-knowledge transcript in the credential, we generate a signature for handshake via the Fiat–Shamir paradigm, while it fails anonymous authentication. To fix the issue, we modify the Fiat–Shamir-type signature by embedding the CSIDH ephemeral private key into the challenge space. After verifying the modified signatures, two users recover the right ephemeral private key if they are in the same group, then they can negotiate a session key and authenticate each other. Our scheme is proved secure under the Group Action Inverse Problems (GAIP) in the random oracle model, and deniability, as an attractive property, also holds for <span><math><mi>ISH</mi></math></span>, enabling user’s ability to deny their interactions in the finished handshakes. Via choosing appropriate parameters, the communication cost surpasses all the existing post-quantum secret handshakes.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103880"},"PeriodicalIF":4.1,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-10DOI: 10.1016/j.csi.2024.103878
Rafael Fresno-Aranda , Pablo Fernandez , Antonio Gamez-Diaz , Amador Duran , Antonio Ruiz-Cortes
APIs are increasingly becoming new business assets for organizations and consequently, API functionality and its pricing should be precisely defined for customers. Pricing is typically composed by different plans that specify a range of limitations, e.g., a Free plan allows 100 monthly requests while a Gold plan has 10 000 requests per month. In this context, the OpenAPI Specification (OAS) has emerged to model the functional part of an API, becoming a de facto industry standard and boosting a rich ecosystem of vendor-neutral tools to assist API providers and consumers. In contrast, there is no proposal for modeling API pricings (i.e., their plans and limitations) and this lack hinders the creation of tools that can leverage this information. To deal with this gap, this paper presents a pricing modeling framework that includes: (a) Pricing4APIs model, a comprehensive and rigorous model of API pricings, along SLA4OAI, a serialization that extends OAS; (b) an operation to validate the description of API pricings, with a toolset (sla4oai-analyzer) that has been developed to automate this operation. Additionally, we analyzed 268 real-world APIs to assess the expressiveness of our proposal and created a representative dataset of 54 pricing models to validate our framework.
应用程序接口正日益成为企业的新业务资产,因此,应为客户精确定义应用程序接口的功能及其定价。定价通常由不同的计划组成,这些计划规定了一系列限制,例如,免费计划每月允许 100 个请求,而黄金计划每月允许 10 000 个请求。在这种情况下,开放式应用程序接口规范(OAS)应运而生,对应用程序接口的功能部分进行建模,成为事实上的行业标准,并促进了丰富的厂商中立工具生态系统,为应用程序接口提供商和消费者提供帮助。相比之下,目前还没有为应用程序接口定价(即其计划和限制)建模的建议,这种缺失阻碍了可利用该信息的工具的创建。为了弥补这一不足,本文提出了一个定价建模框架,其中包括(a) Pricing4APIs 模型,这是一个全面、严谨的 API 定价模型,同时还有 SLA4OAI(一种扩展了 OAS 的序列化);(b) 验证 API 定价描述的操作,以及为实现该操作自动化而开发的工具集(sla4oai-analyzer)。此外,我们还分析了 268 个现实世界中的应用程序接口,以评估我们建议的表达能力,并创建了一个包含 54 个定价模型的代表性数据集,以验证我们的框架。
{"title":"Pricing4APIs: A rigorous model for RESTful API pricings","authors":"Rafael Fresno-Aranda , Pablo Fernandez , Antonio Gamez-Diaz , Amador Duran , Antonio Ruiz-Cortes","doi":"10.1016/j.csi.2024.103878","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103878","url":null,"abstract":"<div><p>APIs are increasingly becoming new business assets for organizations and consequently, API functionality and its pricing should be precisely defined for customers. Pricing is typically composed by different plans that specify a range of limitations, e.g., a Free plan allows 100 monthly requests while a Gold plan has 10<!--> <!-->000 requests per month. In this context, the OpenAPI Specification (OAS) has emerged to model the functional part of an API, becoming a de facto industry standard and boosting a rich ecosystem of vendor-neutral tools to assist API providers and consumers. In contrast, there is no proposal for modeling API pricings (i.e., their plans and limitations) and this lack hinders the creation of tools that can leverage this information. To deal with this gap, this paper presents a pricing modeling framework that includes: (a) <em>Pricing4APIs</em> model, a comprehensive and rigorous model of API pricings, along <em>SLA4OAI</em>, a serialization that extends OAS; (b) an operation to validate the description of API pricings, with a toolset (<em>sla4oai-analyzer</em>) that has been developed to automate this operation. Additionally, we analyzed 268 real-world APIs to assess the expressiveness of our proposal and created a representative dataset of 54 pricing models to validate our framework.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103878"},"PeriodicalIF":5.0,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141423423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Test-first development (TFD) is a software development approach involving automated tests before writing the actual code. TFD offers many benefits, such as improving code quality, reducing debugging time, and enabling easier refactoring. However, TFD also poses challenges and limitations, requiring more effort and time to write and maintain test cases, especially for large and complex projects. Refactoring for testability is improving the internal structure of source code to make it easier to test. Refactoring for testability can reduce the cost and complexity of software testing and speed up the test-first life cycle. However, measuring testability is a vital step before refactoring for testability, as it provides a baseline for evaluating the current state of the software and identifying the areas that need improvement. This paper proposes a mathematical model for calculating class testability based on test effectiveness and effort and a machine-learning regression model that predicts testability using source code metrics. It also introduces a testability-driven development (TsDD) method that conducts the TFD process toward developing testable code. TsDD focuses on improving testability and reducing testing costs by measuring testability frequently and refactoring to increase testability without running the program. Our testability prediction model has a mean squared error of 0.0311 and an R2 score of 0.6285. We illustrate the usefulness of TsDD by applying it to 50 Java classes from three open-source projects. TsDD achieves an average of 77.81 % improvement in the testability of these classes. Experts’ manual evaluation confirms the potential of TsDD in accelerating the TDD process.
{"title":"Testability-driven development: An improvement to the TDD efficiency","authors":"Saeed Parsa , Morteza Zakeri-Nasrabadi , Burak Turhan","doi":"10.1016/j.csi.2024.103877","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103877","url":null,"abstract":"<div><p>Test-first development (TFD) is a software development approach involving automated tests before writing the actual code. TFD offers many benefits, such as improving code quality, reducing debugging time, and enabling easier refactoring. However, TFD also poses challenges and limitations, requiring more effort and time to write and maintain test cases, especially for large and complex projects. Refactoring for testability is improving the internal structure of source code to make it easier to test. Refactoring for testability can reduce the cost and complexity of software testing and speed up the test-first life cycle. However, measuring testability is a vital step before refactoring for testability, as it provides a baseline for evaluating the current state of the software and identifying the areas that need improvement. This paper proposes a mathematical model for calculating class testability based on test effectiveness and effort and a machine-learning regression model that predicts testability using source code metrics. It also introduces a testability-driven development (TsDD) method that conducts the TFD process toward developing testable code. TsDD focuses on improving testability and reducing testing costs by measuring testability frequently and refactoring to increase testability without running the program. Our testability prediction model has a mean squared error of 0.0311 and an R<sup>2</sup> score of 0.6285. We illustrate the usefulness of TsDD by applying it to 50 Java classes from three open-source projects. TsDD achieves an average of 77.81 % improvement in the testability of these classes. Experts’ manual evaluation confirms the potential of TsDD in accelerating the TDD process.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103877"},"PeriodicalIF":5.0,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141322444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-28DOI: 10.1016/j.csi.2024.103876
Faisal Mehmood , Abdullah Ayub Khan , Han Wang , Shahid Karim , Umara Khalid , Feng Zhao
An examination of different distributed real-time applications operating on the blockchain platform is conducted. These applications can be broadly classified into three types: permissionless public, permissioned private, and consortium chains. In order for a decentralized network to function independently, consensus mechanisms are needed to facilitate the delivery of transactions and keep track of them in a ledger. But the fundamental idea behind Blockchain technology is the use of several consensus protocols, like Proof of Stake, Proof of Elapsed Time, etc., which requires greater processing power. In order to arrange transactions, it increases the demand for buying more computing units. Furthermore, present consortia blockchain consensus mechanisms lack a policy to collect socio-economic financial levies, including monies for charitable donations, education, and social activities. To collect socio-economic taxes, this study suggests a lightweight Plenum consensus algorithm called "BLPCA" for consortium blockchains built on Hyperledger Indy. The Byzantine Fault Tolerance concept combined with optimization is used in the suggested BLPCA systems to manage large-scale decentralized traffic of socioeconomic hierarchy. Because there are no transaction costs, BLPCA encourages government analysts to review funds using fewer resources. By including a multithreading heterogeneous technique, the BLPCA can effectively handle multi-transaction needs and execute this protocol in an industrial setting that operates in real-time. It is observed from the simulations that even in the worst-case network scenario—such as a fork—the suggested consortium blockchain does not crash a single transaction. In order to guarantee node scalability, a high propagation speed is determined. Furthermore, the BLPCA shows an excellent average time while constructing socioeconomic transaction blocks.
{"title":"BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy","authors":"Faisal Mehmood , Abdullah Ayub Khan , Han Wang , Shahid Karim , Umara Khalid , Feng Zhao","doi":"10.1016/j.csi.2024.103876","DOIUrl":"10.1016/j.csi.2024.103876","url":null,"abstract":"<div><p>An examination of different distributed real-time applications operating on the blockchain platform is conducted. These applications can be broadly classified into three types: permissionless public, permissioned private, and consortium chains. In order for a decentralized network to function independently, consensus mechanisms are needed to facilitate the delivery of transactions and keep track of them in a ledger. But the fundamental idea behind Blockchain technology is the use of several consensus protocols, like Proof of Stake, Proof of Elapsed Time, etc., which requires greater processing power. In order to arrange transactions, it increases the demand for buying more computing units. Furthermore, present consortia blockchain consensus mechanisms lack a policy to collect socio-economic financial levies, including monies for charitable donations, education, and social activities. To collect socio-economic taxes, this study suggests a lightweight Plenum consensus algorithm called \"BLPCA\" for consortium blockchains built on Hyperledger Indy. The Byzantine Fault Tolerance concept combined with optimization is used in the suggested BLPCA systems to manage large-scale decentralized traffic of socioeconomic hierarchy. Because there are no transaction costs, BLPCA encourages government analysts to review funds using fewer resources. By including a multithreading heterogeneous technique, the BLPCA can effectively handle multi-transaction needs and execute this protocol in an industrial setting that operates in real-time. It is observed from the simulations that even in the worst-case network scenario—such as a fork—the suggested consortium blockchain does not crash a single transaction. In order to guarantee node scalability, a high propagation speed is determined. Furthermore, the BLPCA shows an excellent average time while constructing socioeconomic transaction blocks.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103876"},"PeriodicalIF":5.0,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-24DOI: 10.1016/j.csi.2024.103873
Anup W. Burange , Vaishali M. Deshmukh , Yugandhara A. Thakare , Nitin Arvind Shelke
This study presents an innovative IoT routing security model that integrates trust management to bolster network reliability, improve resilience against routing attacks, and isolate malicious activities. The model, emphasizing node behavior, reputation, and past performance, offers a nuanced approach to network security. Through comprehensive comparisons between dynamic and static models in IoT routing, the impact on crucial performance parameters, including throughput, packet delivery ratio, control traffic overhead, and energy consumption, is quantified. Simulations showcase the model's effectiveness in securing IoT communication, achieving an impressive 98 % accuracy in detecting and mitigating attacks. Comparative analysis against prior studies underscores its exceptional performance, particularly in identifying and classifying attack types such as wormhole, Sybil, and rank, alongside normal traffic. This trust-based IoT routing security model represents a substantial advancement in securing dynamic IoT environments, standing out as a valuable contribution. Noteworthy is its low average power consumption, contributing to its exceptional lightweight nature.
{"title":"Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence","authors":"Anup W. Burange , Vaishali M. Deshmukh , Yugandhara A. Thakare , Nitin Arvind Shelke","doi":"10.1016/j.csi.2024.103873","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103873","url":null,"abstract":"<div><p>This study presents an innovative IoT routing security model that integrates trust management to bolster network reliability, improve resilience against routing attacks, and isolate malicious activities. The model, emphasizing node behavior, reputation, and past performance, offers a nuanced approach to network security. Through comprehensive comparisons between dynamic and static models in IoT routing, the impact on crucial performance parameters, including throughput, packet delivery ratio, control traffic overhead, and energy consumption, is quantified. Simulations showcase the model's effectiveness in securing IoT communication, achieving an impressive 98 % accuracy in detecting and mitigating attacks. Comparative analysis against prior studies underscores its exceptional performance, particularly in identifying and classifying attack types such as wormhole, Sybil, and rank, alongside normal traffic. This trust-based IoT routing security model represents a substantial advancement in securing dynamic IoT environments, standing out as a valuable contribution. Noteworthy is its low average power consumption, contributing to its exceptional lightweight nature.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103873"},"PeriodicalIF":5.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141095635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.1016/j.csi.2024.103875
Chuxin Zhuang , Qingyun Dai , Yue Zhang
Traditional Digital Copyright (DC) management system faces a single point of failure, and has no strict traceability. Meanwhile, the current blockchain-based DC schemes take less consideration to the authenticity of DC information stored on the blockchain. Additionally, the full node storage overhead and computation overhead of information retrieval and traceability increase significantly with the number of blocks. Therefore, in this paper, we propose a secure and lightweight data management scheme based on the redactable blockchain for DC. Users generate their public and private keys, which provide a legitimate signature. Then, we propose a transaction control mechanism based on ECDSA, which means that the storage of DC information can only be accomplished by providing a legitimate and verifiable signature, including registration and transaction information. Furthermore, we adopt blockchain to record DC information and the chameleon hash algorithm to modify DC information stored on the blockchain when making DC transactions, while keeping the block headers unchanged. System analysis and experimental results confirm that our scheme can address a single point of failure and ensure the authenticity of the information. Meanwhile, our scheme effectively reduces full node storage overhead, and computation overhead of information retrieval and traceability.
传统的数字版权(DC)管理系统面临单点故障,没有严格的可追溯性。同时,目前基于区块链的 DC 方案对存储在区块链上的 DC 信息的真实性考虑较少。此外,随着区块数量的增加,全节点存储开销以及信息检索和溯源的计算开销也大幅增加。因此,本文提出了一种基于可删节区块链的安全轻量级 DC 数据管理方案。用户生成自己的公钥和私钥,提供合法签名。然后,我们提出了基于 ECDSA 的交易控制机制,即只有提供合法且可验证的签名才能完成 DC 信息的存储,包括注册和交易信息。此外,我们采用区块链来记录 DC 信息,并采用变色龙哈希算法在进行 DC 交易时修改存储在区块链上的 DC 信息,同时保持区块头不变。系统分析和实验结果证实,我们的方案可以解决单点故障,确保信息的真实性。同时,我们的方案有效降低了全节点存储开销,以及信息检索和溯源的计算开销。
{"title":"A secure and lightweight data management scheme based on redactable blockchain for Digital Copyright","authors":"Chuxin Zhuang , Qingyun Dai , Yue Zhang","doi":"10.1016/j.csi.2024.103875","DOIUrl":"10.1016/j.csi.2024.103875","url":null,"abstract":"<div><p>Traditional Digital Copyright (DC) management system faces a single point of failure, and has no strict traceability. Meanwhile, the current blockchain-based DC schemes take less consideration to the authenticity of DC information stored on the blockchain. Additionally, the full node storage overhead and computation overhead of information retrieval and traceability increase significantly with the number of blocks. Therefore, in this paper, we propose a secure and lightweight data management scheme based on the redactable blockchain for DC. Users generate their public and private keys, which provide a legitimate signature. Then, we propose a transaction control mechanism based on ECDSA, which means that the storage of DC information can only be accomplished by providing a legitimate and verifiable signature, including registration and transaction information. Furthermore, we adopt blockchain to record DC information and the chameleon hash algorithm to modify DC information stored on the blockchain when making DC transactions, while keeping the block headers unchanged. System analysis and experimental results confirm that our scheme can address a single point of failure and ensure the authenticity of the information. Meanwhile, our scheme effectively reduces full node storage overhead, and computation overhead of information retrieval and traceability.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103875"},"PeriodicalIF":5.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141052198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}