Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 135.00Impact Factor 2024: 0.7
This journal publishes papers on a number of topics ranging from design to practical experiences with operational high performance/speed networks.
The topics covered will include but not be limited to:
- Communication network architectures
- Evolutionary networking protocols, services and architectures
- Network Security
Authors: Chowdhury, Mahfuzulhoq
Article Type: Research Article
Abstract: With the rise of information-centric networks (ICN), the user can access the caching content from nearby caching nodes rather than the remote content server through in-network caching facilities. The existing articles did not look into minimum caching content retrieval latency, user energy consumption, user financial cost, and maximum service provider profit-aware proper resource orchestration and job scheduling policies all at once, taking into account multiple publishers and subscriber-based caching jobs, blockchain, user-owned and service provider cache, pre-caching, neighbor collaboration, and available resources. To suppress these challenges, this article offers a proactive pre-caching, collaboration, blockchain, minimum latency-aware resource, and job scheduling …policy for 6G ICN services that takes into account publishers’ and subscribers’ caching job requests, user-owned and service provider cache, available resources, and deadline. The experimental results visualized that at least 16% content retrieval delay, 66% energy, and 22% service provider profit gain are attained in the proposed scheme over the existing techniques. Show more
Keywords: Resource orchestration, information-centric network (ICN), job scheduling, mobile-edge computing, publisher and subscriber, blockchain, collaboration, mean content retrieval latency, cache hit ratio, user welfare, and service provider profit
DOI: 10.3233/JHS-240059
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-37, 2024
Authors: Elhoseny, Mohamed | Riad, Khaled
Article Type: Research Article
Abstract: The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable insights into user behavior, environmental conditions, and other important factors. However, as this data is collected and processed by cloud-hosted services, there is a growing concern about privacy and security. Without adequate protection, sensitive information could be exposed to hackers or other malicious actors, putting both individuals and organizations at risk. To address this challenge, real-time privacy-preserving techniques can be used to protect IoT …data without compromising its value. This paper introduces an efficient Real-time privacy-preserving scheme (RT-PPS) for cloud-hosted IoT data. RT-PPS employs multi-authority attribute-based encryption on a hybrid cloud environment to keep data secure and private, while still allowing it to be processed and analyzed by cloud-hosted services. RT-PPS has efficient response time and resource consumption, which gives it the ability to handle a huge number of concurrent users at the same time without notable delay. The proposed RT-PPS has been validated through extensive experimental evaluation on a variety of configurations. Moreover, the proposed scheme has been computationally compared with the state-of-the-artwork. RT-PPS has shown excellent performance, effectiveness, and efficiency. The RT-PPS encryption time for a 1 GB dataset while considering 1024 slices is approximately 1000 ms. Also, the RT-PPS decryption time for a 1 GB ciphertext while considering 1024 slices are approximately 235 ms. Finally, RT-PPS is proven secure against any polynomial-time attacks and their variations that have at most a negligible advantage in the introduced security model. Moreover compared to most of the state-of-the-artwork, RT-PPS reduced the ciphertext size and lowered the computations in the encryption, key generation, decryption, and ciphertext update while assuring their security. By implementing RT-PPS, organizations can take advantage of the benefits of IoT data while protecting the privacy of their users and maintaining the security of their systems. Show more
Keywords: Cloud security, cryptography, data privacy, IoT
DOI: 10.3233/JHS-240096
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-20, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]