Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang
{"title":"Cross-chain asset trading scheme for notaries based on edge cloud storage","authors":"Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang","doi":"10.1186/s13677-024-00648-2","DOIUrl":"https://doi.org/10.1186/s13677-024-00648-2","url":null,"abstract":"Blockchain has penetrated in various fields, such as finance, healthcare, supply chain, and intelligent transportation, but the value exchange between different blockchains limits their expansion. Cross-chain technology, such as notary mechanism, enables asset exchanges between different blockchain networks. However, existing research still confronts problems such as single inherent value evaluation, collusion risk, credit evaluation and unreasonable resource allocation, making it difficult to ensure the security of cross-chain asset transactions. So this paper proposes a cross-chain asset trading scheme based on edge cloud storage to improve the reliability of notaries and the security of cross-chain value exchange. Firstly, introduce the entropy weight method to determine indicators and adopt multi indicator evaluation to reduce the risk of collusion between notaries and users; Secondly, design a multi-indicator credit evaluation method to improve the accuracy of the evaluation; Finally, design a new and old notary node share allocation method to improve the rationality of resource allocation.The experiment shows that the scheme designed in this paper can reduce the risk of collusion, more accurately screen out high credit nodes to act as notaries, and make resource allocation more reasonable.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overview of QoS-aware load balancing techniques in SDN-based IoT networks","authors":"Mohammad Rostami, Salman Goli-Bidgoli","doi":"10.1186/s13677-024-00651-7","DOIUrl":"https://doi.org/10.1186/s13677-024-00651-7","url":null,"abstract":"Increasing and heterogeneous service demands have led to traffic increase, and load imbalance challenges among network entities in the Internet of Things (IoT) environments. It can affect Quality of Service (QoS) parameters. By separating the network control layer from the data layer, Software-Defined Networking (SDN) has drawn the interest of many researchers. Efficient data flow management and better network performance can be reachable through load-balancing techniques in SDN and improve the quality of services in the IoT network. So, the combination of IoT and SDN, with conscious real-time traffic management and load control, plays an influential role in improving the QoS. To give a complete assessment of load-balancing strategies to enhance QoS parameters in SDN-based IoT networks (SD-IoT), a systematic review of recent research is presented here. In addition, the paper provides a comparative analysis of the relevant publications, trends, and future areas of study that are particularly useful for the community of researchers in the field.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments","authors":"Veni Thangaraj, Thankaraja Raja Sree","doi":"10.1186/s13677-024-00599-8","DOIUrl":"https://doi.org/10.1186/s13677-024-00599-8","url":null,"abstract":"Fog computing has evolved as a promising computing paradigm to support the execution of latency-sensitive Internet of Things (IoT) applications. The mobile devices connected to the fog environment are resource constrained and non-stationary. In such environments, offloading mobile user’s computational task to nearby fog servers is necessary to satisfy the QoS requirements of time-critical IoT applications. Moreover, the fog servers are also susceptible to numerous attacks which induce security and privacy issues.Offloading computation task to a malicious fog node affects the integrity of users’ data. Despite the fact that there are many integrity-preserving strategies for fog environments, the majority of them rely on a reliable central entity that might have a single point of failure. Blockchain is a promising strategy that maintains data integrity in a decentralized manner. The state-of-art blockchain offloading mechnanisms have not considered the mobility during secure offloading process. Besides, it is necessary to ensure QoS constraints of the IoT applications while considering mobility of user devices. Hence, in this paper, Blockchain assisted Mobility-aware Secure Computation Offloading (MSCO) mechanism is proposed to choose the best authorized fog servers for offloading task with minimal computational and energy cost. To address the optimization issue, a hybrid Genetic Algorithm based Particle Swarm Optimization technique is employed. Experimental results demonstrated the significant improvement of MSCO when compared to the existing approaches in terms of on average 11 % improvement of total cost which includes the parameters of latency and energy consumption.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jing Zhu, Chuanjiang Hu, Edris Khezri, Mohd Mustafa Mohd Ghazali
{"title":"Correction to: Edge intelligence‑assisted animation design with large models: a survey","authors":"Jing Zhu, Chuanjiang Hu, Edris Khezri, Mohd Mustafa Mohd Ghazali","doi":"10.1186/s13677-024-00650-8","DOIUrl":"https://doi.org/10.1186/s13677-024-00650-8","url":null,"abstract":"<p><b>Correction to: Journal of Cloud Computing (2024) 13:48</b></p><p>https://doi.org/10.1186/s13677-024-00601-3</p><p>Following publication of the original article [1], we have been notified that affiliation 3 was incorrectly published.</p><p>It is now:</p><p>3 Department of Computer Engineering, Boukan Branch, Islamic Azad University, Tehran, Iran</p><p>It should be:</p><p>3 Department of Computer Engineering, Boukan Branch, Islamic Azad University, Boukan, Iran</p><p>The original article was updated.</p><ol data-track-component=\"outbound reference\"><li data-counter=\"1.\"><p>Zhu et al (2024) Edge intelligence–assisted animation design with large models: a survey (2024). 13:48 https://doi.org/10.1186/s13677-024-00601-3</p></li></ol><p>Download references<svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" role=\"img\" width=\"16\"><use xlink:href=\"#icon-eds-i-download-medium\" xmlns:xlink=\"http://www.w3.org/1999/xlink\"></use></svg></p><h3>Authors and Affiliations</h3><ol><li><p>Faculty of Creative Industries, City University Malaysia, Petaling Jaya, Malaysia</p><p>Jing Zhu & Mohd Mustafa Mohd Ghazali</p></li><li><p>Anhui Vocational and Technical College of Industry and Trade, Huainan, China</p><p>Chuanjiang Hu</p></li><li><p>Department of Computer Engineering, Boukan Branch, Islamic Azad University, Boukan, Iran</p><p>Edris Khezri</p></li></ol><span>Authors</span><ol><li><span>Jing Zhu</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li><li><span>Chuanjiang Hu</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li><li><span>Edris Khezri</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li><li><span>Mohd Mustafa Mohd Ghazali</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li></ol><h3>Corresponding author</h3><p>Correspondence to Edris Khezri.</p><h3>Publisher’s Note</h3><p>Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.</p><p>The online version of the original article can be found at https://doi.org/10.1186/s13677-024-00601-3</p><p><b>Open Access</b> This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Velmurugan, M. Prakash, S. Neelakandan, Arun Radhakrishnan
{"title":"Provably secure data selective sharing scheme with cloud-based decentralized trust management systems","authors":"S. Velmurugan, M. Prakash, S. Neelakandan, Arun Radhakrishnan","doi":"10.1186/s13677-024-00634-8","DOIUrl":"https://doi.org/10.1186/s13677-024-00634-8","url":null,"abstract":"The smart collection and sharing of data is an important part of cloud-based systems, since huge amounts of data are being created all the time. This feature allows users to distribute data to particular recipients, while also allowing data proprietors to selectively grant access to their data to users. Ensuring data security and privacy is a formidable task when selective data is acquired and exchanged. One potential issue that emerges is the risk that data may be transmitted by cloud servers to unauthorized users or individuals who have no interest in the particular data or user interests. The prior research lacks comprehensive solutions for balancing security, privacy, and usability in secure data selective sharing schemes inside Cloud-Based decentralized trust management systems. Motivating factors for settling this gap contain growing concerns concerning data privacy, the necessity for scalable and interoperable frameworks, and the increasing dependency on cloud services for data storage and sharing, which necessitates robust and user-friendly mechanisms for secure data management. An effective and obviously secure data selective sharing and acquisition mechanism for cloud-based systems is proposed in this work. We specifically start by important a common problematic related to the selective collection and distribution of data in cloud-based systems. To address these issues, this study proposes a Cloud-based Decentralized Trust Management System (DTMS)-connected Efficient, Provably Secure Data Selection Sharing Scheme (EPSDSS). The EPSDSS approach employs attribute-based encryption (ABE) and proxy re-encryption (PRE) to provide fine-grained access control over shared data. A decentralized trust management system provides participant dependability and accountability while mitigating the dangers of centralized trust models. The EPSDSS-PRE paradigm would allow data owners to regulate granular access while allowing users to customize data collection without disclosing their preferences. In our strategy, the EPSDSS recognizes shared data and generates short fingerprints for information that can elude detection before cloud storage. DTMS also computes user trustworthiness and improves user behaviour administration. Our research demonstrates that it’s able to deliver trustworthy and safe data sharing features in cloud-based environments, making it a viable option for enterprises seeking to protect sensitive data while maximizing collaboration and utilization of resources.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naglaa Abdelhady, Taysir Hassan A. Soliman, Mohammed F. Farghally
{"title":"Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets","authors":"Naglaa Abdelhady, Taysir Hassan A. Soliman, Mohammed F. Farghally","doi":"10.1186/s13677-024-00644-6","DOIUrl":"https://doi.org/10.1186/s13677-024-00644-6","url":null,"abstract":"Social networks are popular for advertising, idea sharing, and opinion formation. Due to COVID-19, coronavirus information disseminated on social media affects people’s lives directly. Individuals sometimes managed it well, but it often hampered daily activities. As a result, analyzing people’s feelings is important. Sentiment analysis identifies opinions or sentiments from text. In this paper, we present an effective model that leverages the benefits of Convolutional Neural Network (CNN) and Bidirectional Long Short-Term Memory (BiLSTM) to categorize Arabic tweets using a stacked ensemble learning model. First, the tweets are represented as vectors using a word embedding model, then the text feature is extracted by CNN, and finally the context information of the text is acquired by BiLSTM. Aravec, FastText, and ArWordVec are employed separately to assess the impact of the word embedding on the our model. We also compare the proposed method to various deep learning models: CNN, LSTM, and BiLSTM. Experiments are performed on three different Arabic datasets related to COVID-19 and vaccines. Empirical findings show that the proposed model outperformed the other models’ results by achieving F-measures of 76.76%, 87.%, and 80.5% on the SenWave, AraCOVID19-SSD, and ArCovidVac datasets, respectively.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tao Shen, Lu Zhang, Renkang Geng, Shuai Li, Bin Sun
{"title":"Traffic prediction for diverse edge IoT data using graph network","authors":"Tao Shen, Lu Zhang, Renkang Geng, Shuai Li, Bin Sun","doi":"10.1186/s13677-023-00543-2","DOIUrl":"https://doi.org/10.1186/s13677-023-00543-2","url":null,"abstract":"More researchers are proposing artificial intelligence algorithms for Internet of Things (IoT) devices and applying them to themes such as smart cities and smart transportation. In recent years, relevant research has mainly focused on data processing and algorithm modeling, and most have shown good prediction results. However, many algorithmic models often adjust parameters for the corresponding datasets, so the robustness of the models is weak. When different types of data face other model parameters, the prediction performance often varies a lot. Thus, this work starts from the perspective of data processing and algorithm models. Taking traffic data as an example, we first propose a new data processing method that processes traffic data with different attributes and characteristics into a dataset that is more common for most models. Then we will compare different types of datasets from the perspective of multiple model parameters, and further analyze the precautions and changing trends of different traffic data in machine learning. Finally, different types of data and ranges of model parameters are explored, together with possible reasons for fluctuations in forecast results when data parameters change.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting UPDRS in Parkinson’s disease using ensembles of self-organizing map and neuro-fuzzy","authors":"Siren Zhao, Jilun Zhang, Jianbin Zhang","doi":"10.1186/s13677-024-00641-9","DOIUrl":"https://doi.org/10.1186/s13677-024-00641-9","url":null,"abstract":"Parkinson's Disease (PD) is a complex, degenerative disease that affects nerve cells that are responsible for body movement. Artificial Intelligence (AI) algorithms are widely used to diagnose and track the progression of this disease, which causes symptoms of Parkinson's disease in its early stages, by predicting the results of the Unified Parkinson's Disease Rating Scale (UPDRS). In this study, we aim to develop a method based on the integration of two methods, one complementary to the other, Ensembles of Self-Organizing Map and Neuro-Fuzzy, and an unsupervised learning algorithm. The proposed method relied on the higher effect of the variables resulting from the analysis of the initial readings to obtain a correct and accurate preliminary prediction. We evaluate the developed approach on a PD dataset including speech cues. The process was evaluated with root mean square error (RMSE) and modified R square (modified R2). Our findings reveal that the proposed method is effective in predicting UPDRS outcomes by a combination of speech signals (measures of hoarseness). As the preliminary results during the evaluation showed numbers that proved the worth of the proposed method, such as UPDRS = 0.955 and RMSE approximately 0.2769 during the prediction process.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos Reaño, Jose V. Riera, Verónica Romero, Pedro Morillo, Sergio Casas-Yrurzum
{"title":"A cloud-edge computing architecture for monitoring protective equipment","authors":"Carlos Reaño, Jose V. Riera, Verónica Romero, Pedro Morillo, Sergio Casas-Yrurzum","doi":"10.1186/s13677-024-00649-1","DOIUrl":"https://doi.org/10.1186/s13677-024-00649-1","url":null,"abstract":"The proper use of protective equipment is very important to avoid fatalities. One sector in which this has a great impact is that of construction sites, where a large number of workers die each year. In this sector as in others, employers are responsible for providing their employees with this equipment. In addition, employers must monitor and ensure its correct use. These tasks are usually performed using manual procedures. Existing tools to automate this process are unreliable and present scalability issues. In this paper, we research the benefits of using a cloud-edge computing architecture to automate the monitoring of protective equipment. The solution we propose successfully addresses all the problems that appear in hostile and unstructured work environments such as construction sites. Although these sites are used as a use case, the approach presented can also be deployed in other sectors with similar characteristics and restrictions.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chuanfu Zhang, Jing Chen, Wen Li, Hao Sun, Yudong Geng, Tianxiang Zhang, Mingchao Ji, Tonglin Fu
{"title":"A cloud-edge collaborative task scheduling method based on model segmentation","authors":"Chuanfu Zhang, Jing Chen, Wen Li, Hao Sun, Yudong Geng, Tianxiang Zhang, Mingchao Ji, Tonglin Fu","doi":"10.1186/s13677-024-00635-7","DOIUrl":"https://doi.org/10.1186/s13677-024-00635-7","url":null,"abstract":"With the continuous development and combined application of cloud computing and artificial intelligence, some new methods have emerged to reduce task execution time for training neural network models in a cloud-edge collaborative environment. The most attractive method is neural network model segmentation. However, many factors affect the segmentation point, such as resource allocation, system energy consumption, load balancing, and network Bandwidth allocation. Some segmentation methods consider the shortest task execution time, which ignores the utilization of resources at the edge and can result in resource waste. Additionally, these factors are difficult to measure, which presents a challenge in calculating the best segmentation point to achieve the goal of maximum resource utilization and minimum task execution time. To solve this problem, this paper proposes a cloud-edge collaborative task scheduling method based on model segmentation (CECMS). This method first analyzes the factors affecting the segmentation point of the model and then obtains accurate factors that affect the segmentation point calculation through the pre-execution method. Furthermore, a multi-objective solution algorithm is improved to calculate the optimal model segmentation point. And tasks are separately offloaded to the edge and cloud based on the optimal model segmentation point. Finally, the experiments are conducted to verify the effectiveness of this method. Finally, the effectiveness of the CECMS method was verified through simulation experiments. Compared with the Dynamic Adaptive DNN Surgery (DADS) method and an adaptive DNN inference acceleration framework algorithm with end–edge–cloud collaborative computing algorithm (ADC), CECMS achieves the same effectiveness as DADS and ADC in optimizing task execution time by comprehensively considering the utilization of edge resources and minimizing task execution time, while also effectively ensuring resource utilization.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}