Kang Song, Wenqian Shang, Yong Zhang, Tong Yi, Xuan Wang
{"title":"Security issues of news data dissemination in internet environment","authors":"Kang Song, Wenqian Shang, Yong Zhang, Tong Yi, Xuan Wang","doi":"10.1186/s13677-024-00632-w","DOIUrl":"https://doi.org/10.1186/s13677-024-00632-w","url":null,"abstract":"With the rise of artificial intelligence and the development of social media, people's communication is more convenient and convenient. However, in the Internet environment, the untrue dissemination of news data leads to a large number of problems. Efficient and automatic detection of rumors in social platforms hence has become an important research direction in recent years. This paper leverages deep learning methods to mine the changing trend of user features related to rumor events, and designs a rumor detection model called Time Based User Feature Capture Model(TBUFCM). To obtain a new feature vector representing the user's comprehensive features under the current event, the proposed model first recomputes the user feature vector by using feature enhancement function. Then it utilizes GRU(Gate Recurrent Unit, GRU) and CNN(Convolutional Neural Networks, CNN) models to learn the global and local changes of user features, respectively. Finally, the hidden rumor features in the process of rumor propagation can be discovered by user and time information. The experimental results show that TBUFCM outperforms the baseline model, and when there are only 20 forwarded posts, it can also reach an accuracy of 92%. The proposed method can effectively solve the security problem of news data dissemination in the Internet environment.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Short-term forecasting of surface solar incident radiation on edge intelligence based on AttUNet","authors":"Mengmeng Cui, Shizhong Zhao, Jinfeng Yao","doi":"10.1186/s13677-024-00624-w","DOIUrl":"https://doi.org/10.1186/s13677-024-00624-w","url":null,"abstract":"Solar energy has emerged as a key industry in the field of renewable energy due to its universality, harmlessness, and sustainability. Accurate prediction of solar radiation is crucial for optimizing the economic benefits of photovoltaic power plants. In this paper, we propose a novel spatiotemporal attention mechanism model based on an encoder-translator-decoder architecture. Our model is built upon a temporal AttUNet network and incorporates an auxiliary attention branch to enhance the extraction of spatiotemporal correlation information from input images. And utilize the powerful ability of edge intelligence to process meteorological data and solar radiation parameters in real-time, adjust the prediction model in real-time, thereby improving the real-time performance of prediction. The dataset utilized in this study is sourced from the total surface solar incident radiation (SSI) product provided by the geostationary meteorological satellite FY4A. After experiments, the SSIM has been improved to 0.86. Compared with other existing models, our model has obvious advantages and has great prospects for short-term prediction of surface solar incident radiation.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"365 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment","authors":"Gaoxian Peng, Yiping Wen, Wanchun Dou, Tiancai Li, Xiaolong Xu, Qing Ye","doi":"10.1186/s13677-024-00613-z","DOIUrl":"https://doi.org/10.1186/s13677-024-00613-z","url":null,"abstract":"Traditional delivery route planning faces challenges in reducing logistics costs and improving customer satisfaction with growing customer demand and complex road traffic, especially in uncertain supply chain environment. To address these challenges, we introduce an innovative two-phase delivery route planning method integrating edge intelligence technology. The novelty of our approach lies in utilizing edge computing devices to monitor real-time changes in road conditions and dynamically adjust delivery routes, thereby providing an effective solution for efficient and flexible logistics. Initially, we construct a mixed-integer programming model that minimizes the total cost under constraints such as customer destinations and time windows. Subsequently, in the cloud-edge collaborative mode, edge computing devices are utilized to collect real-time road conditions and transmit it to the cloud server. The cloud server comprehensively considers customer demand and road condition changes and employs adaptive genetic algorithms and A-star algorithms to adjust the delivery routes dynamically. Finally, comprehensive experiments are conducted to validate the effectiveness of our method. The results demonstrate that our approach can promptly respond to changes in customer demands and road conditions and flexibly plan the optimal delivery routes, thereby significantly reducing overall costs and enhancing customer satisfaction.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Chen, Chong Guo, Bei Gong, Muhammad Waqas, Lihua Deng, Haowen Qin
{"title":"A secure cross-domain authentication scheme based on threshold signature for MEC","authors":"Lei Chen, Chong Guo, Bei Gong, Muhammad Waqas, Lihua Deng, Haowen Qin","doi":"10.1186/s13677-024-00631-x","DOIUrl":"https://doi.org/10.1186/s13677-024-00631-x","url":null,"abstract":"The widespread adoption of fifth-generation mobile networks has spurred the rapid advancement of mobile edge computing (MEC). By decentralizing computing and storage resources to the network edge, MEC significantly enhances real-time data access services and enables efficient processing of large-scale dynamic data on resource-limited devices. However, MEC faces considerable security challenges, particularly in cross-domain service environments, where every device poses a potential security threat. To address this issue, this paper proposes a secure cross-domain authentication scheme based on a threshold signature tailored to MEC’s multi-subdomain nature. The proposed scheme employs a (t,n) threshold mechanism to bolster system resilience and security, catering to large-scale, dynamic, and decentralized MEC scenarios. Additionally, the proposed scheme features an efficient authorization update function that facilitates the revocation of malicious nodes. Security analysis confirmed that the proposed scheme satisfies unforgeability, collusion resistance, non-repudiation and forward security. Theoretical evaluation and experimental simulation verify the effectiveness and feasibility of the proposed scheme. Compared with existing schemes, the proposed scheme has higher computational performance while implementing secure authorization updates.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"195 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mughair Aslam Bhatti, Zhiyao Song, Uzair Aslam Bhatti, Syam M. S
{"title":"AIoT-driven multi-source sensor emission monitoring and forecasting using multi-source sensor integration with reduced noise series decomposition","authors":"Mughair Aslam Bhatti, Zhiyao Song, Uzair Aslam Bhatti, Syam M. S","doi":"10.1186/s13677-024-00598-9","DOIUrl":"https://doi.org/10.1186/s13677-024-00598-9","url":null,"abstract":"The integration of multi-source sensors based AIoT (Artificial Intelligence of Things) technologies into air quality measurement and forecasting is becoming increasingly critical in the fields of sustainable and smart environmental design, urban development, and pollution control. This study focuses on enhancing the prediction of emission, with a special emphasis on pollutants, utilizing advanced deep learning (DL) techniques. Recurrent neural networks (RNNs) and long short-term memory (LSTM) neural networks have shown promise in predicting air quality trends in time series data. However, challenges persist due to the unpredictability of air quality data and the scarcity of long-term historical data for training. To address these challenges, this study introduces the AIoT-enhanced EEMD-CEEMDAN-GCN model. This innovative approach involves decomposing the input signal using EEMD (Ensemble Empirical Mode Decomposition) and CEEMDAN (Complete Ensemble Empirical Mode Decomposition with Adaptive Noise) to extract intrinsic mode functions. These functions are then processed through a GCN (Graph Convolutional Network) model, enabling precise prediction of air quality trends. The model’s effectiveness is validated using air pollution datasets from four provinces in China, demonstrating its superiority over various deep learning models (GCN, EMD-GCN) and series decomposition models (EEMD-GCN, CEEMDAN-GCN). It achieves higher accuracy and better data fitting, outperforming other models in key metrics such as MAE (Mean Absolute Error), MSE (Mean Squared Error), MAPE (Mean Absolute Percentage Error), and R2 (Coefficient of Determination). The implementation of this AIoT-enhanced model in air pollution prediction allows decision-makers to more accurately anticipate changes in air quality, particularly concerning carbon emissions. This facilitates more effective planning of mitigation measures, improvement of public health, and optimization of resource allocation. Moreover, the model adeptly addresses the complexities of air quality data, contributing significantly to enhanced monitoring and management strategies in the context of sustainable urban development and environmental conservation.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"164 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks","authors":"Qing He, Hua Zhao, Yu Feng, Zehao Wang, Zhaofeng Ning, Tingwei Luo","doi":"10.1186/s13677-024-00626-8","DOIUrl":"https://doi.org/10.1186/s13677-024-00626-8","url":null,"abstract":"Powered by data-driven technologies, precision agriculture offers immense productivity and sustainability benefits. However, fragmentation across farmlands necessitates distributed transparent automation. We developed an edge computing framework complemented by auction mechanisms and fuzzy optimizers that connect various supply chain stages. Specifically, edge computing offers powerful capabilities that enable real-time monitoring and data-driven decision-making in smart agriculture. We propose an edge computing framework tailored to agricultural needs to ensure sustainability through a renewable solar energy supply. Although the edge computing framework manages real-time crop monitoring and data collection, market-based mechanisms, such as auctions and fuzzy optimization models, support decision-making for smooth agricultural supply chain operations. We formulated invisible auction mechanisms that hide actual bid values and regulate information flows, combined with machine learning techniques for robust predictive analytics. While rule-based fuzzy systems encode domain expertise in agricultural decision-making, adaptable training algorithms help optimize model parameters from the data. A two-phase hybrid learning approach is formulated. Fuzzy optimization models were formulated using domain expertise for three key supply chain decision problems. Auction markets discover optimal crop demand–supply balancing and pricing signals. Fuzzy systems incorporate domain knowledge into interpretable crop-advisory models. An integrated evaluation of 50 farms over five crop cycles demonstrated the high performance of the proposed edge computing-oriented auction-based fuzzy neural network model compared with benchmarks.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated SDN framework for early detection of DDoS attacks in cloud computing","authors":"Asha Varma Songa, Ganesh Reddy Karri","doi":"10.1186/s13677-024-00625-9","DOIUrl":"https://doi.org/10.1186/s13677-024-00625-9","url":null,"abstract":"Cloud computing is a rapidly advancing technology with numerous benefits, such as increased availability, scalability, and flexibility. Relocating computing infrastructure to a network simplifies hardware and software resource monitoring in the cloud. Software-Defined Networking (SDN)-based cloud networking improves cloud infrastructure efficiency by dynamically allocating and utilizing network resources. While SDN cloud networks offer numerous advantages, they are vulnerable to Distributed Denial-of-Service (DDoS) attacks. DDoS attacks try to stop genuine users from using services and drain network resources to reduce performance or shut down services. However, early-stage detection of DDoS attack patterns in cloud environments remains challenging. Current methods detect DDoS at the SDN controller level, which is often time-consuming. We recommend focusing on SDN switches for early detection. Due to the large volume of data from diverse sources, we recommend traffic clustering and traffic anomalies prediction which is of DDoS attacks at each switch. Furthermore, to consolidate the data from multiple clusters, event correlation is performed to understand network behavior and detect coordinated attack activities. Many existing techniques stay behind for early detection and integration of multiple techniques to detect DDoS attack patterns. In this paper, we introduce a more efficient and effectively integrated SDN framework that addresses a gap in previous DDoS solutions. Our framework enables early and accurate detection of DDoS traffic patterns within SDN-based cloud environments. In this framework, we use Recursive Feature Elimination (RFE), Density Based Spatial Clustering (DBSCAN), time series techniques like Auto Regressive Integrated Moving Average (ARIMA), Lyapunov exponent, exponential smoothing filter, dynamic threshold, and lastly, Rule-based classifier. We have evaluated the proposed RDAER model on the CICDDoS 2019 dataset, that achieved an accuracy level of 99.92% and a fast detection time of 20 s, outperforming existing methods.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140169295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Uma Rani, Sunil Kumar, Neeraj Dahiya, Kamna Solanki, Shanu Rakesh Kuttan, Sajid Shah, Momina Shaheen, Faizan Ahmad
{"title":"An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications","authors":"Uma Rani, Sunil Kumar, Neeraj Dahiya, Kamna Solanki, Shanu Rakesh Kuttan, Sajid Shah, Momina Shaheen, Faizan Ahmad","doi":"10.1186/s13677-024-00630-y","DOIUrl":"https://doi.org/10.1186/s13677-024-00630-y","url":null,"abstract":"Bitcoin exchange security is crucial because of MEC's widespread use. Cryptojacking has compromised MEC app security and bitcoin exchange ecosystem functionality. This paper propose a cutting-edge neural network and AdaHessian optimization technique for cryptojacking prediction and defense. We provide a cutting-edge deep neural network (DNN) cryptojacking attack prediction approach employing pruning, post-training quantization, and AdaHessian optimization. To solve these problems, this paper apply pruning, post-training quantization, and AdaHessian optimization. A new framework for quick DNN training utilizing AdaHessian optimization can detect cryptojacking attempts with reduced computational cost. Pruning and post-training quantization improve the model for low-CPU on-edge devices. The proposed approach drastically decreases model parameters without affecting Cryptojacking attack prediction. The model has Recall 98.72%, Precision 98.91%, F1-Score 99.09%, MSE 0.0140, RMSE 0.0137, and MAE 0.0139. Our solution beats state-of-the-art approaches in precision, computational efficiency, and resource consumption, allowing more realistic, trustworthy, and cost-effective machine learning models. We address increasing cybersecurity issues holistically by completing the DNN optimization-security loop. Securing Crypto Exchange Operations delivers scalable and efficient Cryptojacking protection, improving machine learning, cybersecurity, and network management.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"133 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140156379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure data interaction method based on edge computing","authors":"Weiwei Miao, Yuanyi Xia, Rui Zhang, Xinjian Zhao, Qianmu Li, Tao Wang, Shunmei Meng","doi":"10.1186/s13677-024-00617-9","DOIUrl":"https://doi.org/10.1186/s13677-024-00617-9","url":null,"abstract":"Deep learning achieves an outstanding success in the edge scene due to the appearance of lightweight neural network. However, a number of works show that these networks are vulnerable for adversarial examples, bringing security risks. The classical adversarial detection methods are used in white-box setting and show weak performances in black-box setting, like the edge scene. Inspired by the experimental results that different models give various predictions for the same adversarial example with a high probability, we propose a novel adversarial detection method called Ensemble-model Adversarial Detection Method (EADM). EADM defenses the prospective adversarial attack on edge devices by cloud monitoring, which deploys ensemble-model in the cloud and give the most possible label for each input copy received in the edge. The comparison experiment in the assumed edge scene with baseline methods demonstrates the effect of EADM, with a higher defense success rate and a lower false positive rate by an ensemble-model consisted of five pretrained models. The additional ablation experiment explores the influence of different model combinations and adversarial trained models. Besides, the possibility about transfering our method to other fields is discussed, showing the transferability of our method across domains.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140156447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huiyong Wang, Qi Wang, Yong Ding, Shijie Tang, Yujue Wang
{"title":"Privacy-preserving federated learning based on partial low-quality data","authors":"Huiyong Wang, Qi Wang, Yong Ding, Shijie Tang, Yujue Wang","doi":"10.1186/s13677-024-00618-8","DOIUrl":"https://doi.org/10.1186/s13677-024-00618-8","url":null,"abstract":"Traditional machine learning requires collecting data from participants for training, which may lead to malicious acquisition of privacy in participants’ data. Federated learning provides a method to protect participants’ data privacy by transferring the training process from a centralized server to terminal devices. However, the server may still obtain participants’ privacy through inference attacks and other methods. In addition, the data provided by participants varies in quality, and the excessive involvement of low-quality data in the training process can render the model unusable, which is an important issue in current mainstream federated learning. To address the aforementioned issues, this paper proposes a Privacy Preserving Federated Learning Scheme with Partial Low-Quality Data (PPFL-LQDP). It can achieve good training results while allowing participants to utilize partial low-quality data, thereby enhancing the privacy and security of the federated learning scheme. Specifically, we use a distributed Paillier cryptographic mechanism to protect the privacy and security of participants’ data during the Federated training process. Additionally, we construct composite evaluation values for the data held by participants to reduce the involvement of low-quality data, thereby minimizing the negative impact of such data on the model. Through experiments on the MNIST dataset, we demonstrate that this scheme can complete the model training of federated learning with the participation of partial low-quality data, while effectively protecting the security and privacy of participants’ data. Comparisons with related schemes also show that our scheme has good overall performance.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140155614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}