P. Punitha, Lakshmana Kumar, S. Revathi, R. Premalatha, R. S. Aiswarya
{"title":"Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services","authors":"P. Punitha, Lakshmana Kumar, S. Revathi, R. Premalatha, R. S. Aiswarya","doi":"10.1142/s0218843024500011","DOIUrl":"https://doi.org/10.1142/s0218843024500011","url":null,"abstract":"<p>As with IoT devices, cloud computation increases its applicability to other areas that use the information and puts it in a commonplace that is necessary for computing and analysis. These devices need the cloud to store and retrieve data since they are unable to store and process data on their own. Cloud computing offers a variety of services to consumers, including IaaS, PaaS, and SaaS. The usage of cloud resources for data storage that may be accessible by all users associated with cloud computing is a key disadvantage of cloud computing. Without disclosing the data’s contents, the usage of Public Key Encryptions with Keyword Search (PEKS) secures publicly encrypted keys against third-party search capabilities that are not trustworthy. PEKs provide a security risk every time Interior Keywords Guessing Attacks (IKGA) are discovered in the system since an unauthorized service estimates the keywords in the trapdoor. This issue can be resolved using various methodologies such as the Certificateless Fleshed Public Key Authenticated Encryption of Keyword Search (CL-HPAEKS), which also uses Altered Elliptic Curve Cryptography (MECC), and the Mutation Centred Flower Pollinations Algorithm (CM-FPA), which uses optimization in keys to be improving the algorithm’s performance. The system’s security is achieved by adding a Message Fragments 5 (MD5) scramble mechanism. The proposed system achieves system security of 96%, and it takes less time to implement than earlier encryption methods.</p>","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140169926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edge Computing Security of Mobile Communication System Based on Computer Algorithms","authors":"Jinna Zhang","doi":"10.1142/s0218843024500023","DOIUrl":"https://doi.org/10.1142/s0218843024500023","url":null,"abstract":"<p>With the progress of information technology recently, mobile communication system edge computing (EC) has been widely used in all walks of life, but the traditional mobile communication system EC mode has security problems such as privacy disclosure, malicious tampering, and virus attacks. Computer algorithms has brought new vitality to EC in mobile communication systems. This paper analyzed the application of computer algorithm in EC mode of mobile communication system, and selected 20 users as the research object. This paper adopted traditional computing mode (such as cloud computing) and computer algorithm-based mobile communication system EC security research. This text compared the effects of two modes on security performance, data transmission efficiency, energy consumption, cost savings, and user satisfaction. The experimental results in this paper showed that the average security of EC mode of mobile communication system based on computer algorithm was 84%, and the average data transmission time was 4.8<span><math altimg=\"eq-00001.gif\" display=\"inline\" overflow=\"scroll\"><mspace width=\".17em\"></mspace></math></span><span></span>s. The energy consumption was 40%, and the cost savings and user satisfaction were 432,000 yuan and 13 points, respectively. Both were superior to the traditional edge counting mode. The EC mode of mobile communication system using computer algorithms can significantly improve the security of mobile communication, data transmission speed, cost savings, user satisfaction, and reduce energy consumption. This model has important significance and value for social development.</p>","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CAIKD: Tesla stock prediction based on Twitter comments' sentiment feature extraction and ensemble networks","authors":"Zilan Cao, Senyao Hu, Hangyu Cao, Zheng Tao","doi":"10.1142/s0218843024500072","DOIUrl":"https://doi.org/10.1142/s0218843024500072","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chiranjit Dutta, R.M Rani, Amar Jain, I. Poonguzhali, D. Salunke, Ruchi Patel
{"title":"ACSICS: Deep Learning Modified Reinforcement Learning with Virtual Machine Consolidation for Energy-Efficient Resource Allocation in Cloud Computing","authors":"Chiranjit Dutta, R.M Rani, Amar Jain, I. Poonguzhali, D. Salunke, Ruchi Patel","doi":"10.1142/s0218843024500059","DOIUrl":"https://doi.org/10.1142/s0218843024500059","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amani K. Samha, Ghalib H. Alshammri, Niroj Kumar Pani, Yogesh Misra, V. Kolluru
{"title":"IMRCDS: Privacy Preserving Wireless Sensor Networks For E-Healthcare Applications","authors":"Amani K. Samha, Ghalib H. Alshammri, Niroj Kumar Pani, Yogesh Misra, V. Kolluru","doi":"10.1142/s0218843024500060","DOIUrl":"https://doi.org/10.1142/s0218843024500060","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Sathyaprakash, Poovendran Alagarsundaram, Mohanarangan Veerapperumal Devarajan, Ahmed Alkhayyat, Parthasarathy Poovendran, D. R. Rani, V. Savitha
{"title":"Medical Practitioner-Centric Heterogeneous Network Powered Efficient E-Healthcare Risk Prediction On Health Big Data","authors":"P. Sathyaprakash, Poovendran Alagarsundaram, Mohanarangan Veerapperumal Devarajan, Ahmed Alkhayyat, Parthasarathy Poovendran, D. R. Rani, V. Savitha","doi":"10.1142/s0218843024500126","DOIUrl":"https://doi.org/10.1142/s0218843024500126","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMRCDS: Analysis of Influencing Factors of Economic Management Decision of Commercial Banks Based on Big Data Intelligent Decision","authors":"Weijian Yang, Han Yang","doi":"10.1142/s0218843024500114","DOIUrl":"https://doi.org/10.1142/s0218843024500114","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACSICS: Depth-guided filtering-based null-domain background suppression for graphic image enhancement in visual communication design","authors":"Tian Xia","doi":"10.1142/s0218843024500102","DOIUrl":"https://doi.org/10.1142/s0218843024500102","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139613856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CC2530-based wireless data long-distance communication simulation design and application","authors":"Yuling Zhang","doi":"10.1142/s0218843024500047","DOIUrl":"https://doi.org/10.1142/s0218843024500047","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139525938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMRCDS: Study on Soft Sensing Model of Multi-component System Concentration Based on Linear Superposition of Single Molecule System","authors":"Jiangting Song, Fujiang Jin, Li-chun Zhou","doi":"10.1142/s0218843024500084","DOIUrl":"https://doi.org/10.1142/s0218843024500084","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139526273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}