Concurrency and Computation-Practice & Experience最新文献

筛选
英文 中文
Exploring Blockchain-Based Patient-Centric Healthcare: A Comprehensive Review 探索基于区块链的以患者为中心的医疗保健:全面回顾
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-05-16 DOI: 10.1002/cpe.70124
Deepak Kumar Mishra, Pawan Singh Mehra
{"title":"Exploring Blockchain-Based Patient-Centric Healthcare: A Comprehensive Review","authors":"Deepak Kumar Mishra,&nbsp;Pawan Singh Mehra","doi":"10.1002/cpe.70124","DOIUrl":"https://doi.org/10.1002/cpe.70124","url":null,"abstract":"<div>\u0000 \u0000 <p>Blockchain, an immutable, decentralized, and distributed ledger technology, has the potential to revolutionize the sharing and access of confidential data, particularly in the healthcare sector, where patient-centric systems benefit greatly from its robust security features and ability to ensure data integrity. Recognizing the potential, this paper reviews current research on blockchain-based healthcare architectures that focus on patient-centric solutions, exploring the present state of these architectures and highlighting the growing interest in blockchain applications for enhancing healthcare. The review identifies key trends, challenges, and opportunities within this domain, analyzing the evolution of research over recent years, the types of studies conducted, their geographical distribution, and publication channels. It delves into the prevalent use cases, primary challenges addressed, and contributions of various studies, covering common blockchain platforms, types of blockchains, and the implementation of smart contracts. Guided by four critical questions aimed at improving security and privacy, streamlining patient consent management, fostering interoperability, and ensuring compliance with healthcare data regulations, this research underscores the importance of patient data security through advanced encryption techniques, access controls, and decentralized storage solutions. It also highlights the benefits of patient-controlled data sharing, empowering individuals with greater control over their health information. Despite progress, the review identifies areas requiring further exploration, such as advanced security threats, nuanced and dynamic consent models, comprehensive interoperability solutions, and alignment with evolving healthcare regulations. Addressing these gaps necessitates research into scalable privacy-preserving blockchain architectures that prioritize dynamic consent management and interoperability standards, thus making regulatory compliance possible in an ever-changing healthcare environment.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 12-14","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144074286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SS-LDP: A Framework for Sparse Streaming Data Collection Based on Local Differential Privacy
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-05-14 DOI: 10.1002/cpe.70119
Hongjiao Li, Ming Jin, Jiayi Xu, Zhenya Shi, Anyang Yin
{"title":"SS-LDP: A Framework for Sparse Streaming Data Collection Based on Local Differential Privacy","authors":"Hongjiao Li,&nbsp;Ming Jin,&nbsp;Jiayi Xu,&nbsp;Zhenya Shi,&nbsp;Anyang Yin","doi":"10.1002/cpe.70119","DOIUrl":"https://doi.org/10.1002/cpe.70119","url":null,"abstract":"<div>\u0000 \u0000 <p>The continuous collection of streaming data in the Internet of Things (IoT) may compromise user privacy, as such data often originates from personal information. Local differential privacy (LDP) is a novel privacy notion that offers a strong privacy guarantee to all users without relying on a trusted data collector. However, existing LDP-based studies mainly focus on static scenarios or perturbation of data points at a single timestamp without sufficiently considering data sparsity, which adds excessive noise and leads to low utility. Therefore, we propose a Framework for Sparse Streaming Data Collection based on Local Differential Privacy (SS-LDP), which aims to provide high utility at each timestamp while satisfying <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>w</mi>\u0000 </mrow>\u0000 <annotation>$$ w $$</annotation>\u0000 </semantics></math>-event LDP. One component is the introduction of an upper-bound optimization mechanism, which reduces the noise scale by combining error minimization with the gradient descent method. Another component of SS-LDP targets the efficient management of privacy resources through two specific strategies. First, significant changes in streaming data are captured by calculating differences between the latest few data points, thereby conserving the privacy budget. Second, an improved sparse privacy budget allocation mechanism quantifies data sparsity at each timestamp using the moving average method, enabling efficient allocation of the privacy budget for each timestamp. SS-LDP is evaluated using two real-world datasets and compared with four baseline methods that satisfy <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>w</mi>\u0000 </mrow>\u0000 <annotation>$$ w $$</annotation>\u0000 </semantics></math>-event privacy. Extensive experiments and theoretical analyses are conducted to demonstrate the superiority of our framework.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 12-14","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143944447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BRL-Net: A Blockchain-Based Task Offloading Framework Using Smart Contracts for Metaverse
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-05-14 DOI: 10.1002/cpe.70112
Priyadarshni Gupta, Praveen Kumar, Shivani Tripathi, Rajiv Misra
{"title":"BRL-Net: A Blockchain-Based Task Offloading Framework Using Smart Contracts for Metaverse","authors":"Priyadarshni Gupta,&nbsp;Praveen Kumar,&nbsp;Shivani Tripathi,&nbsp;Rajiv Misra","doi":"10.1002/cpe.70112","DOIUrl":"https://doi.org/10.1002/cpe.70112","url":null,"abstract":"<div>\u0000 \u0000 <p>The emergence of the Metaverse has introduced significant challenges in task offloading and data processing due to its virtual universe nature with immersive environments and a multitude of interconnected users and devices. The abundance of data in the Metaverse poses security challenges in local processing, necessitating traditional methods such as data transfer to Mobile Edge Computing (MEC) and subsequently to the cloud, thereby emphasizing security concerns. In this paper, a novel approach to address these challenges has been introduced: An Ethereum Blockchain-based MEC framework uses smart contracts designed to ensure secure task offloading. It enables authentication in the Metaverse through smart contracts, followed by modeling the task offloading issue as a Markov Decision Process (MDP). To solve this MDP problem, a hybrid algorithm integrating Deep Q-Networks (DQN) with Bidirectional Long Short-Term Memory (Bi-LSTM), known as BRL-Net (Bi-LSTM Reinforcement Learning Network), has been proposed. This framework enables secure and efficient task offloading in dynamic Metaverse environments. BRL-Net outperforms Proximal Policy Optimization (PPO), achieving a 9.93% higher reward and greater stability. The BRL-Net's performance across Blockchain consensus mechanisms shows Delegated Proof of Stake (DPoS) as the most efficient, reducing latency by 49.96%, increasing throughput by 10.48%, and lowering energy consumption by 50.24%, compared to Proof of Stake (PoS), thereby optimizing Metaverse performance.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 12-14","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143944449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Level Role-Based Provable Data Possession Scheme for Medical Cloud Storage
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-05-14 DOI: 10.1002/cpe.70120
Ruizhong Du, Ziyuan Wang, Yuan Wan
{"title":"A Multi-Level Role-Based Provable Data Possession Scheme for Medical Cloud Storage","authors":"Ruizhong Du,&nbsp;Ziyuan Wang,&nbsp;Yuan Wan","doi":"10.1002/cpe.70120","DOIUrl":"https://doi.org/10.1002/cpe.70120","url":null,"abstract":"<div>\u0000 \u0000 <p>Medical institutions are increasingly leveraging cloud servers to store electronic health records (EHRs), highlighting the need for robust data security measures to protect the sensitive personal information they contain. Our study introduces a blockchain-enabled, fine-grained data integrity auditing scheme that not only safeguards the confidentiality and integrity of EHRs within cloud-based healthcare environments but also demonstrates a significant enhancement in data security with our statistical results, reinforcing the trustworthiness of cloud storage for sensitive medical data. The proposed scheme is notable for its support of dynamic user revocation, implementing a multi-tiered role hierarchy that facilitates the efficient access revocation. In this hierarchy, adding new users or updating existing ones involves merely altering the edge labels, thereby obviating the need for a comprehensive recalculation of cryptographic keys. We have developed a smart contract-based access control mechanism to ensure privacy while enabling granular access control. This mechanism leverages password and role-based authentication to empower multi-tiered roles with the ability to perform data integrity audits by their designated permissions. Through security analysis, we have substantiated that our protocol withstands attacks aimed at subversion, counterfeiting, and tag inconsistency. Compared to existing works, our approach uniquely integrates multi-level role hierarchies with blockchain-based dynamic revocation, achieving higher granularity and adaptability.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 12-14","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143944953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vupsi: Verifiable Unbalanced Private Set Intersection Based on Homomorphic Encryption
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-05-14 DOI: 10.1002/cpe.70122
Ruirui Gao, Shuai Shang, Wenqi Zhang, Xiaofen Wang, Ke Huang, Xiong Li
{"title":"Vupsi: Verifiable Unbalanced Private Set Intersection Based on Homomorphic Encryption","authors":"Ruirui Gao,&nbsp;Shuai Shang,&nbsp;Wenqi Zhang,&nbsp;Xiaofen Wang,&nbsp;Ke Huang,&nbsp;Xiong Li","doi":"10.1002/cpe.70122","DOIUrl":"https://doi.org/10.1002/cpe.70122","url":null,"abstract":"<div>\u0000 \u0000 <p>Unbalanced private set intersection (UPSI), a cryptographic technique for securely computing set intersections in asymmetrical setups while preserving privacy, has been extensively studied. However, existing protocols often require clients with small sets to participate in computations, are highly interactive, and lack result verifiability. In this paper, we propose VuPSI, a verifiable unbalanced PSI scheme designed to overcome the limitations of existing protocols. VuPSI offloads the computational burden to the server, reducing client-side processing and simplifying the overall workflow. In addition, VuPSI incorporates an efficient zero-knowledge verification mechanism that allows clients to efficiently verify the correctness of intersection results with minimal computational overhead. This approach significantly improves the reliability of PSI outcomes. Our design implements a low-interaction protocol that ensures scalability and efficiency, especially for large-scale dynamic datasets. Experimental evaluations show that VuPSI is both efficient and practical. Specifically, VuPSI can process 1,024 client-side items and 1,000,000 server-side items within seconds using 32 threads, achieving 40×  the communication efficiency of comparable protocols such as DiPSI. Its lower computational overhead and faster data preprocessing make it well-suited for real-time, dynamic server environments.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 12-14","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143944448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Load Distribution Approach for Optimizing Resources in SDN-Based Edge Computing Environment
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-05-14 DOI: 10.1002/cpe.70113
Ajay Nain, Sophiya Sheikh, Mohammad Shahid
{"title":"An Efficient Load Distribution Approach for Optimizing Resources in SDN-Based Edge Computing Environment","authors":"Ajay Nain,&nbsp;Sophiya Sheikh,&nbsp;Mohammad Shahid","doi":"10.1002/cpe.70113","DOIUrl":"https://doi.org/10.1002/cpe.70113","url":null,"abstract":"<div>\u0000 \u0000 <p>In the rapidly evolving networking and communication technology era, the emergence of novel edge computing paradigms helps reduce latency and improve communication efficiency. The advancements of edge computing bring data processing closer to its source, reducing communication distance. Moreover, integrating Software-Defined Networking (SDN) in edge computing enhances network management by decoupling the control plane from the data plane, enabling more flexible and efficient resource allocation in distributed environments. However, scheduling, resource allocation, and load balancing are significant obstacles to enhancing the edge computing resources' performance. Besides, efficient resource allocation and load balancing help to use all resources and optimize the system's performance effectively. To address these issues, this paper proposed an Average-Based Resource Allocation and Load Balancing (ABRL) algorithm for task allocation and load balancing, which aims to minimize the task's completion time and enhance the system's resource utilization. A three-layer SDN-based edge architecture is designed to implement the algorithm that improves the system's performance. The simulation studies have been conducted using the OpenDaylight (ODL) controller and implemented in Python. Experimental results demonstrate that the proposed strategy optimizes makespan, average resource utilization, and level of load balancing under consideration and exhibits better performance than the existing state-of-the-art techniques.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 12-14","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143944446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cuckoo Search Algorithm With Ensemble Strategy for Continuous Optimization Problems 连续优化问题的集成策略布谷鸟搜索算法
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-05-07 DOI: 10.1002/cpe.70116
Jiatang Cheng, Kaike Tu, Yan Xiong
{"title":"Cuckoo Search Algorithm With Ensemble Strategy for Continuous Optimization Problems","authors":"Jiatang Cheng,&nbsp;Kaike Tu,&nbsp;Yan Xiong","doi":"10.1002/cpe.70116","DOIUrl":"https://doi.org/10.1002/cpe.70116","url":null,"abstract":"<div>\u0000 \u0000 <p>Cuckoo search (CS) algorithm is a simple and effective optimization technique. However, CS algorithm may encounter the issue of premature convergence as the complexity of the problem increases. To address this challenge, a cuckoo search algorithm with ensemble strategy, called CSES, is presented in this paper. Specifically, three new search strategies with diverse properties are designed to boost the competitiveness. After that, according to the idea of selective ensemble, a priority roulette method is employed to select the appropriate search strategy at distinct phases of the evolution process, so as to produce more promising results. Furthermore, the effectiveness evaluation of CSES algorithm is carried out on 58 benchmark functions from CEC 2013 and CEC 2017 test suites and several real-world problems including chaotic time series prediction and transformer fault classification. Simulation outcomes illustrate that the introduced CSES is superior to five recently developed CS variants in terms of search accuracy and robustness, for example it provides 10 and 12 better performance improvements on <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>30</mn>\u0000 <mi>D</mi>\u0000 </mrow>\u0000 <annotation>$$ 30D $$</annotation>\u0000 </semantics></math> and <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>50</mn>\u0000 <mi>D</mi>\u0000 </mrow>\u0000 <annotation>$$ 50D $$</annotation>\u0000 </semantics></math> optimization of the CEC 2013 benchmarks, and produces 19 and 11 better performance improvements on <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>30</mn>\u0000 <mi>D</mi>\u0000 </mrow>\u0000 <annotation>$$ 30D $$</annotation>\u0000 </semantics></math> and <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>50</mn>\u0000 <mi>D</mi>\u0000 </mrow>\u0000 <annotation>$$ 50D $$</annotation>\u0000 </semantics></math> optimization of the CEC 2017 benchmarks, respectively. Moreover, CSES also exhibits more superiority compared to several other advanced evolutionary methods, including butterfly optimization algorithm (BOA), dung beetle optimizer (DBO), electric eel foraging optimization (EEFO), jellyfish search (JS) and wild horse optimizer (WHO), and yields 25 better performance improvements on <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>30</mn>\u0000 <mi>D</mi>\u0000 </mrow>\u0000 <annotation>$$ 30D $$</annotation>\u0000 </semantics></math> optimization of the CEC 2013 benchmarks.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 12-14","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143914087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Carbon Emission Rights Trading Prices Based on the CNN–LSTM Model in the Context of Carbon Peak: Taking Guangdong Province as an Example 碳峰值背景下基于CNN-LSTM模型的碳排放权交易价格预测——以广东省为例
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-05-07 DOI: 10.1002/cpe.70121
Tinggui Chen, Jiawen Ye, Yanping Zhou, Qing Yu, Shanshan Wang, Gongfa Li
{"title":"Prediction of Carbon Emission Rights Trading Prices Based on the CNN–LSTM Model in the Context of Carbon Peak: Taking Guangdong Province as an Example","authors":"Tinggui Chen,&nbsp;Jiawen Ye,&nbsp;Yanping Zhou,&nbsp;Qing Yu,&nbsp;Shanshan Wang,&nbsp;Gongfa Li","doi":"10.1002/cpe.70121","DOIUrl":"https://doi.org/10.1002/cpe.70121","url":null,"abstract":"<div>\u0000 \u0000 <p>Carbon emissions are a significant contributor to global warming. As one of the largest carbon emitters in the world, China is committed to establishing a carbon emission trading market to address the challenges posed by climate change. The carbon price is a fundamental component of the carbon financial market. Accurately predicting it can improve environmental quality, reduce energy demand, and promote economic growth. This study uses price data from the Guangdong carbon market as a case study and employs a hybrid model that integrates Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks for carbon price forecasting. The findings indicate that: (1) the CNN–LSTM model exhibits optimal predictive performance when the sliding window is set to a size of 5 on the basis of previous carbon price data. (2) By incorporating significant indicator features from the Guangdong pilot carbon price dataset while maintaining a sliding window size of 5, the model achieves superior predictive accuracy, as evidenced by a Goodness of Fit (<i>R</i><sup>2</sup>) of 0.8622 and a mean absolute error (MAE) of 0.0228, resulting in the most favorable comprehensive evaluation index. (3) The integration of one-dimensional convolutional layers with LSTM layers in the CNN–LSTM model effectively leverages the strengths of CNNs for local feature extraction and the capabilities of LSTMs for modeling time series data. This approach leads to a substantial improvement in predictive performance compared with alternative models such as Support Vector Machine (SVM), Recurrent Neural Network (RNN), and LSTM.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 12-14","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143914088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Multilevel Business Process Monitoring via BPMN Extension 通过BPMN扩展建模多层次业务流程监控
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-05-05 DOI: 10.1002/cpe.70074
Guosheng Kang, Zhen Wang, Hangyu Cheng, Jianxun Liu, Yiping Wen, Jun Peng
{"title":"Modeling Multilevel Business Process Monitoring via BPMN Extension","authors":"Guosheng Kang,&nbsp;Zhen Wang,&nbsp;Hangyu Cheng,&nbsp;Jianxun Liu,&nbsp;Yiping Wen,&nbsp;Jun Peng","doi":"10.1002/cpe.70074","DOIUrl":"https://doi.org/10.1002/cpe.70074","url":null,"abstract":"<div>\u0000 \u0000 <p>Business process monitoring involves real-time supervision of a series of activities carried out by an organization to achieve specific objectives. Process event monitoring points (PEMP) are used to pinpoint specific locations within a process model where expected events are anticipated to occur. However, in general business process modeling languages, such as business process model and notation (BPMN), there is a lack of explicit modeling for PEMPs. This article proposes a method for modeling pairwise event monitoring points in business process models to track the execution status of specific activities or process segments via BPMN extension. Specifically, process monitoring points are designed by expanding the modeling element of sequence flow. Moreover, the business process model is decomposed using the refined process structure tree (RPST) to verify the soundness of the designed pairwise monitoring points. The proposed method allows flexible monitoring at the process segment level. And the process monitoring data could be used for a clear understanding of business progress, especially useful in heterogeneous business process model to support decision-making. Through case study from real-world business processes, the effectiveness and usefulness of the proposed process monitoring modeling method is validated.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 12-14","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143905035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Ciphertext-Policy Attribute-Based Encryption for Controlled Multi-User Collaboration 基于区块链密文-策略属性的受控多用户协作加密
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-05-05 DOI: 10.1002/cpe.70093
Zhaoqian Zhang, Di Wu, Qiang Zhu, Wei Qin
{"title":"Blockchain-Based Ciphertext-Policy Attribute-Based Encryption for Controlled Multi-User Collaboration","authors":"Zhaoqian Zhang,&nbsp;Di Wu,&nbsp;Qiang Zhu,&nbsp;Wei Qin","doi":"10.1002/cpe.70093","DOIUrl":"https://doi.org/10.1002/cpe.70093","url":null,"abstract":"<div>\u0000 \u0000 <p>As cloud computing technology continues to advance and mature, the public cloud has emerged as a predominant method for data sharing. Ciphertext-policy attribute-based encryption (CP-ABE) is recognized as a highly promising cryptographic approach that safeguards data confidentiality while improving sharing efficiency. However, as the demand for collaborative access increases, the shortcomings of existing schemes in controlled multi-user collaboration scenarios have become increasingly evident. In this paper, we propose a blockchain-based CP-ABE scheme for controlled multi-user collaboration. We convert the regular policy to collaborative policy by the collaborative attribute bounding to a ciphertext, and we present a collaborative access structure with attribute reuse to avoid an increase in computation and storage overhead. Furthermore, we design a collaborative channel driven by smart contracts to efficiently control the collaboration within the same group. Security analysis demonstrates that our scheme achieves IND-CPA security, ensures controlled collaboration, and resists user collusion. Additionally, we analyze the impact of blockchain security on the scheme. Performance comparisons indicate that our scheme is competitive, achieving a moderate performance in encryption, a 15% reduction in decryption overhead, and a 5% reduction in key generation overhead compared to state-of-the-art approaches, while completely eliminating the need for any collaborative communication overhead. These results align with the initial purpose of the scheme and demonstrate its feasibility in multi-user collaborative scenarios.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 12-14","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143908995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信