Khaled M. Matrouk , Arunmozhi Selvi , Ahmad Yahiya Ahmad Bani Ahmad , Dhurgadevi M
{"title":"基于自适应深度学习的用户身份验证与数字签名的最佳密钥辅助加密,用于b区块链中安全的移动边缘计算数据存储","authors":"Khaled M. Matrouk , Arunmozhi Selvi , Ahmad Yahiya Ahmad Bani Ahmad , Dhurgadevi M","doi":"10.1016/j.comnet.2025.111482","DOIUrl":null,"url":null,"abstract":"<div><div>The development of Internet of Things (IoT) gadgets boosted the need for a task computing system that is reliable and efficient. Mobile Edge Computing (MEC) is growing and has become a viable tool for proximate and dependent-on latency jobs. Edge technology is well suited to IoT applications that demand minimal latency, position understanding, and large numbers of interconnections. It certainly compensates for some deficiencies in the cloud in the fields of electrical power and immediate analysis. However, ensuring the security of data in an application context remains a significant concern. Furthermore, privacy is an issue for any computing system that contains dispersed and diverse equipment. Blockchain represents a relatively new technology that emerged as an intriguing option for ensuring integrity, safety, uniformity, and authenticity. Yet, blockchain is unable to ensure adequate privacy for information on its own. So, to prevent the privacy of IoT-based data blockchain technology was developed. The data are collected from the IoT devices. The user authentication is verified, and the data are stored in the network. Also, the Adaptive Deep Markov Random Field (ADMRF) model was used for getting the verified data. The parameters in the ADMRF are tuned with the Help of the Improved Equilibrium Optimized (IEO). Once the user authentication is verified, then the data are encrypted with the help of the Attribute-Based Encryption (ABE) technique. The encryption keys are optimally generated with the help of the IEO. The encrypted data are then digitally signed by the authorized user, and then it is stored in the blockchain. The security of the model is measured by comparing it with other existing models.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"269 ","pages":"Article 111482"},"PeriodicalIF":4.4000,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An adaptive deep learning-based user authentication with digitally signed optimal key-aided encryption for secured mobile edge computing data storage in blockchain\",\"authors\":\"Khaled M. Matrouk , Arunmozhi Selvi , Ahmad Yahiya Ahmad Bani Ahmad , Dhurgadevi M\",\"doi\":\"10.1016/j.comnet.2025.111482\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The development of Internet of Things (IoT) gadgets boosted the need for a task computing system that is reliable and efficient. Mobile Edge Computing (MEC) is growing and has become a viable tool for proximate and dependent-on latency jobs. Edge technology is well suited to IoT applications that demand minimal latency, position understanding, and large numbers of interconnections. It certainly compensates for some deficiencies in the cloud in the fields of electrical power and immediate analysis. However, ensuring the security of data in an application context remains a significant concern. Furthermore, privacy is an issue for any computing system that contains dispersed and diverse equipment. Blockchain represents a relatively new technology that emerged as an intriguing option for ensuring integrity, safety, uniformity, and authenticity. Yet, blockchain is unable to ensure adequate privacy for information on its own. So, to prevent the privacy of IoT-based data blockchain technology was developed. The data are collected from the IoT devices. The user authentication is verified, and the data are stored in the network. Also, the Adaptive Deep Markov Random Field (ADMRF) model was used for getting the verified data. The parameters in the ADMRF are tuned with the Help of the Improved Equilibrium Optimized (IEO). Once the user authentication is verified, then the data are encrypted with the help of the Attribute-Based Encryption (ABE) technique. The encryption keys are optimally generated with the help of the IEO. The encrypted data are then digitally signed by the authorized user, and then it is stored in the blockchain. The security of the model is measured by comparing it with other existing models.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"269 \",\"pages\":\"Article 111482\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2025-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625004499\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625004499","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
An adaptive deep learning-based user authentication with digitally signed optimal key-aided encryption for secured mobile edge computing data storage in blockchain
The development of Internet of Things (IoT) gadgets boosted the need for a task computing system that is reliable and efficient. Mobile Edge Computing (MEC) is growing and has become a viable tool for proximate and dependent-on latency jobs. Edge technology is well suited to IoT applications that demand minimal latency, position understanding, and large numbers of interconnections. It certainly compensates for some deficiencies in the cloud in the fields of electrical power and immediate analysis. However, ensuring the security of data in an application context remains a significant concern. Furthermore, privacy is an issue for any computing system that contains dispersed and diverse equipment. Blockchain represents a relatively new technology that emerged as an intriguing option for ensuring integrity, safety, uniformity, and authenticity. Yet, blockchain is unable to ensure adequate privacy for information on its own. So, to prevent the privacy of IoT-based data blockchain technology was developed. The data are collected from the IoT devices. The user authentication is verified, and the data are stored in the network. Also, the Adaptive Deep Markov Random Field (ADMRF) model was used for getting the verified data. The parameters in the ADMRF are tuned with the Help of the Improved Equilibrium Optimized (IEO). Once the user authentication is verified, then the data are encrypted with the help of the Attribute-Based Encryption (ABE) technique. The encryption keys are optimally generated with the help of the IEO. The encrypted data are then digitally signed by the authorized user, and then it is stored in the blockchain. The security of the model is measured by comparing it with other existing models.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.