Computer Networks and Communications Computer Networks and Communications (CNC) is an international, peer-reviewed, open access journal in science and technology for original research papers focused on networks and communications, published biannually online by Universal Wiser Publisher (UWP).
> fully open access - free for readers
> no article processing charge (APC) paid by authors or their institutions until 2025
> thorough double-blind peer-review
> free post-publication promotion service by the Editorial Office
> no article processing charge (APC) paid by authors or their institutions until 2025
> thorough double-blind peer-review
> free post-publication promotion service by the Editorial Office
- Analysis of Path Convergence in Chord DHTpor Vladimir Rocha el julio 24, 2024 a las 4:00 pm
Chord is a Distributed Hash Table widely used for its efficiency in searching for information. The efficiency of this structure relies on creating short paths of O(log2 n) between two nodes, in which n is the number of nodes. To enhance efficiency, several studies use replication in the nodes belonging to the network, assuming that searches will converge in these replicated nodes. This work proposes a convergence formula and analyzes the number of searches converging on nodes for different network sizes (small, medium, and large), up to one million nodes. The experiments show that the convergence creates three zones and the results support the replication techniques from previous studies and demonstrate that it is feasible to replicate in nodes that were not considered in these studies.
- Optimizing Cloud Resource Allocation in Federated Environments through Outsourcing Strategiespor Arash Mazidi el julio 7, 2024 a las 4:00 pm
Cloud computing enables users to access required resources, with the invention of high-end devices leading to exponential increases in cloud resource requests. This poses significant challenges for resource management due to the scale of the cloud and unpredictable user demands. This paper presents an approach to managing resources during peak request periods for virtual machines (VMs) by leveraging cloud federation, outsourcing requests to other federation members. An algorithm is proposed to initiate cloud federation and allocate customer requests within it. The primary objectives are to increase the profit of cloud providers and improve resource utilization. An ensemble algorithm maximizes profit using both the proposed algorithm and three established ones. Experimental results demonstrate that our method outperforms existing approaches in profit, resource utilization, and rejected requests in most scenarios.
- DeAuth: A Decentralized Authentication and Authorization Scheme for Secure Private Data Sharingpor Phillipe Austria el julio 4, 2024 a las 4:00 pm
The sharing of private information is a daunting, multifaceted, and expensive undertaking. Furthermore, identity management is an additional challenge that poses significant technological, operational, and legal obstacles. Present solutions and their accompanying infrastructures rely on centralized models that are susceptible to hacking and can hinder data control by the rightful owner. Consequently, blockchain technology has generated interest in the fields of identity and access control. This technology is viewed as a potential solution due to its ability to offer decentralization, transparency, provenance, security, and privacy benefits. Nevertheless, a completely decentralized and private solution that enables data owners to control their private data has yet to be presented. In this research, we introduce DeAuth, a novel decentralized, authentication and authorization scheme for secure private data transfer. DeAuth combines blockchain, smart-contracts, decentralized identity, and distributed peer-to-peer (P2P) storage to give users more control of their private data, and permissioning power to share without centralized services. For this scheme, identity is proven using decentralized identifiers and verifiable credentials, while authorization to share data is performed using the blockchain. A prototype was developed using the Ethereum Blockchain and the InterPlanetary Files System, a P2P file sharing protocol. We evaluated DeAuth through a use-case study and metrics such as security, performance, and cost. Our findings indicate DeAuth to be viable alternative to using centralized services; however, the underlying technologies are still in its infancies and require more testing before it can supplant traditional services.