The Internet of Things (IoT) is in a recent state of instability due to the flooding of virtual data. It is believed that IoT and cloud computing have met their maximum thresholds and loading them with data after this point will only deteriorate their performance. Hence, edge computing has been introduced to mitigate the processing burden of IoT. To meet the security demands of edge computing, we intend to combine the method of blockchain along with edge computing for a better solution. Accordingly, this paper proposes the introduction of a novel blockchain model that is based on artificial neural networks and trust estimation called the behavioral monitoring trust estimation model. Performance metrics such as accuracy, precision, recall, and F-measure are calculated under normal conditions and under the injection of attacks like false data injection, booting attack, and node capturing. The proposed behavioral monitoring trust classification model is compared with existing classifiers like Naive Bayes, K-nearest neighbor, Auto Encoder, Random Forest, and Support Vector Machine, and is found to have improved performance. Additional evaluation parameters like execution time, encryption time, storage cost, computational overhead, energy efficiency, and packet drop possibility are also calculated for the proposed model and compared with existing blockchain techniques of Bitcoin, Ethereum, Hyperledger, Direct and indirect trust model, and mutual trust chain based blockchain model. The proposed model achieved an accuracy of 95%, a precision score of 90%, a recall score of 94%, and an F-measure of 94% indicating superior performance.
Read MoreDoi: https://doi.org/10.54216/FPA.170204
Vol. 17 Issue. 2 PP. 38-50, (2025)
Cloud computing has introduced itself as a mighty mechanism for delivering customers through the service model with on-demand, scalable, and instant access to computer resources. It will conduct effective load balancing and resource management, high importance so that the cloud system works with optimized performance and resource utilization. This gives a new strategy in load balancing and virtual machine (VM) control in cloud computing applied in the field using the Crocodile Optimization Algorithm (COA) for better performance. Inspired by crocodile hunting behaviors, the COA-based strategy is adopted to balance loads and manage VMs. This approach seeks to balance the number of the workload given to VMs with respect to the processing power of VMs and also the distribution of workload. It best uses resources in such a way that tasks are dynamically distributed to VMs in such a way that response time is at its minimum, and thus overall efficiency is enhanced in cloud computing. On the other hand, COA-based load balancing incorporates VM management techniques like migration and scaling to be adjustable in relation to the changing conditions of the workload. This allows dynamically adjusting the allocation of resources with respect to current demands, in such a way that assures optimal utilization of computational resources with high performance. The proposed approach was evaluated using simulations through CloudSim, one of the most adopted tools for simulating cloud computing. The COA effectively works are divided between the VM, which in turn will lead to better response time for the user request and improve cloud resource utilization. That is to mean, subsequent research would be some type of unique attempt in the area of load balancing and VM management in cloud computing, based on the Crocodile Optimization Algorithm. This approach improves efficient cloud computing through the balancing of load distribution, maximization of resource utilization, and lowering of response time.
Read MoreDoi: https://doi.org/10.54216/FPA.170205
Vol. 17 Issue. 2 PP. 51-61, (2025)
The pharmaceutical industry encounters numerous challenges in the management of medications and ensuring their authenticity, as well as safeguarding sensitive information within the supply chain. Maintaining the integrity of drug manufacturing processes, transaction records, and patient data from unauthorized access or tampering is crucial. Any breach in security could undermine trust throughout the entire supply chain. To mitigate these concerns, a multi-layered approach is employed. Initially, data encryption using QR codes with Attribute-Based Encryption provides a foundation for securing information. This is followed by an innovative strategy that combines Red Panda Optimization (RPO) Algorithm and Group Teaching Optimization algorithms (GTOA) to optimize encryption key selection. Finally, Multi-Party Computation (MPC) protocols along with Shamir's Secret Sharing enhances overall security measures. These procedures ensure that only authorized individuals have access to critical information essential for identifying counterfeit products and maintain confidentiality through Secure MPC verification without compromising sensitive details.
Read MoreDoi: https://doi.org/10.54216/FPA.170206
Vol. 17 Issue. 2 PP. 62-78, (2025)
Distributed Denial of Service (DDoS) attacks pose a significant threat to cloud computing environments, necessitating advanced detection methods. This review examines the application of Machine Learning (ML) and Deep Learning (DL) techniques for DDoS detection in cloud settings, focusing on research from 2019 to 2024. It evaluates the effectiveness of various ML and DL approaches, including traditional algorithms, ensemble methods, and advanced neural network architectures, while critically analyzing commonly used datasets for their relevance and limitations in cloud-specific scenarios. Despite improvements in detection accuracy and efficiency, challenges such as outdated datasets, scalability issues, and the need for real-time adaptive learning persist. Future research should focus on developing cloud-specific datasets, advanced feature engineering, explainable AI, and cross-layer detection approaches, with potential exploration of emerging technologies like quantum machine learning.
Read MoreDoi: https://doi.org/10.54216/FPA.170207
Vol. 17 Issue. 2 PP. 79-97, (2025)
Recently, Federated Learning (FL) has promptly gained aggregate interest owing to its emphasis on the data privacy of the user. As a privacy-preserving distributed learning algorithm, FL enables multiple parties to construct machine learning (ML) algorithms without exposing sensitive information. The distributed computation of FL may lead to drawn-out learning and constrained communication processes, which necessitate client-server communication cost optimization. The two hyperparameters that have a considerable effect on the FL performance are the number of local training passes and the ratio of chosen clients. Owing to training preference across different applications, it is challenging for the FL practitioner to manually choose these hyperparameters. Even though FL has resolved the problem of collaboration without compromising privacy, it has a transmission overhead because of repetitive model updating during training. Various researchers have introduced transmission-effective FL techniques for addressing these issues, but sufficient solutions are still lacking in cases where parties are in charge of data features. Therefore, this study develops an Optimization of Federated Learning Communication Costs through the Implementation of the Cheetah Optimization Algorithm (OFLCC-COA) technique. The OFLCC-COA technique is mainly applied for effectually optimizing the communication process in the FL to minimize the data transmission cost with the guarantee of enhanced model accuracy. The OFLCC-COA technique enhances the robust performance in unsteady network environment via the transmission of score values instead of large weights. Besides, the OFLCC-COA technique improves the communication efficiency of the network by transforming the form of data that clients send to servers. The performance analysis of the OFLCC-COA model occurs utilizing different performance measures. The simulation outcomes indicated that the OFLCC-COA model obtains superior performances over other methods in terms of distinct metrics
Read MoreDoi: https://doi.org/10.54216/FPA.170208
Vol. 17 Issue. 2 PP. 98-110, (2025)