Forthcoming and Online First Articles

International Journal of Web and Grid Services

International Journal of Web and Grid Services (IJWGS)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Web and Grid Services (2 papers in press)

Regular Issues

  • Utilising Blockchain Technology and Federated Learning on the Internet of Vehicles for the Preservation of Security and Privacy: Systematic Review   Order a copy of this article
    by Wisam Alwash, Muhammed Ali Aydin, Hasan Hüseyin Balik 
    Abstract: In the field of the IoV, connected vehicles utilise network connections to improve transportation efficiency and safety. This will give rise to a range of vulnerabilities, specifically advanced cyber-attacks. These breaches will interrupt the normal functioning of vehicles and pose a significant hazard to the safety of passengers. This paper explores and reviews systematically the dual application of blockchain technology and FL as a fortified defence mechanism within the IoV ecosystem. This article presents illustrations of the risks present within the IoV domain and evaluates the efficacy of existing blockchain and FL methodologies, outlined in several papers, in addressing these potential challenges, particularly in the field of security and privacy. The paper provides an analysis of the advantages, limitations, and factors associated with these technologies in the context of maintaining the security and privacy of the IoV.
    Keywords: internet of vehicles; IoV; cyber-attacks; security; privacy; blockchain; federated learning; FL.
    DOI: 10.1504/IJWGS.2024.10065424
     

Special Issue on: Security for Cloud Computing

  • Searchable Symmetric Encryption Based on the Inner Product for Cloud Storage
    by Jun Yang, Shujuan Li, Xiaodan Yan, Baihui Zhang, Baojiang Cui 
    Abstract: Searchable encryption enables the data owner to store their own data after encrypting them in the cloud. Searchable encryption also allows the client to search over the data without leaking any information about it. In this paper, we rst introduce a searchable symmetric encryption scheme based on the inner product: it is more ecient to compute the inner product of two vectors. In our construction, the parties can be Data Owners, Clients or the Cloud Server. The three parties communicate with each other through the inner product to achieve the goal that the client can search the data in the cloud without leaking any information on the data the owner stored in the cloud. We then perform a security analysis and performance evaluation, which show that our algorithm and construction are secure and ecient.
    Keywords: Searchable Encryption; Searchable Symmetric Encryption; Inner Product; the Cloud Server; Security.