Chunming Rong

Chunming Rong
University of Stavanger (UiS)

Professor
EiC of “Blockchain: Research and Applications” by Elsevier, EiC of Journal of Cloud Computing by Springer. SCI indexed.

About

302
Publications
47,096
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,628
Citations

Publications

Publications (302)
Article
Full-text available
Modern information systems are built fron a complex composition of networks, infrastructure, devices, services, and applications, interconnected by data flows that are often private and financially sensitive. The 5G networks, which can create hyperlocalized services, have highlighted many of the deficiencies of current practices in use today to cre...
Article
The demand for electricity is increasing exponentially day by day especially with the arrival of electric vehicles. In smart community neighborhood project, it demands electricity should be produced at the household or community level and sell or buy according to the demands. Since the actors can produce, sell and also buy according to the demands,...
Article
Full-text available
The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) technology breaks through the limitations of traditional terrestrial communications. The effective line-of-sight channel provided by UAVs can greatly improve the communication quality between edge servers and mobile devices (MDs). To further enhance the Quality-of-Se...
Preprint
Full-text available
Modern information systems are built fron a complex composition of networks, infrastructure, devices, services, and applications, interconnected by data flows that are often private and financially sensitive. The 5G networks, which can create hyperlocalized services, have highlighted many of the deficiencies of current practices in use today to cre...
Preprint
Full-text available
Unlike traditional central training, federated learning (FL) improves the performance of the global model by sharing and aggregating local models rather than local data to protect the users' privacy. Although this training approach appears secure, some research has demonstrated that an attacker can still recover private data based on the shared gra...
Article
Trusted third parties (TTPs) are frequently used for serving as an authority to issue and verify transactions in applications. Although the TTP-based paradigm provides customers with convenience, it causes a whole set of inevitable problems such as security threats, privacy vulnerabilities, and censorship. The TTP-based paradigm is not suitable for...
Article
Byzantine Fault Tolerant (BFT) state machine replication protocols are used to achieve agreement among replicated servers with arbitrary faults. Most existing BFT protocols perform well in fault-free cases, but usually suffer from serious performance degradation when faults occur. In this paper, we present DBFT, a BFT protocol that realizes gracefu...
Article
In this paper, we propose dual traceable distributed attribute based encryption with subset keyword search system (DT-DABE-SKS, abbreviated as DT) to simultaneously realize data source trace (secure provenance) and user trace (traitor trace) and flexible subset keyword search from polynomial interpolation. Leveraging non-interactive zero-knowledge...
Article
A redactable consortium blockchain (RCB) can build a trust layer for industrial internet of things (IIoT) so as to enable IIoT to resist certain powerful attacks resulting in improper block content. The redactability is particularly important for blockchains applied in IIoT with valuable or sensitive activities such as financial IoT or energy-tradi...
Article
Peak mitigation is of interest to power companies as peak periods may require the operator to over provision supply in order to meet the peak demand. Flattening the usage curve can result in cost savings, both for the power companies and the end users. Integration of renewable energy into the energy infrastructure presents an opportunity to use exc...
Article
Full-text available
Renewable energy microgeneration is rising leading to creation of prosumer communities making it possible to extract value from surplus energy and usage flexibility. Such a peer-to-peer energy trading community requires a decentralized, immutable and access-controlled transaction system for tokenized energy assets. In this study we present a unifie...
Preprint
Full-text available
We have entered the era of big data, and it is considered to be the "fuel" for the flourishing of artificial intelligence applications. The enactment of the EU General Data Protection Regulation (GDPR) raises concerns about individuals' privacy in big data. Federated learning (FL) emerges as a functional solution that can help build high-performanc...
Article
Full-text available
This paper addresses the estimation of household communities’ overall energy usage and solar energy production, considering different prediction horizons. Forecasting the electricity demand and energy generation of communities can help enrich the information available to energy grid operators to better plan their short-term supply. Moreover, househ...
Article
Traditional searchable encryption schemes based on the Term Frequency-Inverse Document Frequency (TF-IDF) model adopt the presence of keywords to measure the relevance of documents to queries, which ignores the latent semantic meanings that are concealed in the context. Latent Dirichlet Allocation (LDA) topic model can be utilized for modeling the...
Conference Paper
Full-text available
TOTEM: Token for controlled computation is a newly proposed framework that integrates blockchain with big data systems. This framework allows users to send the computational code towards the data and analyse instead of the conventional method of data analysis which required data to be sent across the network. The framework provides a TOTEM defined...
Article
Full-text available
Cloud Computing provides on-demand computing services like software, networking, storage, analytics, and intelligence over the Internet (“the cloud”). But it is facing challenges because of the explosion of the Internet of Things (IoT) devices and the volume, variety, veracity and velocity of the data generated by these devices. There is a need for...
Article
Full-text available
Cloud-based software services necessitate adaptive resource allocation with the promise of dynamic resource adjustment for guaranteeing the Quality-of-Service (QoS) and reducing resource costs. However, it is challenging to achieve adaptive resource allocation for software services in complex cloud environments with dynamic workloads. To address th...
Chapter
Large scale technological, economical and environmental changes led to increased energy consumption all over the world. Electrical energy became an indispensable daily factor due to the large automation and emergence of smart devices and equipments. Therefore, efficient resource management is a major goal of the energy market. In order to adapt ele...
Chapter
Decision-making in the energy field, especially in recent years, is highly data-driven. The crucial information extracted from historical data tells a lot about future behaviour and expected events. The extraction of this information is traditionally performed by statistical analysis and predicting future trends. However, in recent years, the amoun...
Chapter
With the maturation of technologies such as communication, sensors and networks, very large amounts of data are generated that are available for processing and analysis. With the popularizing process of the Internet of Things (IoT), available data resources will become even more plentiful and diversified in the near future. To provide feasible solu...
Article
In this paper, we propose a privacy-preserving medical treatment system using nondeterministic finite automata (NFA), hereafter referred to as P-Med, designed for remote medical environment. P-Med makes use of the nondeterministic transition characteristic of NFA to flexibly represent medical model, which includes illness states, treatment methods...
Article
As bitcoin has drawn a lot of attention, people have developed various cryptocurrencies based on blockchain framework. The decentralization feature of blockchain makes the transaction information public in the cryptocurrency. It is possible to expose the user’s privacy. Therefore, it is necessary to design an efficient and secure scheme to hide tra...
Preprint
In this paper, we propose a privacy-preserving medical treatment system using nondeterministic finite automata (NFA), hereafter referred to as P-Med, designed for the remote medical environment. P-Med makes use of the nondeterministic transition characteristic of NFA to flexibly represent the medical model, which includes illness states, treatment...
Article
Internet of Things (IoT) has become a critical infrastructure in the smart city services. Unlike traditional network nodes, most of the current IoT devices are constrained with limited capabilities. Moreover, frequent changes in network status (e.g., nodes turns into sleep mode to save battery) make it even more difficult to set up a stable, secure...
Article
With time-varying workloads and service requests, cloud-based software services necessitate adaptive resource allocation for guaranteeing Quality-of-Service (QoS) and reducing resource costs. However, due to the ever-changing system states, resource allocation for cloud-based software services faces huge challenges in dynamics and complexity. The t...
Article
Full-text available
Short-term load forecasting ensures the efficient operation of power systems besides affording continuous power supply for energy consumers. Smart meters that are capable of providing detailed information on buildings energy consumption, open several doors of opportunity to short-term load forecasting at the individual building level. In the curren...
Article
Full-text available
Cities are becoming smarter by incorporating hardware technology, software systems, and network infrastructure that provide Information Technology (IT) systems with real-time awareness of the real world. What makes a “smart city” functional is the combined use of advanced infrastructure technologies to deliver its core services to the public in a r...
Article
Blockchain, as an emerging decentralized architecture and distributed computing paradigm underlying Bitcoin and other cryptocurrencies, has attracted intensive attention in both research and applications recently. Blockchain, especially powered by chain-coded smart contracts, has the full potential of revolutionizing increasingly centralized cyber-...
Article
Full-text available
The emerging multi-cloud environments (MCEs) empower the execution of large-scale scientific workflows (SWs) with sufficient resource provisioning. However, due to complex task dependencies in SWs and various cost-performance of cloud resources, the SW scheduling in MCEs faces huge challenges. To address these challenges, we propose an Online Workf...
Article
Full-text available
Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing smart cities, which have been suggested as the solution to complicated future urbanization difficulties in coming years. Co...
Article
Full-text available
Data analytics is rapidly growing field in both academia and industry dealing with processing and interpreting large and complex data sets. It has got already many successful applications via advancing Machine (ML) and Deep (DL) Learning techniques, starting to evolve in the upstream petroleum industry as well. The industry operates now with huge a...
Article
As an innovated and revolutionized technology, blockchain has been applied in many fields, such as cryptocurrency, food traceability, identity management, or even market prediction. To discover its great potential, both the industry and academia have paid great attention to it and numerous researches have been conducted. Based on the literatures an...
Article
Internet of Things (IoT), coming with billions of connected devices, could potentially transform our daily life but could also create a serious security headache. It brings greater complications in securely accessing these devices with privacy protection guaranteed, and several research issues need to be investigated in detail, e.g., access control...
Conference Paper
Full-text available
Current proof-of-work blockchains are not sustainable in terms of energy needed to run them. In this paper we propose a new scheme that avoids wasted proof-of-work by a dynamic probabilistic method, where the consensus algorithm can be adjusted according to the parties' required assurance levels.
Article
Full-text available
The progress of technology on energy and IoT fields has led to an increasingly complicated electric environment in low-voltage local microgrid, along with the extensions of electric vehicle, micro-generation, and local storage. It is required to establish a home energy management system (HEMS) to efficiently integrate and manage household energy mi...
Book
This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services. The majority of the book is devoted to the security aspects of cloud computing and Big Data. Cloud computing, which can be seen as any subsc...
Article
To meet the driving requirements of electro-hydraulic servo valves and solve the restriction between the size and the output displacement of the GMA, a bow-type structure was designed to amplify its output displacement. Through theoretical mechanics, material mechanics theory, the Lagrange's dynamical equation and the finite element simulation meth...
Article
Full-text available
Machine learning techniques are widely used for network intrusion detection (NID). However, it has to face the unbalance of training samples between classes as it is hard to collect samples of some intrusion classes. This would produce false positives for these intrusion classes. Meanwhile, since there are various types of intrusions, classificatio...
Article
A compact giant magnetostrictive actuator with bow-type amplifier structure was designed to meet the driving needs of large-flow electro-hydraulic servo valve. Based on mechanics and vibration theory, the static and dynamic models of this structure were established. The influence of the dimensional parameters towards its static and dynamic performa...
Article
Considering the openness and cross-domains of cloud computing, the traditional privacy- preserving technology can not be applied in cloud computing efficiently. In this paper, inspired by the accountability idea, we proposed an accountable privacy-preserving mechanism based on Identity-Based Encryption (IBE) for cloud computing, which focuses on co...
Article
Time flies fast, it has been already one year since I was appointed as the Editor-in-Chief of this great publication, and thanks to the strong support and dedication of our associate editors, editorial staff, anonymous reviewers, and authors, we have made solid progress and I really enjoy my work and our achievement so far. At this point, significa...