Cargando…

Novel intelligent architecture and approximate solution for future networks

Private networks have become popular for secure data sharing and anonymous communication in many domains: enterprise environments, military, journalism, telecommunication, healthcare, to name a few. It has been used with or without internet connection. Its primary purpose is to provide confidentiali...

Descripción completa

Detalles Bibliográficos
Autores principales: Sarhan, Akram, Jemmali, Mahdi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9977064/
https://www.ncbi.nlm.nih.gov/pubmed/36857320
http://dx.doi.org/10.1371/journal.pone.0278183
_version_ 1784899214594015232
author Sarhan, Akram
Jemmali, Mahdi
author_facet Sarhan, Akram
Jemmali, Mahdi
author_sort Sarhan, Akram
collection PubMed
description Private networks have become popular for secure data sharing and anonymous communication in many domains: enterprise environments, military, journalism, telecommunication, healthcare, to name a few. It has been used with or without internet connection. Its primary purpose is to provide confidentiality, bypass unlawful activities, and protect against common threats such as interception, modification, and censorship. In addition, several private network technologies exist to support secure communications. However, they mostly rely on encryption only. The transmitted data is classified into different confidentiality levels. This research presents a smart private network architecture scheme that transmits constraint-based classified packets. The main directive of this work is the proposed constraint. This constraint is meant to enforce that if two packets belong to the same confidentiality level, they can’t be transmitted through the two routers simultaneously. Therefore, the studied problem is an NP-hard problem. This paper presents the following contributions: (i) proposes a new architecture paradigm for outsourcing a constraint-based multi-classified data sharing securely and transmitted through two routers; (ii) introduces several algorithms to prove the feasibility for this NP-Hard problem; and (iii) implements the algorithms solutions using C++ and compares their performance. Different metrics are used to measure the performance of the proposed algorithms. Randomized Longest Transmission time first algorithm [Image: see text] scored the best algorithm with a percentage of 73.5% and an average gap of 0.002 according to the experimental results. It is remarkable worthy to note that the execution time of all the algorithms is less than 0.001 s.
format Online
Article
Text
id pubmed-9977064
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-99770642023-03-02 Novel intelligent architecture and approximate solution for future networks Sarhan, Akram Jemmali, Mahdi PLoS One Research Article Private networks have become popular for secure data sharing and anonymous communication in many domains: enterprise environments, military, journalism, telecommunication, healthcare, to name a few. It has been used with or without internet connection. Its primary purpose is to provide confidentiality, bypass unlawful activities, and protect against common threats such as interception, modification, and censorship. In addition, several private network technologies exist to support secure communications. However, they mostly rely on encryption only. The transmitted data is classified into different confidentiality levels. This research presents a smart private network architecture scheme that transmits constraint-based classified packets. The main directive of this work is the proposed constraint. This constraint is meant to enforce that if two packets belong to the same confidentiality level, they can’t be transmitted through the two routers simultaneously. Therefore, the studied problem is an NP-hard problem. This paper presents the following contributions: (i) proposes a new architecture paradigm for outsourcing a constraint-based multi-classified data sharing securely and transmitted through two routers; (ii) introduces several algorithms to prove the feasibility for this NP-Hard problem; and (iii) implements the algorithms solutions using C++ and compares their performance. Different metrics are used to measure the performance of the proposed algorithms. Randomized Longest Transmission time first algorithm [Image: see text] scored the best algorithm with a percentage of 73.5% and an average gap of 0.002 according to the experimental results. It is remarkable worthy to note that the execution time of all the algorithms is less than 0.001 s. Public Library of Science 2023-03-01 /pmc/articles/PMC9977064/ /pubmed/36857320 http://dx.doi.org/10.1371/journal.pone.0278183 Text en © 2023 Sarhan, Jemmali https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Sarhan, Akram
Jemmali, Mahdi
Novel intelligent architecture and approximate solution for future networks
title Novel intelligent architecture and approximate solution for future networks
title_full Novel intelligent architecture and approximate solution for future networks
title_fullStr Novel intelligent architecture and approximate solution for future networks
title_full_unstemmed Novel intelligent architecture and approximate solution for future networks
title_short Novel intelligent architecture and approximate solution for future networks
title_sort novel intelligent architecture and approximate solution for future networks
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9977064/
https://www.ncbi.nlm.nih.gov/pubmed/36857320
http://dx.doi.org/10.1371/journal.pone.0278183
work_keys_str_mv AT sarhanakram novelintelligentarchitectureandapproximatesolutionforfuturenetworks
AT jemmalimahdi novelintelligentarchitectureandapproximatesolutionforfuturenetworks