Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet

Future Internet is an international, peer-reviewed, open access journal on internet technologies and the information society, published monthly online by MDPI.

Quartile Ranking JCR - Q2 (Computer Science, Information Systems)

All Articles (3,242)

Cloud storage continues to experience recurring provider-side breaches, raising concerns about the confidentiality and recoverability of user data. This study addresses this challenge by introducing an Artificial Intelligence (AI)-driven hybrid architecture for secure, reconstruction-resistant multi-cloud storage. The system applies telemetry-guided fragmentation, where fragment sizes are dynamically predicted from real-time bandwidth, latency, memory availability and disk I/O, eliminating the predictability of fixed-size fragmentation. All payloads are compressed, encrypted with AES-128 and dispersed across independent cloud providers, while two encrypted fragments are retained within a VeraCrypt-protected local vault to enforce a distributed trust threshold that prevents cloud-only reconstruction. Synthetic telemetry was first used to evaluate model feasibility and scalability, followed by hybrid telemetry integrating real Microsoft system traces and Cisco network metrics to validate generalization under realistic variability. Across all evaluations, XGBoost and Random Forest achieved the highest predictive accuracy, while Neural Network and Linear Regression models provided moderate performance. Security validation confirmed that partial-access and cloud-only attack scenarios cannot yield reconstruction without the local vault fragments and the encryption key. These findings demonstrate that telemetry-driven adaptive fragmentation enhances predictive reliability and establishes a resilient, zero-trust framework for secure multi-cloud storage.

27 January 2026

AI-driven hybrid storage architecture showing telemetry capture, encryption, adaptive fragmentation, local vault retention and distribution across independent cloud providers.

Deepfake detection in video data typically relies on mining deep embedded representations across multiple modalities to obtain discriminative fused features and thereby improve detection accuracy. However, existing approaches predominantly focus on how to exploit complementary information across modalities to ensure effective fusion, while often overlooking the impact of noise and interference present in the data. For instance, issues such as small objects, blurring, and occlusions in the visual modality can disrupt the semantic consistency of the fused features. To address this, we propose a Multimodality Semantic Consistency Fusion model for video forgery detection. The model introduces a semantic consistency gating mechanism to enhance the embedding of semantically aligned information across modalities, thereby improving the discriminability of the fused representations. Furthermore, we incorporate an event-level weakly supervised loss to strengthen the global semantic discrimination of the video data. Extensive experiments on standard video forgery detection benchmarks demonstrate the effectiveness of the proposed method, achieving superior performance in both forgery event detection and localization compared to state-of-the-art approaches.

23 January 2026

Examples of ambiguous semantic information in the single modality. The content within the red squares in all sub-images represents the forged parts.

This paper introduces a cybersecurity framework that combines a deception-based ransomware detection system, called the Intrusion and Ransomware Detection System for Cloud (IRDS4C), with a blockchain-enabled Cyber Threat Intelligence platform (CTIB). The framework aims to improve the detection, reporting, and sharing of ransomware threats in cloud environments. IRDS4C uses deception techniques such as honeypots, honeytokens, pretender network paths, and decoy applications to identify ransomware behavior within cloud systems. Tests on 53 Windows-based ransomware samples from seven families showed an ordinary detection time of about 12 s, often quicker than tralatitious methods like file hashing or entropy analysis. These detection results are currently limited to Windows-based ransomware environments, and do not yet cover Linux, containerized, or hypervisor-level ransomware. Detected threats are formatted using STIX/TAXII standards and firmly shared through CTIB. CTIB applies a hybrid blockchain consensus of Proof of Stake (PoS) and Proof of Work (PoW) to ensure data integrity and protection from tampering. Security analysis shows that an attacker would need to control over 71% of the network to compromise the system. CTIB also improves trust, accuracy, and participation in intelligence sharing, while smart contracts control access to erogenous data. In a local prototype deployment (Hardhat devnet + FastAPI/Uvicorn), CTIB achieved 74.93–125.92 CTI submissions/min, The number of attempts or requests in each test was 100 with median end-to-end latency 455.55–724.99 ms (p95: 577.68–1364.17 ms) across PoW difficulty profiles (difficulty_bits = 8–16).

21 January 2026

Ransomware detection techniques. The arrow labeled “What we Use” indicates the specific detection approach adopted in this work, namely the file system event handler watcher based on decoy resources [43].

Mobile crowdsensing (MCS) is an emerging paradigm that enables cost-effective, large-scale, and participatory data collection through mobile devices. However, the open nature of MCS raises significant privacy and trust challenges. Existing reputation models have made progress in assessing the quality of contributions, but they still struggle to manage prolonged inactivity, which can lead to outdated scores that no longer reflect current engagement. To address these issues, this paper presents RBCrowd, a dynamic reputation management system based on a dual blockchain architecture. It consists of the Sensing Chain (SC), a public blockchain recording sensing tasks and results, and the Reputation Chain (RC), a consortium blockchain managing user reputation scores. To guarantee privacy, the framework limits identity verification to the RC, ensuring that data on the SC is stored without direct links to the worker. We paired this privacy mechanism with a reputation model that rewards consistent, high-quality contributions. The system updates reputation scores by first validating the specific task and then adjusting for historical engagement, specifically penalizing prolonged inactivity. We evaluate RBCrowd through simulations in realistic MCS scenarios, and the results show that our framework provides more effective dynamic trust management than existing models. It also achieves increased reliability and fairness while managing prolonged inactivity through adaptive penalties.

21 January 2026

The RBCrowd architecture.

News & Conferences

Issues

Open for Submission

Editor's Choice

Reprints of Collections

IoT Security
Reprint

IoT Security

Threat Detection, Analysis and Defense
Editors: Olivier Markowitch, Jean-Michel Dricot
Virtual Reality and Metaverse
Reprint

Virtual Reality and Metaverse

Impact on the Digital Transformation of Society II
Editors: Diego Vergara

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903