Implementing a Multi-Way Distributed Blockchain Security System Using the RPBB-24-4 Algorithm

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 8
Year of Publication : 2024
Authors : Md. Jaffar Sadiq, Abdul Ahad, Syed Mazharuddin, Mohd. Sirajuddin, Sayyada Hajera Begum
pdf
How to Cite?

Md. Jaffar Sadiq, Abdul Ahad, Syed Mazharuddin, Mohd. Sirajuddin, Sayyada Hajera Begum, "Implementing a Multi-Way Distributed Blockchain Security System Using the RPBB-24-4 Algorithm," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 8, pp. 1-10, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I8P101

Abstract:

There are a lot of technologies that are becoming more prominent in the world that we live in today, and one of these technologies is the Blockchain. The technology in question offers an exceptionally high level of protection, and it is also quite robust. Users are not privy to a great deal of information about Blockchain; nonetheless, the functionality of its security is used to safeguard the data that is sent in a number of different ways. After that, this specific user went on to make use of the "ChaCha" and RBJ25 algorithms, both of which are considered to be versions that are both compact and secure. The new security mechanism that we have decided to refer to as RPBB24-4 will be presented to the reader within the confines of this article. The RPBB-24-4 method is made up of two parts: encryption and decoding. The encryption process is made up of four steps. The first step in the process is to use the square root of the secret prime key in the matrix. The second step in the process is to use the "lattin letter" and multiply the value by four using Equation (1). In the third step, protected data is used to change the cell numbers, but the process fourth step in the process is to use the "SalSa" method in the grid. Finally, the plain text is changed into protected text. Instead of working in the same way as the encryption process, the decryption method operates in the opposite direction. There is a greater degree of security offered by the strategy that has been presented in comparison to the one that is presently being used.

Keywords:

Decryption, Encryption, Performance, RBJ25, RPBB-24-4, Salsa.

References:

[1] Saurabh Singh, A.S.M. Sanwar Hosen, and Byungun Yoon, “Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network,” IEEE Access, vol. 9, pp. 13938 - 13959, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Muhammad Nasir Mumtaz Bhutta et al., “A Survey on Blockchain Technology: Evolution, Architecture and Security,” IEEE Access, vol. 9, pp. 61048-61073, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mubashar Iqbal, and Raimundas Matulevičius, “Exploring Sybil and Double-Spending Risks in Blockchain Systems,” IEEE Access, vol. 9, pp. 76153-76177, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Shailendra Rathore, Jong Hyuk Park, and Hangbae Chang, “Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT,” IEEE Access, vol. 9, pp. 90075-90083, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Ranwa Al Mallah, David Lopez, and Bilal Farooq, “Cyber-Security Risk Assessment Framework for Blockchains in Smart Mobility,” IEEE Open Journal of Intelligent Transportation Systems, vol. 2, pp. 294-311, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Elham A. Shammar, Ammar T. Zahary, and Asma A. Al-Shargabi, “A Survey of IoT and Blockchain Integration: Security Perspective,” IEEE Access, vol. 9, pp. 156114-156150, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Junyu Ren et al., “Task Offloading Strategy with Emergency Handling and Blockchain Security in SDN-Empowered and Fog-Assisted Healthcare IoT,” Tsinghua Science and Technology, vol. 27, no. 4, pp. 760-776, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Antonio J. Cabrera-Gutierrez et al., “Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks,” IEEE Access, vol. 10, pp. 114331-114345, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Yunyeong Goh et al., “Secure Trust-Based Delegated Consensus for Blockchain Frameworks Using Deep Reinforcement Learning,” IEEE Access, vol. 10, pp. 118498-118511, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] P. Muralidhara Rao et al., “Blockchain Integration for IoT-Enabled V2X Communications: A Comprehensive Survey, Security Issues and Challenges,” IEEE Access, vol. 11, pp. 54476-54494, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Garima Thakur et al., “An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment,” IEEE Access, vol. 11, pp. 26877-26892, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Leonardo Da Costa et al., “Sec-Health: A Blockchain-Based Protocol for Securing Health Records,” IEEE Access, vol. 11, pp. 16605- 16620, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Md. Riyazuddin, and V.V.S.S.S. Balaram, “Diversity Scale by Supervised Learning for Privacy Preserved and Informative Data Publishing,” Parishod Journal, vol. 9, no. 2, pp. 872-886, 2020.
[Google Scholar] [Publisher Link]
[14] S. Rajaprakash et al., “RBJ25 Cryptography Algorithm For Securing Big Data,” Journal of Physics: Conference Series, vol. 1706, pp. 1-8, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] C. Bagath Basha et al., “The Design of Security Algorithm RPBB-24-1 in Multi-Way Path over the Distributed Ledger,” SSRG International Journal of Electrical and Electronics Engineering, vol. 11, no. 4, pp. 36-44, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Bagath Basha Chan Batcha et al., “A Novel Security Algorithm RPBB31 for Securing the Social Media Analyzed Data Using Machine Learning Algorithms,” Wireless Personal Communications, vol. 131, pp. 581-608, 2023.
[CrossRef] [Google Scholar] [Publisher Link]