Cybersecurity in Blockchain by Secure Identity Management using Long Short Term Memory (LSTM)
International Journal of Electrical and Electronics Engineering |
© 2023 by SSRG - IJEEE Journal |
Volume 10 Issue 4 |
Year of Publication : 2023 |
Authors : D. Nancy Kirupanithi, A. Antonidoss, G. Subathra, R. Surendiran |
How to Cite?
D. Nancy Kirupanithi, A. Antonidoss, G. Subathra, R. Surendiran, "Cybersecurity in Blockchain by Secure Identity Management using Long Short Term Memory (LSTM)," SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 4, pp. 152-163, 2023. Crossref, https://doi.org/10.14445/23488379/IJEEE-V10I4P115
Abstract:
One of the major technologies in delivering infrastructure and data service requirements at low cost and with minimal effort is Cloud Computing (CC), which has been implemented in several aspects of the IT industry. Since the rapid growth of CC has been observed, there is still an information security concern that intruders completely attack. With the potential of being practised in various utilizations, blockchain can be implemented in several cloud service providers. Blockchain platform has basically performed a large computation quantity which doesn’t accomplish the practical purpose of building Proof of Work (PoW) with context awareness accord from decentralized participants. Long Short-Term Memory (LSTM)has been designed particularly for overcoming the long-term dependency issues faced by Recurrent Neural Networks (RNN). This paper focuses on a novel consensus mechanism by LSTM which consists of feedback connections in making a difference with several conventional feed-forward Neural Networks. The research directed computation spent to consensus towards RNN optimization for better cyber security in blockchain implemented in the cloud platform. However, the enormous amount of data involved in the blockchain has been trained through the LSTM model that supports serving learning proof through cell states which handle the network of current long-term memory. Therefore, Contextual Identity Management (CAIM) mechanism is adopted through the LSTM model in blockchain for various Cloud Service Provider(CSP) in unifying the contextual details with the process of identity management that generate the probable robust solution. This assists in creating better decisions with respect to policy, authentication, routing and authorization for recent interacted data. Moreover, the proposed LSTM model in blockchain has been compared with the existing cyber-secured model of blockchain to determine the efficiency of the cyber-secured model of blockchain in the cloud platform.
Keywords:
Blockchain, Contextual Identity Management (CAIM), Long Short Term Memory (LSTM), Cloud platform, Cloud Service Provider (CSP).
References:
[1] Jong-Hyouk Lee, “BiDaaS : Blockchain Based ID As a Service,” IEEE Access, vol. 6, pp. 2274–2278, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Nicolas Buchmann et al., “Enhancing Breeder Document Long-Term Security Using Blockchain Technology,”
[CrossRef] [Google Scholar] [Publisher Link]
[3] E. Sweetline Priya, R. Priya, and R. Surendiran, "Implementation of Trust-Based Blood Donation and Transfusion System Using Blockchain Technology," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 104-117, 2022.
[CrossRef] [Publisher Link]
[4] Dr. I.Lakshmi, "A Study on the Internet of Things and Cyber Security with Intruders and Attacks," International Journal of P2P Network Trends and Technology, vol. 9, no. 3, pp. 4-13, 2019.
[Publisher Link]
[5] Benjamin Leiding, and Alex Norta, “Mapping Requirements Specifications Into a Formalized Blockchain-Enabled Authentication Protocol for Secured Personal Identity Assurance,” Future Data and Security Engineering, pp. 181-196, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Hasnae L'Amrani et al., “Identity Management Systems: Laws of Identity for Models0 Evaluation,” In Proceedings of the 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), Tangier, Morocco, pp. 736-740, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Yang Liu et al., “Blockchain-Based Identity Management Systems: A Review,” Journal of Network and Computer Applications, vol. 166, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] A. Shobanadevi et al., “Novel Identity Management System Using Smart Blockchain Technology,” International Journal of System Assurance Engineering and Management, vol. 13, pp. 496–505, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] M.Sharada Varalakshmi, "A Case Study of Criticality Based Access Control in a Cyber Physical System,” International Journal of P2P Network Trends and Technology, vol. 7, no. 5, pp. 41-43, 2017.
[Publisher Link]
[10] Mauro Conti et al., “A Survey on Security and Privacy Issues of Bitcoin,” IEEE Communications Surveys & Tutorials vol. 20, no. 4, pp. 3416–3452, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Kamal Benzekki et al., “A Context-Aware Authentication System for Mobile Cloud Computing.” Procedia Computer Science, vol. 127, pp. 379-387, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Sagheer Abbas et al., “Modeling, Simulation and Optimization of Power Plant Energy Sustainability for Iot Enabled Smart Cities Empowered with Deep Extreme Learning Machine,” IEEE Access, vol. 8, pp. 39982–97, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Chibuike Ndubuisi Nwoke et al., "Determinants of Cybercrime Awareness Among Internet Users In Nigeria," SSRG International Journal of Humanities and Social Science, vol. 8, no. 5, pp. 14-22, 2021.
[CrossRef] [Publisher Link]
[14] Dr.S.Kannan, and Mr.T.Pushparaj, "Creation of Testbed Security Using Cyber-Attacks," SSRG International Journal of Computer Science and Engineering, vol. 4, no. 11, pp. 4-14, 2017.
[CrossRef] [Publisher Link]
[15] Bhabendu Kumar Mohanta et al., “Blockchain Technology: A Survey on Applications and Security Privacy Challenges,” Internet of Things, vol. 8, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Andreas Grüner, Alexander Mühle, and Christoph Meinel, “ATIB: Design and Evaluation of an Architecture for Brokered Self-Sovereign Identity Integration and Trust-Enhancing Attribute Aggregation for Service Provider,” IEEE Access, vol. 9, pp. 138553–138570, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Sreedharan, S., and Rakesh, N, “Securitization of Smart Home Network Using Dynamic Authentication,” International Conference on Computer Networks and Communication Technologies, pp. 287–293, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Neha Priya, "Cybersecurity Considerations for Industrial IoT in Critical Infrastructure Sector," International Journal of Computer and Organization Trends, vol. 12, no. 1, pp. 27-36, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Evans Mwasiaji, and Kenneth Iloka, "Cyber Security Concerns and Competitiveness for Selected Medium Scale Manufacturing Enterprises in the Context of Covid-19 Pandemic in Kenya," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 8, pp. 1-7, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Seyed Mehdi Hazrati Fard , and Sattar Hashemi, “Sparse Representation Using Deep Learning to Classify Multi-Class Complex Data,” Iranian Journal of Science and Technology, Transactions of Electrical Engineering, vol. 43, pp. 637–647, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Abdelhakim Zeroual et al., “Deep Authentication Model In Mobile Cloud Computing,” In Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), pp. 1-4, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Mohammed Abuhamad, “Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors,” IEEE Internet Things Journal, vol. 7, no. 6, 5008–5020, 2020.
[CrossRef] [Publisher Link]
[23] Kun Xia, Jianguang Huang, and Hanyu Wang, “LSTM-CNN Architecture for Human Activity Recognition,” IEEE Access, vol. 8, pp. 56855–56866, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Mohammed Amine Bouras et al., “A Lightweight Blockchain-Based Iot Identity Management Approach,” Future Internet, vol. 13, no. 2, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Vencelin Gino V, and Amit KR Ghosh, "Enhancing Cyber Security Measures for Online Learning Platforms," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 11, pp. 1-5, 2021.
[CrossRef] [Publisher Link]
[26] Lukas Stockburger et al., “Blockchain-Enabled Decentralized Identity Management: the Case of Self-Sovereign Identity in Public Transportation,” Blockchain: Research and Applications, vol. 2, no. 2, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Preetha S, Sagar J, and Krishna Pooja P, "Security Issues Faced by Internet of Things: A Survey," International Journal of Recent Engineering Science, vol. 7, no. 3, pp. 1-6, 2020.
[CrossRef] [Publisher Link]
[28] Xinyin Xiang et al., “Permissioned Blockchain-Based Identity Management and User Authentication Scheme for E-Health Systems,” IEEE Access, vol. 8, pp. 171771–171783, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Shangping Wang, Ru Pei, and Yaling Zhang, “EIDM: A Ethereum-Based Cloud User Identity Management Protocol,” IEEE Access, vol. 7, pp. 115281– 115291, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Iván Gutiérrez-Agüero et al., “Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum,” IEEE Access, vol. 9, pp. 108912–108923, 2021.
[CrossRef] [Google Scholar] [Publisher Link]