Lakshmi, TS and Jayamangala, H (2025) MFSA: Migration flamingo search algorithm based trust aware multi-party data sharing in blockchain using hierarchical homomorphic encryption. Intelligent Decision Technologies, 19 (3). pp. 1380-1399. ISSN 1872-4981
Full text not available from this repository. (Request a copy)Abstract
MFSA: Migration flamingo search algorithm based trust aware multi-party data sharing in blockchain using hierarchical homomorphic encryption TS Lakshmi Department of Computer Science, Vels Institute of Science, Technology and Advanced Studies, Chennai, India H Jayamangala Department of Computer Applications-PG, Vels Institute of Science, Technology and Advanced Studies, Chennai, India
With the exponential growth of network technology, data sharing becomes more popular and various scholars have carried out comprehensive researches for promoting its development. Multi-party data sharing generally involves multiple participants to access and share data in a trustless environment. To gain the trust of users, it is significant to provide security guarantees that protect user's privacy and obstruct unauthorized access. Therefore, it is essential to guarantee the integrity, confidentiality and trustability of sensitive data and to overcome the risks associated with malicious attacks and unauthorized access. To bridge this gap, this research introduces Migration Flamingo Search Algorithm (MFSA) for multi-party data sharing in the blockchain using hierarchical homomorphic encryption. Initially, data owner (DO) submits a file to cloud through the smart contract (SC). Thereafter, encryption of data files is done employing Hierarchical Multipart Homomorphic Encryption (HMHE). Here, Hierarchical Squeeze Forward Fractional Net (HiSqFFNet) is employed to generate hierarchical key. HiSqFFNet is introduced by combining of Hierarchical Deep Learning Neural Network (HiDeNN) with SqueezeNet. After encryption, an encrypted data is stored in Interplanetary File Systems (IPFS). Then, access request is sent by a data requester (DR) for accessing an encrypted data. The trust manager evaluates trustability of DR and the process is accomplished using MFSA that is presented by incorporating Migration Algorithm (MA) with Flamingo Search Algorithm (FSA). If the trust is acceptable, data from IPFS is decrypted and then, file is delivered to DR. The proposed MFSA is assessed with different evaluation metrics and the evaluation is done using heart disease dataset. Additionally, MFSA has obtained minimal decryption time of 10.548sec, encryption time of 7.978sec, key complexity of 0.727, time complexity of 0.455sec for 100 kb data size with key size = 64.
02 28 2025 05 2025 1380 1399 10.1177/18724981251317969 2 10.1177/sage-journals-update-policy journals.sagepub.com true https://journals.sagepub.com/page/policies/text-and-data-mining-license 10.1177/18724981251317969 https://journals.sagepub.com/doi/10.1177/18724981251317969 https://sage.cnpereading.com/paragraph/article/?doi=10.1177%2F18724981251317969 https://journals.sagepub.com/doi/pdf/10.1177/18724981251317969 https://journals.sagepub.com/doi/pdf/10.1177/18724981251317969 https://journals.sagepub.com/doi/full-xml/10.1177/18724981251317969 10.3390/s21041540 10.3390/electronics12071691 10.1007/s10916-018-0997-3 10.3390/math12131956 10.1109/Trustcom/BigDataSE/ICESS.2017.283 Alexopoulos N Daubert J Mühlhäuser M et al. Beyond the hype: On using blockchains in trust management for authentication. In proceedings of 2017 IEEE Trustcom/BigDataSE/ICESS August 2017 pp.546–553. IEEE. 10.1109/ICCT.2018.8600051 Lv D Zhu S Xu H et al. A review of big data security and privacy protection technology. In proceedings of 2018 IEEE 18th International Conference on Communication Technology (ICCT) October 2018 pp.1082–1091. IEEE. Int J Inform Manag Data Insights Lomotey RK 100075 2 2022 Data trusts as a service: providing a platform for multi-party data sharing Lomotey RK, Kumi S, Deters R. Data trusts as a service: providing a platform for multi-party data sharing. Int J Inform Manag Data Insights 2022; 2: 100075. 10.3390/info13100481 Mob Inform Syst Wang Y 5510857 2021 Deep learning data privacy protection based on homomorphic encryption in AIoT Wang Y, Liang X, Hei X, et al. Deep learning data privacy protection based on homomorphic encryption in AIoT. Mob Inform Syst vol.2021; 2021: 5510857. Galteland YJ Wu S. Blockchain-based privacy-preserving fair data trading protocol. Cryptology ePrint Archive 2021. 10.1109/ACCESS.2019.2949782 10.18282/gfr.v6i1.3491 10.1142/S1752890924500235 10.1007/s00521-024-10270-7 10.1016/j.meaene.2024.100001 Asian J Econ Bank Jin B 1 2024 Wholesale price forecasts of green grams using the neural network Jin B, Xu X. Wholesale price forecasts of green grams using the neural network. Asian J Econ Bank 2024: 1–36. Comp Model Eng Sci Xu Z 861 136 2023 Multi-source data privacy protection method based on homomorphic encryption and blockchain Xu Z, Cao S. Multi-source data privacy protection method based on homomorphic encryption and blockchain. Comp Model Eng Sci 2023; 136: 861–881. 10.1016/j.jksuci.2024.101969 10.3390/math12121854 10.1155/2022/3406228 Zhu P Hu J Huang X et al. Bhep: blockchain-based hierarchical encryption privacy-preserving scheme for large-scale data. Available at SSRN 5041371. 10.3390/s23010014 10.55092/blockchain20240006 Xu P Liang J Luo Y et al. Blockchain-based privacy-preserving framework for multi-party data sharing in emerging IoT 2024. 10.1016/j.compmedimag.2022.102139 10.1109/ACCESS.2020.3034260 10.1016/j.bcra.2022.100102 Padron A Vargas G. Multiparty homomorphic encryption https://courses.csail.mit.edu/6.857/2016/files/17.pdf (2021). 10.1016/j.cma.2020.113452 10.1109/TII.2019.2907373 Adv Comp Eng Bhaladhare PR 396529 2014 2014 A clustering approach for the l-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm Bhaladhare PR, Jinwala DC. A clustering approach for the l-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm. Adv Comp Eng 2014; 2014: 396529. 10.1109/IC3.2019.8844935 Tandon A Srivastava P. Trust-based enhanced secure routing against rank and sybil attacks in IoT. In proceedings of 2019 twelfth international conference on contemporary computing (IC3) August 2019 pp.1–7. IEEE. 10.1109/TDSC.2011.57 10.3390/s17040703 Comp Model Eng Sci Trojovsky P 1 137 2023 Migration algorithm: a new human-based metaheuristic approach for solving optimization problems Trojovsky P, Dehghani M. Migration algorithm: a new human-based metaheuristic approach for solving optimization problems. Comp Model Eng Sci 2023; 137: 1–36. 10.1109/ACCESS.2021.3090512 Heart disease dataset is taken from https://archive.ics.uci.edu/ml/datasets/heart+Disease (accessed August 2024).
Item Type: | Article |
---|---|
Subjects: | Computer Science > Design and Analysis of Algorithm |
Domains: | Computer Science |
Depositing User: | Mr IR Admin |
Date Deposited: | 28 Aug 2025 05:35 |
Last Modified: | 28 Aug 2025 05:35 |
URI: | https://ir.vistas.ac.in/id/eprint/10628 |