Vijayalakshmi, V. and Sharmila, K. (2023) Secure Data Transactions based on Hash Coded Starvation Blockchain Security using Padded Ring Signature-ECC for Network of Things. International Journal on Recent and Innovation Trends in Computing and Communication, 11 (1). pp. 53-61. ISSN 2321-8169
![[thumbnail of Secure Data Transactions based on Hash Coded Starvation Blockchain Security using Padded Ring Signature-ECC for Network of Things _ International Journal on Recent and Innovation Trends in Computing and Communication.pdf]](https://ir.vistas.ac.in/style/images/fileicons/archive.png)
Secure Data Transactions based on Hash Coded Starvation Blockchain Security using Padded Ring Signature-ECC for Network of Things _ International Journal on Recent and Innovation Trends in Computing and Communication.pdf
Download (945kB)
Abstract
Secure Data Transactions based on Hash Coded Starvation Blockchain Security using Padded Ring Signature-ECC for Network of Things V. Vijayalakshmi K. Sharmila
Blockchain is one of the decentralized processes in a worldview that works with parallel and distributed ledger technology, the application process, and service-oriented design. To propose a Secure data Transaction based on Hash coded Starvation Blockchain security using Padded Ring signature-ECC for Network of Things. Initially, the crypto policy is authenticated based on the user-owner shared resource policy and access rights. This creates a Public blockchain environment with a P2P Blockchain network. The owner encrypts the data using optimized ECC through Hash-coded Starvation Blockchain security (HCSBS). This makes the encrypted block's provable partition chain Link (P2CL). The encrypted blocks are transmitted into the network of nodes monitored by NoT. During the data transmission, the Network of Things monitors the transaction flow to verify the authenticity over the network of nodes. The monitored data be securely stored in transaction Block storage with the hash-indexed block with chain ring policy (HICLP). This creates controller node aggregation over the transaction environment to securely transfer the data to the peer end. The User gets the access Key to decrypt the data with policy aggregated shared resource policy to access the data. The proposed system produces high security as well compared to the previous design.
Item Type: | Article |
---|---|
Subjects: | Computer Science > Computer Networks |
Divisions: | Computer Science |
Depositing User: | Mr IR Admin |
Date Deposited: | 24 Sep 2024 05:09 |
Last Modified: | 24 Sep 2024 05:09 |
URI: | https://ir.vistas.ac.in/id/eprint/6973 |