Sekar, Suganthi and Sree Kala, T (2025) Privacy Preserved Data Sharing With SpinalNet Based Key Generation in Consortium Blockchain. Web Intelligence, 23 (3). pp. 395-415. ISSN 2405-6456
![[thumbnail of sekar-sree-kala-2025-privacy-preserved-data-sharing-with-spinalnet-based-key-generation-in-consortium-blockchain.pdf]](https://ir.vistas.ac.in/style/images/fileicons/text.png)
sekar-sree-kala-2025-privacy-preserved-data-sharing-with-spinalnet-based-key-generation-in-consortium-blockchain.pdf
Download (3MB)
Abstract
Privacy Preserved Data Sharing With SpinalNet Based Key Generation in Consortium Blockchain Suganthi Sekar Department of Computer Science, Sree Muthukumaraswamy College, Chennai, India T Sree Kala Department of Computer Science, Vels Institute of Science, Technology & Advanced Studies, Chennai, India
Electronic government (e-government) is the application of communication and information technologies aimed at improving the efficiency of public services provided to citizens and organizations. The e-government is a most complicated system that requires to be distributed, protected as well as privacy-preserved and malfunction of these systems is expensive both socially and economically. Therefore, blockchain technology facilitates the execution of high protected as well as privacy-preserving approaches wherein transactions are not underneath a third party control managements. Utilizing blockchain technology, current data and fresh data are saved in the sealed compartment of blocks that is distributed across a network in demonstrable manner. The information privacy and security are improved by blockchain technology, wherein data are distributed and encrypted across whole network. Here, SpinalNet_KeyGen is newly presented for privacy-preserved data sharing (PPDS) in e-governance system. The entities considered in this research are citizen, private agency, government agency (GA) and support GA. Initialization, delegates and witness voting, key generation wherein secret key is generated using SpinalNet, new node creation, user registration, data encryption and protection, authentication, decryption, validation and data sharing are the steps followed in this work. The devised scheme follows three groups of communication. Moreover, SpinalNet_KeyGen achieved minimal values of computational time and memory usage about 37.526 s and 37.9 MB. However, it is difficult to consider all security parameters in the proposed method.
04 21 2025 08 2025 395 415 10.1177/24056456251325288 2 10.1177/sage-journals-update-policy journals.sagepub.com true https://journals.sagepub.com/page/policies/text-and-data-mining-license 10.1177/24056456251325288 https://journals.sagepub.com/doi/10.1177/24056456251325288 https://sage.cnpereading.com/paragraph/article/?doi=10.1177%2F24056456251325288 https://journals.sagepub.com/doi/pdf/10.1177/24056456251325288 https://journals.sagepub.com/doi/pdf/10.1177/24056456251325288 https://journals.sagepub.com/doi/full-xml/10.1177/24056456251325288 EasyChair Preprint Assiri H. 1 4252 2020 Secure e-governance using blockchain Assiri H., Nanda P., Mohanty M. (2020). Secure e-governance using blockchain. EasyChair Preprint, 4252, 1–7. https://cognizium.io/uploads/resources/NA%20-%20Securing%20e-Governance%20Using%20Blockchain%20-%202017%20-%20Sep%20-%20Paper.pdf E-Service Journal: A Journal of Electronic Services in the Public and Private Sectors Bannister F. 3 8 2 2012 10.2979/eservicej.8.2.3 Defining e-governance Bannister F., Connolly R. (2012). Defining e-governance. E-Service Journal: A Journal of Electronic Services in the Public and Private Sectors, 8(2), 3–25. https://doi.org/10.2979/eservicej.8.2.3 10.1109/TVT.2021.3083477 Blockchain/ABE-based fusion solution for E-government data sharing and privacy protectionProceedings of the 2020 4th International Conference on Electronic Information Technology and Computer Engineering Chen T. 258 2020 Chen T., Yu Y., Duan Z., Gao J., Lan K. (2020). Blockchain/ABE-based fusion solution for E-government data sharing and privacy protection. In Proceedings of the 2020 4th International Conference on Electronic Information Technology and Computer Engineering, pp. 258–264. 10.1109/TVT.2020.2973705 10.1109/TAI.2022.3185179 10.1109/MCOM.2017.1700879 Differential privacyAutomata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006, Proceedings, Part II 33 Dwork C. 1 2006 Dwork C. (2006). Differential privacy. In Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006, Proceedings, Part II 33, (pp. 1–12). Berlin, Heidelberg: Springer 10.1007/11681878_14 Wireless Networks Elisa N. 1 29 2018 A framework of blockchain-based secure and privacy-preserving E-government system Elisa N., Yang L., Chao F., Cao Y. (2018). A framework of blockchain-based secure and privacy-preserving E-government system. Wireless Networks, 29, 1–11. https://doi.org/10.1007/s11276-018-1883-0 10.1109/MCOM.2012.6194398 10.1109/TKDE.2023.3341149 10.17762/pae.v58i1.2119 10.1109/TII.2022.3188963 10.1016/j.comnet.2022.109011 10.18517/ijaseit.8.4-2.6838 10.1109/TPDS.2012.86 10.1109/Blockchain55522.2022.00030 Journal of Networking and Communication Systems Mandala J. 10 2 2 2019 HDAPSO: Enhanced privacy preservation for health care data Mandala J., Chandra Sekhara Rao M. V. P. (2019). HDAPSO: Enhanced privacy preservation for health care data. Journal of Networking and Communication Systems, 2(2), 10–19. https://doi.org/10.46253/jnacs.v2i2.a2 A brief survey of cryptocurrency systemsProceedings of 2016 14th annual conference on privacy, security and trust (PST) Mukhopadhyay U. 745 2016 Mukhopadhyay U., Skjellum A., Hambolu O., Oakley J., Yu L., Brooks R. (2016). A brief survey of cryptocurrency systems. In Proceedings of 2016 14th annual conference on privacy, security and trust (PST), pp. 745–752. Decentralized Business Review Nakamoto S. 21260 2008 Bitcoin: A peer-to-peer electronic cash system Nakamoto S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260. https://bitcoin.org/bitcoin.pdf 10.1587/transinf.2019EDP7163 10.1007/s11761-021-00315-3 10.1007/s11277-020-07907-w 10.1109/TDSC.2017.2698472 Journal of Networking and Communication Systems Shailaja G. K. 33 2 4 2019 Impact of opposition intensity on improved cuckoo search algorithm for privacy preservation of data Shailaja G. K., Guru Rao C. V. (2019). Impact of opposition intensity on improved cuckoo search algorithm for privacy preservation of data. Journal of Networking and Communication Systems, 2(4), 33–41. https://doi.org/10.46253/jnacs.v2i4.a4 10.1016/j.future.2018.10.049 SpringerPlus Shyamala Susan V. 1 5 1 2016 Anatomisation with slicing: A new privacy preservation approach for multiple sensitive attributes Shyamala Susan V., Christopher T. (2016). Anatomisation with slicing: A new privacy preservation approach for multiple sensitive attributes. SpringerPlus, 5(1), 1–21. https://doi.org/10.1186/s40064-015-1659-2. International Journal of Computer Science and Network Security Srinivas D. B. 191 22 7 2022 Anonymized network monitoring for intrusion detection systems Srinivas D. B., Mohan S. (2022). Anonymized network monitoring for intrusion detection systems. International Journal of Computer Science and Network Security, 22(7), 191–198. https://doi.org/10.22937/IJCSNS.2022.22.7.23 10.1142/S0218488502001648 10.1007/s11276-023-03588-y 10.1016/j.ins.2019.07.031 10.1016/j.dcan.2022.10.005 BlockSLAP: Blockchain-based secure and lightweight authentication protocol for smart gridThe proceeding of IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) Wang W. 2021 Wang W., Huang H., Zhang L., Han Z., Qiu C., Su C. (2021). BlockSLAP: Blockchain-based secure and lightweight authentication protocol for smart grid. The proceeding of IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China. 10.1109/ACCESS.2019.2943153 IEEE Transactions on Vehicular Technology Yang Y. 1 2023 Stochastic geometry-based age of information performance analysis for privacy preservation-oriented Mobile crowdsensing Yang Y., Yang Y., Guo D., Wang W., Nie J., Xiong Z., Xu R., Zhou X. (2023). Stochastic geometry-based age of information performance analysis for privacy preservation-oriented Mobile crowdsensing. IEEE Transactions on Vehicular Technology, 1–14. https://doi.org/10.1109/TVT.2023.3252167 Transactions on Emerging Telecommunications Technologies Zhang L. 110 32 5 2021 Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing Zhang L., Peng M., Wang W., Jin Z., Su Y., Chen H. (2021). Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing. Transactions on Emerging Telecommunications Technologies, 32(5), 110–116. https://doi.org/10.1002/ett.4315
Item Type: | Article |
---|---|
Subjects: | Information Technology > Data Structure |
Domains: | Computer Science |
Depositing User: | Mr IR Admin |
Date Deposited: | 14 Aug 2025 09:43 |
Last Modified: | 14 Aug 2025 09:43 |
URI: | https://ir.vistas.ac.in/id/eprint/9968 |