Secured Resource Allocation for Authorized Users Using Time Specific Blockchain Methodology
-
Published:2021-04-30
Issue:2
Volume:11
Page:201-205
-
ISSN:2041-9031
-
Container-title:International Journal of Safety and Security Engineering
-
language:
-
Short-container-title:IJSSE
Author:
Narayana Vejendla Lakshman,Midhunchakkaravarthy Divya
Abstract
The utilization of energy in blockchain division is high as resource allocation models are using this technology and the rundown of resource utilization cases is continually developing. The communicated and permanent nature of blockchain innovation might be utilized to quicken the progressing change to increasingly decentralized and digitalized vitality frameworks and to address a portion of the difficulties the business is confronting in providing security in identification of authorized users and resource allocation transactions among the authorized users. The allocated resources to the users need to be recorded, otherwise the attackers may use them for malicious operations. In any case, blockchain is a developing innovation and it is viewed as a basic vulnerability by numerous users as the difficulties and chances of execution are still to a great extent. There is in this way an absence of information and shortage of dynamic gadgets for getting why, when and how the innovation can include significant worth. The proposed Resource Allocation for Authorized Users using Time specific Blockchain Methodology (RAAUTBM) performs resource allocation to authorized users to avoid malicious actions among blockchain-based use cases and increase practical information about how blockchain could be actualized. The RAAUTBM model verifies all the users for allotting access to the system. The proposed model allots the resources only to the authorized users and to identify the malicious users and remove them from the framework. The resources once allotted to a user remains for a time interval and then the resource is re-allotted to other authorized users for avoiding delay. Resource exchanges in this segment are known to be dull and wasteful, to a limited extent because of the absence of promoted straightforwardness. This research work centers around the advancement of a blockchain application that can improve the resource exchange procedure among authorized users. The proposed model is compared with the traditional methods and the results demonstrate that the proposed model is effective in allocating resources only to the authorized users.
Publisher
International Information and Engineering Technology Association
Subject
General Environmental Science,Safety, Risk, Reliability and Quality
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fake News Spotting using Interrelated Feature Selection Model using Logistic Regression;2023 IEEE 12th International Conference on Communication Systems and Network Technologies (CSNT);2023-04-08
2. Crop Yield Forecast Using Machine Learning;2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS);2023-03-17
3. Student Academic Performance Enhancement Model Using Web Based Learning Methodology;2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS);2023-03-17
4. Glaucoma Detection using Convolution Neural Networks;2023 7th International Conference on Computing Methodologies and Communication (ICCMC);2023-02-23
5. Video Frame based Prompt Compression Model with Steganography for Secure Data Transmission;2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS);2023-02-02