Security Intelligence Enhanced by Blockchain Data Transitions and Effective Handover Authentication
-
Published:2024-04-05
Issue:
Volume:
Page:371-380
-
ISSN:2788-7669
-
Container-title:Journal of Machine and Computing
-
language:en
-
Short-container-title:JMC
Author:
V Vincent Arokiam Arul Raja1, C Senthamarai2
Affiliation:
1. Department of Computer Science, Government Arts College, Salem, Tamil Nadu, India. 2. Department of Computer Application, Government Arts College, Salem, Tamil Nadu, India.
Abstract
The most significant method is intrusion detection, which improves privacy concerns about client authentication and authorization. No matter what is done to enhance security intelligence, vulnerability has also increased in the modern era. The major role is to predict those vulnerabilities and improve security enhancements by using blockchain methods to enhance privacy concerns. In the corporation, banking, or healthcare system, the major issues are data spoofing, cyber security issues, and viruses affecting confidential data or breaking the shield of data protection. Enhance authorization and authentication by connecting the fog cloud and using the blockchain to protect privacy. In the transition of data, attackers may increase their attacks using various forms. Even if the data is transformed, attackers can easily access it and break the confidentiality of the entire massive database. FCBS (Fog Cloud Blockchain Server) will prevent data vulnerability by using FCS (Fog Cloud Server) modalities for data access. It consists of two segments, AuC (Authentication) and AuT (authorization) during the processing of data. BC (blockchain) addresses the data functionality and enhances the FCS security intelligence in two parts. By preventing the vulnerability earlier, no FC (Fog Cloud) data will be affected. To ensure data protection is reliable and accurate by handing over the AuC and AuT.
Publisher
Anapub Publications
Reference15 articles.
1. M. U. Hassan, M. H. Rehmani, and J. Chen, “Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions,” Future Generation Computer Systems, vol. 97, pp. 512–529, Aug. 2019, doi: 10.1016/j.future.2019.02.060. 2. L. Zhang, Y. Xie, Y. Zheng, W. Xue, X. Zheng, and X. Xu, “The challenges and countermeasures of blockchain in finance and economics,” Systems Research and Behavioral Science, vol. 37, no. 4, pp. 691–698, Jun. 2020, doi: 10.1002/sres.2710. 3. Z. Zheng, S. Xie, H. N. Dai, X. Chen, and H. Wang, “Blockchain challenges and opportunities: a survey,” International Journal of Web and Grid Services, vol. 14, no. 4, p. 352, 2018, doi: 10.1504/ijwgs.2018.095647. 4. Stranieri, J. Abawajy, A. Kelarev, S. Huda, M. Chowdhury, and H. F. Jelinek, “An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy,” Artificial Intelligence in Medicine, vol. 58, no. 3, pp. 185–193, Jul. 2013, doi: 10.1016/j.artmed.2013.04.007. 5. Y. Xu, G. Wang, J. Yang, J. Ren, Y. Zhang, and C. Zhang, “Towards Secure Network Computing Services for Lightweight Clients Using Blockchain,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–12, Nov. 2018, doi: 10.1155/2018/2051693.
|
|