Journal of Machine and Computing


Security Intelligence Enhanced by Blockchain Data Transitions and Effective Handover Authentication



Journal of Machine and Computing

Received On : 08 September 2023

Revised On : 17 January 2024

Accepted On : 07 February 2024

Published On : 05 April 2024

Volume 04, Issue 02

Pages : 371-380


Abstract


The most significant method is intrusion detection, which improves privacy concerns about client authentication and authorization. No matter what is done to enhance security intelligence, vulnerability has also increased in the modern era. The major role is to predict those vulnerabilities and improve security enhancements by using blockchain methods to enhance privacy concerns. In the corporation, banking, or healthcare system, the major issues are data spoofing, cyber security issues, and viruses affecting confidential data or breaking the shield of data protection. Enhance authorization and authentication by connecting the fog cloud and using the blockchain to protect privacy. In the transition of data, attackers may increase their attacks using various forms. Even if the data is transformed, attackers can easily access it and break the confidentiality of the entire massive database. FCBS (Fog Cloud Blockchain Server) will prevent data vulnerability by using FCS (Fog Cloud Server) modalities for data access. It consists of two segments, AuC (Authentication) and AuT (authorization) during the processing of data. BC (blockchain) addresses the data functionality and enhances the FCS security intelligence in two parts. By preventing the vulnerability earlier, no FC (Fog Cloud) data will be affected. To ensure data protection is reliable and accurate by handing over the AuC and AuT.


Keywords


Handover Authentication, Blockchain, Privacy Preserving, Fog Cloud Blockchain Server, Fog Cloud, Authentication, Authorization.


  1. M. U. Hassan, M. H. Rehmani, and J. Chen, “Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions,” Future Generation Computer Systems, vol. 97, pp. 512–529, Aug. 2019, doi: 10.1016/j.future.2019.02.060.
  2. L. Zhang, Y. Xie, Y. Zheng, W. Xue, X. Zheng, and X. Xu, “The challenges and countermeasures of blockchain in finance and economics,” Systems Research and Behavioral Science, vol. 37, no. 4, pp. 691–698, Jun. 2020, doi: 10.1002/sres.2710.
  3. Z. Zheng, S. Xie, H. N. Dai, X. Chen, and H. Wang, “Blockchain challenges and opportunities: a survey,” International Journal of Web and Grid Services, vol. 14, no. 4, p. 352, 2018, doi: 10.1504/ijwgs.2018.095647.
  4. Stranieri, J. Abawajy, A. Kelarev, S. Huda, M. Chowdhury, and H. F. Jelinek, “An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy,” Artificial Intelligence in Medicine, vol. 58, no. 3, pp. 185–193, Jul. 2013, doi: 10.1016/j.artmed.2013.04.007.
  5. Y. Xu, G. Wang, J. Yang, J. Ren, Y. Zhang, and C. Zhang, “Towards Secure Network Computing Services for Lightweight Clients Using Blockchain,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–12, Nov. 2018, doi: 10.1155/2018/2051693.
  6. X. Zhou, W. Liang, K. I.-K. Wang, and S. Shimizu, “Multi-Modality Behavioral Influence Analysis for Personalized Recommendations in Health Social Media Environment,” IEEE Transactions on Computational Social Systems, vol. 6, no. 5, pp. 888–897, Oct. 2019, doi: 10.1109/tcss.2019.2918285.
  7. D. Czarnitzki and J. Delanote, “R&D policies for young SMEs: input and output effects,” Small Business Economics, vol. 45, no. 3, pp. 465–485, May 2015, doi: 10.1007/s11187-015-9661-1.
  8. W. Guo, Y. Zhang, and L. Li, “The integration of CPS, CPSS, and ITS: A focus on data,” Tsinghua Science and Technology, vol. 20, no. 4, pp. 327–335, Aug. 2015, doi: 10.1109/tst.2015.7173449.
  9. Y. Wang et al., “ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform,” IEEE Transactions on Industrial Informatics, vol. 18, no. 5, pp. 3327–3336, May 2022, doi: 10.1109/tii.2020.3047416.
  10. Di Wu, Mingsheng Shang, Xin Luo, Yi He, Guoyin Wang and Xindong Wu, “A Data-Characteristic-Aware Latent Factor Model for Web Services QoS Prediction”, IEEE Transactions on Knowledge and Data Engineering, DOI 10.1109/TKDE.2020.3014302, 2020.
  11. W. Xu, W. Fang, Y. Ding, M. Zou, and N. Xiong, “Accelerating Federated Learning for IoT in Big Data Analytics With Pruning, Quantization and Selective Updating,” IEEE Access, vol. 9, pp. 38457–38466, 2021, doi: 10.1109/access.2021.3063291.
  12. L. Xu, X. Zhou, Y. Tao, L. Liu, X. Yu, and N. Kumar, “Intelligent Security Performance Prediction for IoT-Enabled Healthcare Networks Using an Improved CNN,” IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 2063–2074, Mar. 2022, doi: 10.1109/tii.2021.3082907.
  13. Zhao, K. Fan, K. Yang, Z. Wang, H. Li, and Y. Yang, “Anonymous and Privacy-Preserving Federated Learning With Industrial Big Data,” IEEE Transactions on Industrial Informatics, vol. 17, no. 9, pp. 6314–6323, Sep. 2021, doi: 10.1109/tii.2021.3052183.
  14. C. Zhou, A. Fu, S. Yu, W. Yang, H. Wang, and Y. Zhang, “Privacy-Preserving Federated Learning in Fog Computing,” IEEE Internet of Things Journal, vol. 7, no. 11, pp. 10782–10793, Nov. 2020, doi: 10.1109/jiot.2020.2987958.
  15. H. Zhou, G. Sun, S. Fu, L. Wang, J. Hu, and Y. Gao, “Internet Financial Fraud Detection Based on a Distributed Big Data Approach With Node2vec,” IEEE Access, vol. 9, pp. 43378–43386, 2021, doi: 10.1109/access.2021.3062467.

Acknowledgements


The authors would like to thank to the reviewers for nice comments on the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Vincent Arokiam Arul Raja V and Senthamarai C, “Security Intelligence Enhanced by Blockchain Data Transitions and Effective Handover Authentication", pp. 371-380, April 2024. doi: 10.53759/7669/jmc202404035.


Copyright


© 2024 Vincent Arokiam Arul Raja V and Senthamarai C. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.