Sturdy Blockchain Combined with E-apps Repositories Based on Reliable Camouflaging and Integrating Mechanisms

PDF (991KB), PP.35-53

Views: 0 Downloads: 0

Author(s)

Rasha Hallem Razzaq 1 Duaa Hammoud Tahayur 1 Wid Alaa Jebbar 1 Mishall Al-Zubaidie 1,*

1. Department of Computer Sciences, Education College for Pure Sciences, University of Thi-Qar, Nasiriyah 64001, Iraq

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2025.03.03

Received: 22 Jun. 2024 / Revised: 14 Feb. 2024 / Accepted: 1 Apr. 2025 / Published: 8 Jun. 2025

Index Terms

CSPRNG, El-Gamal Algorithm, GLUON, Hybrid Blockchain, Repository Information Security

Abstract

The development of technology around us is going through a rapid and significant state that is almost causing a technological revolution, so one of the most important problems facing us in the current technological era is the management of warehouse data and the growth occurring in the volume of data that is dealt with on a daily basis, whether in terms of its storage or security, especially if the data is huge and large. Therefore, we developed a proposed model in our study that provides security in addition to storage/warehouse management. In our proposed model, the El-Gamal and GLUON functions address the security problem. In addition to supporting other security methods, such as GLUON, which is secure and fast, for encryption. Hybrid Blockchain technology is used in our proposed model to deal with the storage of this type of huge data, and also for the purpose of organizing warehouse storage. Data is exposed to intrusion or loss when using any traditional, centralized technology or when storing it in databases, so we chose the hybrid Blockchain to be an integrated fit with our proposed model, and also because it allows the distribution of data across public and private domains. Our proposed model, upon examination, shows that it effectively dealt with defending against attacks such as NotPetya, GoldenEye, WannaCry, Emotet, Trickbot, Conti, and DarkSide. In addition, the results of lightweight GLUON and El-Gamal showed that the performance analysis of our model was very successful, where the time it takes to create a block was between 0.01 ns and not more than 0.09 ns which is considered too fast for such a system that deals with a big data. As a result, we were able to gain an effective model for data repository control, security, performance, and management. 

Cite This Paper

Rasha Hallem Razzaq, Duaa Hammoud Tahayur, Wid Alaa Jebbar, Mishall Al-Zubaidie, "Sturdy Blockchain Combined with E-apps Repositories Based on Reliable Camouflaging and Integrating Mechanisms", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.3, pp.35-53, 2025. DOI:10.5815/ijcnis.2025.03.03

Reference

[1]F.A., Reegu, S. Mohd, Z. Hakami, K.K Reegu, and S. Alam, "Towards Trustworthiness of Electronic Health Record System using Blockchain," Annals of R.S.C.B., 25(6), 2425-2434, 2021. Retrieved from http://annalsofrscb.ro
[2]M.K., Hasan, A. Alkhalifah, S. Islam, N.B.M. Babiker, A.K.M.A. Habib, A.H.M. Aman, and M.A. Hossain, 2022. Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations. Wireless Communications and Mobile Computing, p.9065768, 2022. https://doi.org/10.1155/2022/9065768.
[3]A.V. Jha, B. Appasani, D.K. Gupta, B.S. Ainapure, & N. Bizon, "A Blockchain-Enabled Approach for Enhancing Synchrophasor Measurement in Smart Grid 3.0," Sustainability, 15, 14451, 2023. https://doi.org/10.3390/su151914451.
[4]A. A. Laghari, A.A. Khan, R. Alkanhel, H. Al-Mannai, and S.  Borwis, "Lightweight-BIoV: Distributed Ledger Technology (BDLT) for the Internet of Vehicles (IoVs)," Electronics, 12(3), 677, 2023. https://doi.org/10.3390/electronics12030677.
[5]M. Amjad, J. Taylor, Z.  Huang, M. Li, and C.S. Lai, "Improving the performance of the information and data exchange platform that supports Blockchain technology for smart grids," Electronics, 12(6), 1405, 2023. https://doi.org/10.3390/electronics12061405.
[6]W. Guangfu, Xin Lai, Daojing He, Sammy Chan, Xiaoyan Fu. "Improving Byzantine Fault Tolerance Based on Quota Evaluation and Consistent Hashing," Peer-to-Peer Netw. Appl., 17, 1963–1975, 2024. https://doi.org/10.1007/s12083-024-01700-3.
[7]C.G. Sondakh, R. Ardiansyah, Y.Y. Joefrie, D.S. Nangreni, and M.Y. Pusadan, "Implementing the Data Layer in a Blockchain Network Using the SHA256 Hash Algorithm," Advancing Sustainable Science, Engineering, and Technology (ASSET), 6(1), pp. 0240204-01 - 0240204-06, 2024. https://doi.org/10.26877/asset.v6i2.18103.
[8]L. Frank, "Hardware implementation of trigonometry-based encryption for IoT devices", Cryptography and Communications, February 2024. https://doi.org/10.1007/s12095-024-0378-9.
[9]R. H. Razzaq, and M. Al-Zubaidie, "Formulating an advanced security protocol for Internet of medical Things based on blockchain and fog computing technologies," Iraqi Journal for Computer Science and Mathematics, 5(3), 723-734, 2024. https://doi.org/10.30880/ijcsm.2024.05.03.046.
[10]W. A. Jebbar, and M. Al-Zubaidie, "Transaction-based blockchain systems security improvement employing micro-segmentation controlled by smart contracts and detection of saddle Goatfish," SN Computer Science, 5(7), 898, 2024. https://doi.org/10.1007/s42979-024-03239-9.
[11]A. Janarthanan, and V. Vidhusha, "Cycle‐Consistent Generative Adversarial Network and Crypto Hash Signature Token‐based Blockchain Technology for Data Aggregation with Secured Routing in Wireless Sensor Networks," International Journal of Communication Systems, 37(4), e5675, 2024. https://doi.org/10.1002/dac.5675. 
[12]M. Al-Zubaidie, and W. A. Jebbar "Providing Security for Flash Loan System Using Cryptocurrency Wallets Supported by XSalsa20 in a Blockchain Environment," Applied Sciences, 14(14), 6361, 2024. https://doi.org/10.3390/app14146361.
[13]R. Vatambeti, E. P. Krishna, M. G. Karthik, and V. K. Damera, "Securing the medical data using enhanced privacy preserving based Blockchain technology in Internet of Things," Cluster Computing, 27(2), 1625-1637, 2024. https://doi.org/10.1007/s10586-023-04056-0.
[14]V. S. Marichamy, and V. Natarajan, "Blockchain based securing medical records in big data analytics," Data & Knowledge Engineering, 144, 102122, 2023. https://doi.org/10.1016/j.datak.2022.102122.
[15]S. Shree, C. Zhou, and M. Barati, "Data protection in internet of medical things using Blockchain and secret sharing method," The Journal of Supercomputing, 80(4), 5108-5135, 2024. https://doi.org/10.1007/s11227-023-05657-7. 
[16]E. R. D. Villarreal, J. García-Alonso, E. Moguel, and J. A. H. Alegría, J. A. H. "Blockchain for healthcare management systems: A survey on interoperability and security," IEEE Access, 11, 5629-5652, 2023, https://doi.org/10.1109/ACCESS.2023.3236505.
[17]I. Keshta, Y. Aoudni, M. Sandhu, A. Singh, P. A. Xalikovich, A. Rizwan, and S. Lalar, "Blockchain aware proxy re-encryption algorithm-based data sharing scheme," Physical Communication, 58, 102048, 2023, https://doi.org/10.1016/j.phycom.2023.102048.
[18]G. Tripathi, M. A. Ahad, and G. Casalino, "A comprehensive review of Blockchain technology: Underlying principles and historical background with future challenges," Decision Analytics Journal, 100344, 2023, https://doi.org/10.1016/j.dajour.2023.100344.
[19]R. H. Razzaq, M. Al-Zubaidie, and R. G. Atiyah, "Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things," Mesopotamian Journal of CyberSecurity, 4(3), 152-165, 2024. https://doi.org/10.58496/MJCS/2024/020.
[20]W. A. Jebbar and M. Al-Zubaidie, "Transaction Security and Management of Blockchain-Based Smart Contracts in E-Banking-Employing Microsegmentation and Yellow Saddle Goatfish," Mesopotamian journal of Cybersecurity, vol. 4, no. 2, pp. 71-89, 2024, https://doi.org/10.58496/MJCS/2024/005.
[21]W. L. Shiau, X. Wang, and F. Zheng, "What are the trend and core knowledge of information security? A citation and co-citation analysis," Information & Management, 60(3), 103774, 2023. https://doi.org/10.1016/j.im.2023.103774.
[22]A. T. Oyewole, C. C. Okoye, O. C. Ofodile, and C. E. Ugochukwu, "Cybersecurity risks in online banking: A detailed review and preventive strategies application," World Journal of Advanced Research and Reviews, 21(3), 625-643, 2024, https://doi.org/10.30574/wjarr.2024.21.3.0707.
[23]M. Al-Zubaidie, "Implication of lightweight and robust hash function to support key exchange in health sensor networks," Symmetry, 15(1), pp. 152, 2023. https://doi.org/10.3390/sym15010152.
[24]M. Al-Zubaidie and G. S. Shyaa, "Applying detection leakage on hybrid cryptography to secure transaction information in e-commerce apps," Future Internet, 15(8), 262, 2023. https://doi.org/10.3390/fi15080262.
[25]M. Al-Zubaidie, and R. A. Muhajjar, "Integrating Trustworthy Mechanisms to Support Data and Information Security in Health Sensors," Procedia Computer Science, 237, 43-52, 2024. https://doi.org/10.1016/j.procs.2024.05.078.
[26]J. P. Arockiasamy, L. E. Benjamin, and R. U. Vaidyanathan, "Beyond Statistical Analysis in Chaos‐Based CSPRNG Design," Security and Communication Networks, 2021(1), 5597720, 2021. https://doi.org/10.1155/2021/5597720.
[27]S. Jain, M. A. Rios, and B. Cambou, "Enhancing True Random Number Generation in MRAM Devices Through Response Adjustment," In Science and Information Conference (pp. 438-454). Cham: Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-62273-1_28.
[28]J. Daemen, D. Kuijsters, S. Mella, and D. Verbakel, "Propagation properties of a non-linear mapping based on squaring in odd characteristic," Cryptography and Communications, 1-15, 2024. https://doi.org/10.1007/s12095-024-00711-4.
[29]J. Chen, R. G. Edwards, and W. Mao, "Graph Contractions for Calculating Correlation Functions in Lattice QCD," In Proceedings of the Platform for Advanced Scientific Computing Conference (pp. 1-10), 2023. https://doi.org/10.1145/3592979.3593409.
[30]P. M. Mukundan, S. Manayankath, C. Srinivasan, and M. Sethumadhavan, "Hash-one: A lightweight cryptographic hash function," IET Information Security, 2016. https://doi.org/10.1049/iet-ifs.2015.0385.
[31]M. Waqas, M. A. Khuhro, U. Saeed, K. Kumar, N. Mirbahar, Ruqiya, " Security Awareness on Ransomware Threats Detection and their Protection Techniques," International Journal of Advanced Trends in Computer Science and Engineering, 2021. https://doi.org/10.30534/ijatcse/2021/701022021.
[32]R. Tate, and C. Bates, "Deterrence Thru Transparent Offensive Cyber Persistence," JSTOR, Vol. 7, No. 4, pp. 227-246, 2022. https://www.jstor.org/stable/48703302.
[33]K. A. Williams, Conti Ransomware Gang: An Analysis of the Group’s Motives and Methods, (Doctoral dissertation, Utica University), 2022.
[34]A. D. Westbrook, "A Safe Harbor for Ransomware Payments: Protecting Stakeholders, Hardening Targets and Defending National Security," NYUJL & Bus., 18, 391, 2021.
[35]J. A. Gómez Hernández, Crypto-ransomware: Analysis and early detection based on the use of trap files, (Doctoral dissertation, University of Granada) 2022. https://digibug.ugr.es/bitstream/handle/10481/76803/94887%281%29.pdf?sequence=4&isAllowed=y.
[36]Q. Zhong, and Q. Kang, "Ransomware Detection with Opcode Analysis and GAN-Based Unsupervised Learning," Research Square, 2024. https://doi.org/10.21203/rs.3.rs-3819158/v1.
[37]K. Stoddart, "Non and Sub-State Actors: Cybercrime, Terrorism, and Hackers," In Cyberwarfare: Threats to Critical Infrastructure, Cham: Springer International Publishing, pp. 351-399, 2022. https://doi.org/10.1007/978-3-030-97299-8_6.