Enhancing Blockchain Security Against Data Tampering: Leveraging Hybrid Model in Multimedia Forensics and Multi-Party Computation for Supply Chain Data Protection

被引:0
作者
Islam, Umar [1 ]
Alshammari, Abdullah [2 ]
Alzaid, Zaid [3 ]
Ahmed, Adeel [4 ]
Abdullah, Saima [4 ]
Iftikhar, Saman [5 ]
Bawazeer, Shaikhan [5 ]
Izhar, Muhammad [6 ]
机构
[1] Iqra Natl Univ, Dept Comp Sci, Swat Campus, Swat 25100, Khyber Pakhtunk, Pakistan
[2] Univ Hafr Al Batin, Coll Comp Sci & Engn, Hafar al Batin 31991, Saudi Arabia
[3] Islamic Univ Madinah, Coll Comp & Informat Syst, Dept Comp Sci, Madinah 42351, Saudi Arabia
[4] Islamia Univ Bahawalpur, Fac Comp, Dept Comp Sci, Bahawalpur 63100, Punjab, Pakistan
[5] Arab Open Univ, Fac Comp Studies, Riyadh 84901, Saudi Arabia
[6] Super Univ, Dept Comp Sci & Informat Technol, Lahore 54000, Punjab, Pakistan
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Blockchains; Data privacy; Privacy; Differential privacy; Accuracy; Federated learning; Supply chain management; Media; LSTM-GRU units; media tampering detection; block-chain; supply chain management;
D O I
10.1109/ACCESS.2024.3441106
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, there has been a notable surge in the integration of Blockchain technology into supply chain management systems. This integration holds the promise of enhanced transparency, security, and efficiency in monitoring the movement of goods and services. This study presents a novel approach aimed at fortifying privacy and accuracy within blockchain-based supply chain management systems. The methodology integrates Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) units with secure multi-party computation (MPC) and differential privacy techniques as a hybrid model. The objective is to safeguard the confidentiality of transaction data while enabling precise detection of media tampering. Performance evaluation revolves around three key aspects: accuracy, privacy preservation, and computational efficiency. In terms of accuracy assessment, the proposed hybrid approach is benchmarked against traditional machine learning algorithms including Support Vector Machines (SVM), k-Nearest Neighbors (KNN), and Random Forest. Results indicate superior performance, with the proposed hybrid method achieving an accuracy of 0.95, outperforming conventional algorithms. Precision, recall, and F1-score metrics further confirm the effectiveness of the approach in accurately identifying media tampering instances. Privacy preservation capabilities are evaluated through differential privacy techniques, revealing the method's ability to inject controlled noise into the data to protect individual privacy. Results demonstrate varying levels of privacy preservation across different settings, highlighting the trade-off between privacy and data utility. Computational efficiency is also scrutinized, considering the additional overhead introduced by privacy preservation mechanisms and secure MPC protocols. While there is a slight increase in computational time, the proposed approach maintains reasonable training and inference times, ensuring practical applicability in real-world scenarios.
引用
收藏
页码:111007 / 111020
页数:14
相关论文
共 36 条
  • [1] Abasi Ammar Kamal, 2023, 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA), P194, DOI 10.1109/BCCA58897.2023.10338861
  • [2] Acharya D. K., 2023, P IEEE INT C BLOCKC, P1
  • [3] FLB2: Layer 2 Blockchain Implementation Scheme on Federated Learning Technique
    Alief, Revin Naufal
    Putra, Made Adi Paramartha
    Gohil, Augustin
    Lee, Jae-Min
    Kim, Dong-Seong
    [J]. 2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC, 2023, : 846 - 850
  • [4] Cloud-IIoT-Based Electronic Health Record Privacy-Preserving by CNN and Blockchain-Enabled Federated Learning
    Alzubi, Jafar A.
    Alzubi, Omar A.
    Singh, Ashish
    Ramachandran, Manikandan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 1080 - 1087
  • [5] DS2PM: A Data-Sharing Privacy Protection Model Based on Blockchain and Federated Learning
    Chen, Yanru
    Li, Jingpeng
    Wang, Fan
    Yue, Kaifeng
    Li, Yang
    Xing, Bin
    Zhang, Lei
    Chen, Liangyin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (14) : 12112 - 12125
  • [6] A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing
    Cheng, Yudan
    Ma, Jianfeng
    Liu, Zhiquan
    Li, Zhetao
    Wu, Yongdong
    Dong, Caiqin
    Li, Runchuan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 5293 - 5311
  • [7] PRIVACY PRESERVING FEDERATED LEARNING FROM MULTI-INPUT FUNCTIONAL PROXY RE-ENCRYPTION
    Feng, Xinyu
    Shen, Qingni
    Li, Cong
    Fang, Yuejian
    Wu, Zhonghai
    [J]. 2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, : 6955 - 6959
  • [8] Fu Minjie, 2023, 2023 2nd International Conference on Artificial Intelligence and Blockchain Technology (AIBT), P76, DOI 10.1109/AIBT57480.2023.00022
  • [9] Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems
    Gai, Keke
    Tang, Haokun
    Li, Guangshun
    Xie, Tianxiu
    Wang, Shuo
    Zhu, Liehuang
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 2344 - 2358
  • [10] Sandbox Computing: A Data Privacy Trusted Sharing Paradigm Via Blockchain and Federated Learning
    Guo, Shaoyong
    Zhang, Keqin
    Gong, Bei
    Chen, Liandong
    Ren, Yinlin
    Qi, Feng
    Qiu, Xuesong
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (03) : 800 - 810