A Novel Security Algorithm RPBB31 for Securing the Social Media Analyzed Data using Machine Learning Algorithms

被引:9
作者
Batcha, Bagath Basha Chan [1 ]
Singaravelu, Rajaprakash [2 ]
Ramachandran, Meenakumari [3 ]
Muthusamy, Suresh [4 ]
Panchal, Hitesh [5 ]
Thangaraj, Kokilavani [6 ]
Ravindaran, Ashokkumar [7 ]
机构
[1] Kommuri Pratap Reddy Inst Technol, Dept Comp Sci & Engn, Hyderabad, Telangana, India
[2] Vinayaka Missions Res Fdn Deemed Univ, Aarupadai Veedu Inst Technol, Dept Comp Sci & Engn, Paiyanoor, Tamil Nadu, India
[3] Kongu Engn Coll Autonomous, Dept Elect & Elect Engn, Erode, Tamil Nadu, India
[4] Kongu Engn Coll Autonomous, Dept Elect & Commun Engn, Erode, Tamil Nadu, India
[5] Govt Engn Coll, Dept Mech Engn, Patan, Gujarat, India
[6] Sri Krishna Coll Engn & Technol Autonomous, Dept Elect & Elect Engn, Coimbatore, Tamil Nadu, India
[7] Bannari Amman Inst Technol Autonomous, Dept Elect & Elect Engn, Erode, Tamil Nadu, India
关键词
Twitter; Machine learning algorithm; Security; Encryption; RPBB31;
D O I
10.1007/s11277-023-10446-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The present world data is most important in public because without data cannot live in the world. This data is big data and that data daily increases through Social Media like "Twitter, Facebook, Youtube, WhatsApp, Instagram, LinkedIn", etc.., because this media only share public opinion very fast through the net. From this media, more people used especially Twitter. Thus media are used to analyze the public opinion of the tweets and predict the future through Machine Learning Algorithm. This analyzed data should make it polarity score. This score data has very little security because, this score can change the score and affected the future, so apply the existing security algorithms is Salsa and ChaCha. The Salsa algorithm is diagonal values moved to the first row. The ChaCha algorithm is diagonal values moved to the first column. The existing algorithms do not have good security because they focused only on performance, not security. So, the novel security algorithm is RPBB31. This algorithm has seven stages. The 1st stage is to find the secret key N, n, and p values from the matrix. The 2nd stage is to apply the secret key in P-N(n) operation. The 3rd stage operation of P-N(n) up to n = 1. The 4th stage is all P-N(n) operations make their single line. The 5th stage is to pair the values and swap the values in the matrix. The 6th stage is column operations in the matrix. The 7th stage is again Step 4 values used to swap but "0th" cell value start from reverse in the matrix. In world cricket is the most famous game. In all social media Millions of people are following in different manner, especially in indian cricketer are more famous in India and world. In some point of time it may lead to match fixing, betting. To overcome this kind of issue the four datasets chosen. The proposed algorithm has provide good security and performance while compare to existing algorithms.
引用
收藏
页码:581 / 608
页数:28
相关论文
共 20 条
[1]  
Bagath Basha C., 2019, INT J SCI TECHNO RES, V8, P1952
[2]  
Bagath Basha C., 2020, J PHYS
[3]  
Bagath Basha C., 2020, AIP C P INT C MECH E
[4]  
Bagath Basha C., 2020, ADV MATH SCI J, V9, P1085
[5]  
Basha C. B., 2020, ADV MATH SCI J, V9, P1093, DOI DOI 10.37418/AMSJ.9.3.34
[6]   RETRACTED: Enhancing the security using SRB18 method of Emb e dding Computing (Retracted article. See vol. 103, 2023) [J].
Basha, C. Bagath ;
Rajaprakash, S. .
MICROPROCESSORS AND MICROSYSTEMS, 2020, 77 (77)
[7]  
Basha CB., 2019, INT J RECENT TECHNOL, V8, P591
[8]  
Bernstein DJ, 2008, LECT NOTES COMPUT SC, V4986, P84
[9]  
Djaballah KA, 2019, 2019 SIXTH INTERNATIONAL CONFERENCE ON SOCIAL NETWORKS ANALYSIS, MANAGEMENT AND SECURITY (SNAMS), P223, DOI [10.1109/SNAMS.2019.8931827, 10.1109/snams.2019.8931827]
[10]  
Jaichandran R., 2019, INT J ENG ADV TECHNO, DOI [10.35940/ijeat.F8586.088619, DOI 10.35940/IJEAT.F8586.088619]