TokenDoc: Source Authentication With a Hybrid Approach of Smart Contract and RNN-Based Models With AES Encryption

被引:0
作者
Saxena, Apoorv [1 ]
Sun, Hung-Min [1 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
关键词
Advanced encryption standard (AES); artificial intelligence; blockchain; cybersecurity; smart contract; source authentication; FAKE NEWS; BLOCKCHAIN; IOT; MANAGEMENT; SECURITY; INTERNET; SYSTEM;
D O I
10.1109/TEM.2023.3282293
中图分类号
F [经济];
学科分类号
02 ;
摘要
This study proposes a hybrid architecture in which duplicates in the dataset are identified using a deep-learning neural network to authenticate the source. The blockchain provides distinct metadata to the information source to allow the sender and the recipient to verify that the information is accurate and cannot be modified or altered. The system also uses RNN-based LSTM and GRU model neural networks to determine whether the method performs better for these applications and uses an Ethereum blockchain to perform transactions between the two parties. The system also used an advanced encryption standard (AES) to protect the transactions. The AES uses encryption and decryption keys. This system structure is implemented on raspberry pi devices to determine its feasibility in a small system flowchart. The dataset for this study is the "Image encryption and decryption dataset" from the Kaggle website, and the results are better than GRU, with a 0.9635 accuracy rate for this dataset. The smart contract module is verifiable, available, tamper-resistant, and usable, and AES provides a more robust encryption method for the system.
引用
收藏
页码:12418 / 12432
页数:15
相关论文
共 57 条
  • [1] Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents
    Abdibayev, Almas
    Chen, Dongkai
    Chen, Haipeng
    Poluru, Deepti
    Subrahmanian, V. S.
    [J]. ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2021, 12 (02)
  • [2] Anonymous authentication for privacy-preserving IoT target-driven applications
    Alcaide, Almudena
    Palomar, Esther
    Montero-Castillo, Jose
    Ribagorda, Arturo
    [J]. COMPUTERS & SECURITY, 2013, 37 : 111 - 123
  • [3] Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT)
    Alfrhan, Aishah
    Moulahi, Tarek
    Alabdulatif, Abdulatif
    [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2021, 2 (04):
  • [4] Internet of Things: A survey on the security of IoT frameworks
    Ammar, Mahmoud
    Russello, Giovanni
    Crispo, Bruno
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 8 - 27
  • [5] Antoun Wissam, 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), P519, DOI 10.1109/ICIoT48696.2020.9089487
  • [6] Behera Anukampa, 2022, Biologically Inspired Techniques in Many Criteria Decision Making: Proceedings of BITMDM 2021. Smart Innovation, Systems and Technologies (271), P107, DOI 10.1007/978-981-16-8739-6_9
  • [7] Buterin V, 2016, Opportunities and Challenges for Private and Consortium Blockchains
  • [8] Homomorphic Encryption for Arithmetic of Approximate Numbers
    Cheon, Jung Hee
    Kim, Andrey
    Kim, Miran
    Song, Yongsoo
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 409 - 437
  • [9] Cherubini Mauro., 2009, Proceedings of the 17th ACM International Conference on Multimedia, number April in MM 09, P35, DOI DOI 10.1145/1631272.1631280
  • [10] Dannen C., 2017, Introducing Ethereum and Solidity, DOI DOI 10.1007/978-1-4842-2535-6