Optimization Solution Proposal for Smart Transaction Security of Smart Blockchain Contracts in E-Banking Applications
Advances in computational intelligence and robotics book series,
Год журнала:
2025,
Номер
unknown, С. 295 - 320
Опубликована: Фев. 28, 2025
This
chapter
makes
use
of
the
concept
micro-segmenting
whole
system
into
distinct
zones,
each
with
its
own
set
regulations
and
restrictions.
A
smart
contract
controls
these
rules,
determining
whether
or
not
they
have
been
observed
to
confirm
customer's
identity.
To
define
kind
e-banking
request,
two-phase
commit
algorithm
(2PC)
was
first
applied.
The
micro-segmentation
technique
then
used
isolate
e-transaction
procedure
in
a
different
segment.
Next,
it
determined
if
conditions
were
optimized
by
applying
yellow
saddle
goatfish
(YSGA)
situation.
With
help
blockchain
technology,
can
handle
lot
users
decentralized
way.
Using
hash
block
stops
attackers
from
doing
fraudulent
transactions.
has
tested
against
number
well-known,
recent
assaults
shown
itself
be
resilient
them.
When
compared
existing
research,
execution
time,
complexity,
memory,
disk
drive
findings
are
deemed
low
terms
performance
evaluation.
Язык: Английский
Combining Fog Computing and Blockchain Based on the Internet of Medical Things to Preserve Patient Information Privacy
Advances in computational intelligence and robotics book series,
Год журнала:
2025,
Номер
unknown, С. 525 - 546
Опубликована: Фев. 28, 2025
This
chapter
proposes
an
encrypted
internet
of
medical
things
(IoMT)
privacy
system
(EIPS).
To
create
strong
security
measures,
the
suggested
EIPS
uses
techniques
decision
tree
(DT),
naive
bayes
(NB),
twofish,
and
jellyfish
inside
private
blockchain
(PBC)
fog
computing.
Medical
data
is
kept
anonymous
by
using
twofish
encryption
technique.
study
DT
to
make
precise
recommendations
based
on
gathered
data,
while
NB
utilized
swiftly
classify
patient
data.
The
algorithm
was
employed
in
improve
transmission
identifying
patterns
algorithms
from
NB,
DT,
are
made
function
well
with
PBC.
Peer-to-peer
IoMT
distributed
managed
via
EIPS.
Fog
computing
(FC)
has
advantage
accelerating
decision-making
without
requiring
user
go
far-off
clouds.
authors
examined
performance
our
system.
findings
show
that
can
handle
extensive
measures
lightweight
operations,
making
it
suitable
for
use
health
organizations.
Язык: Английский
Security Cooperation in the Protection Concerns of Agriculture Data Using Efficient Signatures and Artificial Bee Colony Manner
Advances in computational intelligence and robotics book series,
Год журнала:
2025,
Номер
unknown, С. 439 - 460
Опубликована: Фев. 28, 2025
This
chapter
first
suggests
a
security
mechanism
to
prohibit
block
data
tampering
in
internet
of
things
(IoT)
by
combining
consortium
blockchain
blocks
with
Edwards25519
(Ed25519)
signatures.
Secondly,
the
study
that
is
being
suggested
makes
use
an
artificial
bee
colonizer
(ABC)
technique
maintain
unpredictability
Ed25519
signatures
while
finding
best
answer
and
maximizing
range
intricate
problems.
The
optimizer
system
uses
advanced
deep
learning
(ADL)
technology
as
model
monitor
assess
things.
authors
have
evaluated
solution
terms
performance
overhead
security.
most
damaging
applications,
like
obfuscation,
selfish
mining,
blocking,
ignoring,
blind
heuristic
attacks,
can
be
prevented
system,
according
tests
been
done
on
it.
defends
against
these
attacks
using
test
Scyther.
It
also
monitors
metrics,
such
network
throughput
rate,
entropy,
scalability,
which
indicate
how
well
performs
comparison
other
systems.
Язык: Английский
Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things
Deleted Journal,
Год журнала:
2024,
Номер
4(3), С. 152 - 165
Опубликована: Дек. 5, 2024
Protecting
patient
data
in
the
Internet
of
Medical
Things
(IoMT)
is
one
major
challenges
facing
healthcare
organizations
because
increasing
threats
to
privacy
and
security.
Although
there
are
many
existing
protocols
solutions,
such
as
Rivest–Shamir–Adleman
(RSA)
El-Gamal
cryptographies
or
centralized
methods,
that
aim
protect
data,
they
suffer
from
weaknesses
slow
performance
inability
handle
large
volumes
data.
The
issue
security
medical
records
has
become
an
urgent
need,
use
methods
can
expose
them
single-point
failure.
In
this
paper,
we
present
efficient
approach
securing
information
(EASPI),
which
depends
on
blockchain
integrates
innovative
techniques
advanced
encryption
algorithm
(AES),
reverse
word
frequency
analysis
(TF-IDF),
Lemplel-Ziv-Welch
(LZW),
decision
tree
model
(DTM),
naive
Bayes
classifier
(NBC).
EASPI
seeks
improve
by
storing
it
encrypted
securely
via
technology,
providing
a
high
level
reliability.
experimental
results
indicate
reduces
execution
time
0.2
ms
decryption
0.3
while
improving
accuracy
diagnosis.
potential
suggested
for
systems
further
demonstrated
fact
TF-IDF
attained
0.004
ms,
blockchain's
greatest
was
0.014
ms.
Additionally,
using
formal
verification
Scyther
tool,
system
examined
both
theoretically
practically.
solution
appropriate
option
institutions
since
offers
strong
defense
against
range
cyber
threats,
including
targeted
espionage
assaults.
Язык: Английский