Privacy-Preserving E-Fir Systems Using Blockchain and Enhanced Silk Moth Optimization
Privacy-Preserving E-Fir Systems Using Blockchain and Enhanced Silk Moth Optimization |
||
![]() |
![]() |
|
© 2025 by IJETT Journal | ||
Volume-73 Issue-5 |
||
Year of Publication : 2025 | ||
Author : E. Juliet Priscilla, S. Nallusamy, D. Sobya, P. Divya | ||
DOI : 10.14445/22315381/IJETT-V73I5P128 |
How to Cite?
E. Juliet Priscilla, S. Nallusamy, D. Sobya, P. Divya, "Privacy-Preserving E-Fir Systems Using Blockchain and Enhanced Silk Moth Optimization," International Journal of Engineering Trends and Technology, vol. 73, no. 5, pp.339-358, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I5P128
Abstract
Currently, various forms of crime are happening worldwide. The document prepared to file any perceptible crimes committed is called the Electronic First Information Report (e-FIR). These records make it possible to be systematically registered, but there is a potential threat of unauthorized access through hacking. For this reason, this database has serious problems with data integrity and transparency. The submitted concept presents a clarification as an essential component of a smart city environment. However, there are many risks to the information collected, especially those with centralized management. Thus, a novel blockchain-based platform has been introduced for the safe and privacy maintenance of criminal data. This network is divided into multiple channels to protect the anonymity of the data. The new Spiral Silk Moth Optimization Algorithm (SSMOA) is utilized to generate an effective key for the blockchain encryption module in cloud systems. It makes use of smart contract-controlled private blockchains to guarantee secured data storage. The combined compression and synchronized optimization raise the rapid security of privacy details. The suggested smart contract-based paradigm eliminates the necessity for a third trusted party by enabling users to negotiate suspicions using transparent and immutable data. By comparing the execution time of key retrieval and block execution timings, the submitted work has proved to be the best concept through simulation strategy.
Keywords
Smart city, FIR, Criminals, Compression, Blockchain, Encryption key, Optimization, Security.
References
[1] Abdul Rehman Javed et al., “Future Smart Cities: Requirements, Emerging Technologies, Applications, Challenges, and Future Aspects,” Cities, vol. 129, no. 1, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Tanweer Alam, “Cloud-Based IoT Applications and Their Roles in Smart Cities,” Smart Cities, vol. 4, no. 3, pp. 1196-1219, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Shashvi Mishra, and Amit Kumar Tyagi, “The Role of Machine Learning Techniques in Internet of Things-Based Cloud Applications,” Artificial Intelligence-Based Internet of Things Systems, vol. 1, no. 1, pp. 105-135, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Maisha Afrida Tasnim et al., “Crab: Blockchain Based Criminal Record Management System,” International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, vol. 11342, pp. 294-303, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Kirti Marmat, and Anand More, “E-Fir Using E-Governance,” International Journal for Innovative Research in Science & Technology, vol. 3, no. 2, pp. 4-9, 2016.
[Google Scholar] [Publisher Link]
[6] Saurabh Singh et al., “Convergence of Blockchain and Artificial Intelligence in IoT Network for the Sustainable Smart City,” Sustainable Cities and Society, vol. 63, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Shaukat Ali et al., “Privacy and Security Issues in Online Social Networks,” Future Internet, vol. 10, no. 12, pp. 1-12, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Myeonghyun Kim et al., “Design of Secure Decentralized Car-Sharing System using Blockchain,” IEEE Access, vol. 9, no. 1, pp. 54796-54810, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Tanzeela Sultana et al., “Data Sharing System Integrating Access Control Mechanism using Blockchain-Based Smart Contracts for IoT Devices,” Applied Sciences, vol. 10, no. 2, pp. 1-21, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Fadele Ayotunde Alaba et al. “Smart Contracts Security Application and Challenges: A Review,” Cloud Computing and Data Science, vol. 1 no. 2, pp. 15-41, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Meryem Ammi, Shatha Alarabi, and Elhadj Benkhelifa, “Customized Blockchain-Based Architecture for Secure Smart Home for Lightweight IoT,” Information Processing & Management, vol. 58, no. 3, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] A. Sasikumar et al., “An Efficient, Provably-Secure DAG Based Consensus Mechanism for Industrial Internet of Things,” International Journal on Interactive Design and Manufacturing (IJIDeM), vol. 17, no. 5, pp. 2197-2207, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Nikunjkumar Sureshbhai Patel et al., “Blockchain-Envisioned Trusted Random Oracles for IoT-Enabled Probabilistic Smart Contracts,” IEEE Internet of Things Journal, vol. 8, no. 19, pp. 14797-14809, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mahima John, and Abhijeet R. Raipurkar, “Improving Data Integrity and Security in Cloud Environments: A Blockchain-based Method,” Grenze International Journal of Engineering & Technology, vol. 10, no. 2, 2024.
[Google Scholar]
[15] D. Praveena Anjelin, and S. Ganesh Kumar, “Blockchain Technology for Data Sharing in Decentralized Storage System,” Intelligent Computing and Applications: Proceedings of ICICA 2019, Springer Singapore, vol. 1172, pp. 369-382, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] A. Sasikumar et al., “Blockchain-Based Decentralized User Authentication Scheme for Letter of Guarantee in Financial Contract Management,” Malaysian Journal of Computer Science, vol. 1, no. 2, pp. 62-73, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Karl Wüst, and Arthur Gervais, “Do You Need a Blockchain?,” 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, Switzerland, pp. 45-54, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Thomas Kerber et al., “Ouroboro Scrypsinous: Privacy-Preserving Proof-of-Stake,” 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 157-174, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Sara Saberi et al., “Blockchain Technology and Its Relationships to Sustainable Supply Chain Management,” International Journal of Production Research, vol. 57, no. 7, pp. 2117-2135, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Haifeng Yu et al., “OHIE: Blockchain Scaling Made Simple,” 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 90-105, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Barbara Bigliardi et al., “The Digitalization of Supply Chain: A Review,” Procedia Computer Science, vol. 200, pp. 1806-1815, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Yizhong Liu et al., “A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2276-2291, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Deepa Pavithran et al., “Towards Building a Blockchain Framework for IoT,” Cluster Computing, vol. 23 no. 3, pp. 2089-2103, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] P. Velmurugadass et al., “Enhancing Blockchain Security in Cloud Computing with IoT Environment using ECIES and Cryptography Hash Algorithm,” Materials Today: Proceedings, vol. 37, pp. 2653-2659, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Muhammad Rehan Anwar, Desy Apriani, and Irsa Rizkita Adianita, “Hash Algorithm in Verification of Certificate Data Integrity and Security,” Aptisi Transactions on Technopreneurship (ATT), vol. 3, no. 2, pp. 181-188, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Sachi Nandan Mohanty et al., “An Efficient Lightweight Integrated Blockchain (ELIB) Model for IoT Security and Privacy,” Future Generation Computer Systems, vol. 102, no. 1, pp. 1027-1037, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Basim Aljabhan, and Muath A. Obaidat, “Privacy-Preserving Blockchain Framework for Supply Chain Management: Perceptive Craving Game Search Optimization (PCGSO),” Sustainability, vol. 15, no. 8, pp. 1-23, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Zhi Li, Fuhe Liang, and Henan Hu, “Blockchain-Based and Value-Driven Enterprise Data Governance: A Collaborative Framework,” Sustainability, vol. 15, no. 11, pp. 1-15, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Hui Pang et al., “Smart Farming: An Approach for Disease Detection Implementing IoT and Image Processing,” International Journal of Agricultural and Environmental Information Systems, vol. 12, no. 1, pp. 55-67, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Ahmad Karim, “Development of Secure Internet of Vehicle Things (IoVT) for Smart Transportation System,” Computers and Electrical Engineering, vol. 102, no. 3, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Sushil Kumar Singh, Shailendra Rathore, and Jong Hyuk Park, “Block IoT Intelligence: A Blockchain-Enabled Intelligent IoT Architecture with Artificial Intelligence,” Future Generation Computer Systems, vol. 110, pp. 721-743, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Lelio Campanile et al., “Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymization,” International Conference on Computational Science and its Applications, vol. 12956, pp. 3-14, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Ghadah Aldabbagh et al., “Blockchain for Securing Smart Grids,” International Journal of Computer Science & Network Security, vol. 21, no. 4, pp. 255-263, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Lokesh Yadav et al., Nullifying the Prevalent Threats in IoT Based Applications and Smart Cities Using Blockchain Technology, Low Power Architectures for IoT Applications, pp. 241-261, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Rujuta Shah, and Sridaran Rajagopal, “M-DPS: A Blockchain-Based Efficient and Cost-Effective Architecture for Medical Applications,” International Journal of Information Technology, vol. 14, no. 4, pp. 1909-1921, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Aaliya Sarfaraz, Ripon K. Chakrabortty, and Daryl L. Essam, “The Implications of Blockchain-Coordinated Information Sharing within a Supply Chain: A Simulation Study,” Blockchain: Research and Applications, vol. 4, no. 1, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Xiaoning Qian, and Eleni Papadonikolaki, “Shifting Trust in Construction Supply Chains Through Blockchain Technology,” Engineering, Construction and Architectural Management, vol. 28, no. 2, pp. 584-602, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Candido Diaz et al., “Silk Structure Rather Than Tensile Mechanics Explains Web Performance in the Moth-Specialized Spider, Cyrtarachne,” Journal of Experimental Zoology Part A: Ecological and Integrative Physiology, vol. 329, no. 3, pp. 120-129, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Shunsuke Shigaki et al., “Time-Varying Moth-Inspired Algorithm for Chemical Plume Tracing in Turbulent Environment,” IEEE Robotics and Automation Letters, vol. 3, no. 1, pp. 76-83, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Mahsa Jamshidi Dolatabad et al., “Evaluating Agile Practices in Green Supply Chain Management Using a Fuzzy Multicriteria Approach,” Discrete Dynamics in Nature and Society, vol. 2022, no. 1, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Fabian Brinkmann, and Stefan Weinzierl. “Comparison of Head-Related Transfer Functions Pre-Processing Techniques for Spherical Harmonics Decomposition,” Audio Engineering Society Conference: 2018 AES International Conference on Audio for Virtual and Augmented Reality, Audio Engineering Society, vol. 1, no. 1, pp. 102-116, 2018.
[Google Scholar] [Publisher Link]
[42] Angel Arranz-Gimon et al., “A Review of Total Harmonic Distortion Factors for the Measurement of Harmonic and Interharmonic Pollution in Modern Power Systems,” Energies, vol. 14, no. 20, pp. 1-38, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Ashwin Verma et al., “NYAYA: Blockchain-Based Electronic Law Record Management Scheme for Judicial Investigations,” Journal of Information Security and Applications, vol. 63, no. 1, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Essam H. Houssein et al., “Lévy Flight Distribution: A New Metaheuristic Algorithm for Solving Engineering Optimization Problems,” Engineering Applications of Artificial Intelligence, vol. 94, 2020.
[CrossRef] [Google Scholar] [Publisher Link]