Block Chain Based Fine Grained Data Sharing For Multiple Group

Authors

  • Sejal S. Dhamgaye  Department of Computer Science & Engineering, J. D. College of Engineering and Management, Nagpur, Maharashtra, India
  • Supriya Sawwashere  Department of Computer Science & Engineering, J. D. College of Engineering and Management, Nagpur, Maharashtra, India
  • Dr. Shrikant V. Sonekar  Department of Computer Science & Engineering, J. D. College of Engineering and Management, Nagpur, Maharashtra, India
  • Mirza Moiz Baig  Department of Computer Science & Engineering, J. D. College of Engineering and Management, Nagpur, Maharashtra, India

Keywords:

Blockchain, Secure Data Sharing, Technology Acceptance Model, Technology Readiness Index

Abstract

It is essential for the various intelligence community to share their data in order to consolidate their data analysis, which will provide support for the decision-making process and help maintain national security. If an internet platform for secure data sharing is provided, data sharing within an intelligence community may become more viable. However, because to concerns regarding confidentiality and the possibility of the data being accessed by unauthorised users or stolen by attackers, it might be difficult to exchange data between different parties. As a result, the study suggests an encrypted data-sharing model for the intelligence community that is built on blockchain technology. This study provides a comprehensive analysis of the mechanism, rules, and policies that are associated with it. Using the technology readiness and acceptability model, we determined whether or not there was an intention to deploy this model based on the suggested model (TRAM). This research investigated the connections between the Technology Acceptance Model and the four characteristics of technological preparedness—optimism, innovativeness, discomfort, and insecurity (TAM). According to the findings, personality characteristics and feelings have the potential to impact the adoption process as well as the intention to utilise a data-sharing model that is based on blockchain technology for system integration inside the intelligence community. This study provided conclusive evidence that blockchain technology may be utilised in a data-sharing model that is tailored to the requirements of the intelligence community on the basis of the selected dimension.

References

  1. A. Ouaddah, A. A. Elkalam, and A. A. Ouahman, “FairAccess : a new Blockchain-based access control framework for the Internet of Things,” no. February, pp. 5943–5964, 2017, doi: 10.1002/sec.1748.
  2. X. Xu et al., “A Taxonomy of Blockchain-Based Systems for Architecture Design,” 2017 IEEE Int. Conf. Softw. Archit., pp. 243–252, 2017, doi: 10.1109/ICSA.2017.33.
  3. ODNI,            “Members      of          the         IC.” http://www.odni.gov/index.php/intelligence- community/members-of-the-ic (accessed May 04, 2020).
  4. W. N. Wan Muhamad et al., “Enhance multi-factor authentication model for intelligence community access to critical surveillance data,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, vol. 11870 LNCS, pp. 560–569, doi: 10.1007/978-3-030-34032-2_49.
  5. Daniel R. Coats, “The National Intelligence Strategy of the United States of America,” 2019. doi: 10.1515/9783110212495.2.121.
  6. S. N. Q. S. Mohamed and M. Yaacob, “Understanding the Intelligence Failure and Information Sharing in Handling Terrorism among Intelligence Community,” Int. J. Acad. Res. Bus. Soc. Sci., vol. 9, no. 9, pp. 1201–1213, 2019, doi: 10.6007/ijarbss/v9-i9/6414.
  7. J. Schmid, “Technology and the Intelligence Community,” in Advanced Sciences and Technologies for Security Applications, 2018, pp. 39–53.
  8. W. J. Lahneman, “Knowledge-sharing in the intelligence community after 9/11,” Int. J. Intell. CounterIntelligence, vol. 17, no. 4, pp. 614–633, 2004, doi: 10.1080/08850600490496425.
  9. J. W. Crampton, “Collect it all: national security, Big Data and governance,” GeoJournal, vol. 80, no. 4, pp. 519–531, 2015, doi: 10.1007/s10708-014-9598-y.
  10. S. S. De Matas and B. P. Keegan, “An exploration of research information security data affecting organizational compliance,” Data Br., vol. 21, pp. 1864–1871, 2018, doi: 10.1016/j.dib.2018.11.002.
  11. N. Kshetri, “Big data ׳s impact on privacy, security and consumer welfare,” Telecomm. Policy, vol. 38, no. 11, pp. 1134–1145, Dec. 2014, doi: 10.1016/j.telpol.2014.10.002.
  12. E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, and V. Sassone, “Blockchain-based database to ensure data integrity in cloud computing environments,” in CEUR Workshop Proceedings, 2017, vol. 1816, pp. 146–155.
  13. C. Lin, D. He, X. Huang, K. R. Choo, and A. V Vasilakos, “BSeIn : A blockchain-based secure mutual authentication with fi ne-grained access control system for industry 4 . 0 ☆,” J. Netw. Comput. Appl., vol. 116, no. March, pp. 42–52, 2018, doi: 10.1016/j.jnca.2018.05.005.
  14. P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, “Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things,” J. Cyber Secur. Mobil., vol. 1, pp. 309–348, 2013.
  15. O. Alphand et al., “IoTChain : A Blockchain Security Architecture for the Internet of Things,” 2018 IEEE Wirel. Commun. Netw. Conf., pp. 1–6, 2018.
  16. M. Räsänen and J. M. Nyce, “The Raw is Cooked: Data in Intelligence Practice,” Sci. Technol. Hum. Values, vol. 38, no. 5, pp. 655–677, 2013, doi: 10.1177/0162243913480049.
  17. N. Abdullah and A. Håkansson, “Blockchain based Approach to Enhance Big Data Authentication in Distributed Environment,” pp. 887–892, 2017.
  18. A. McAbee, M. Tummala, and J. McEachen, “Military Intelligence Applications for Blockchain Technology,” Proc. 52nd Hawaii Int. Conf. Syst. Sci., 2019, doi: 10.24251/hicss.2019.726.
  19. T. J. Willink, “On blockchain technology and its potential application in tactical networks,” Def. Res. Dev. Canada, no. April, 2018.
  20. A. Sudhan and M. J. Nene, “Employability of blockchain technology in defence applications,” in 2017 International Conference on Intelligent Sustainable Systems (ICISS), 2017, pp. 630–637.
  21. R. Akter, S. Bhardwaj, J. M. Lee, and D.-S. Kim, “Highly Secured C3I Communication Network Based on Blockchain Technology for Military System,” 2019 Int. Conf. Inf. Commun. Technol. Converg., pp. 780–783, 2020, doi: 10.1109/ictc46691.2019.8939813.
  22. W. Zhang et al., “Blockchain-Based Distributed Compliance in Multinational Corporations’ Cross-Border Intercompany Transactions,” in Future of Information and Communication Conference (FICC), 2019, no. July, pp. 304–320, doi: 10.1007/978-3-030-03405-4_20.
  23. C. Ngubo, M. Dohler, and P. Mcburney, “Blockchain, IoT and sidechains,” in Lecture Notes in Engineering and Computer Science, Proceedings of the International MultiConference of Engineers and Computer Scientists 2019 (IMECS 2019), 2019, vol. 2239, pp. 136–140.
  24. R. Beck, J. S. Czepluch, N. Lollike, and S. Malone, “Blockchain The Gateway to Trust-free Cyrptographic Transactions,” Twenty-Fourth Eur. Conf. Inf. Syst. (ECIS), İstanbul,Turkey, vol. 6, no. May, pp. 4013–4027, 2016.
  25. J. P. Es-Samaali, H., Outchakoucht, A., & Leroy, “A Blockchain- based Access Control for Big Data,” J. Comput. Networks Commun. Secur. Internet Things J., vol. 5, no. 7, p. 137, 2017, doi: 10.1109/JIOT.2018.2812239.

Downloads

Published

2022-06-30

Issue

Section

Research Articles

How to Cite

[1]
Sejal S. Dhamgaye, Supriya Sawwashere, Dr. Shrikant V. Sonekar, Mirza Moiz Baig, " Block Chain Based Fine Grained Data Sharing For Multiple Group, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 3, pp.520-533, May-June-2022.