Artificial Bee Colony Optimization with Hybrid Image Encryption with Random Key Driven Share Creation Scheme for Blockchain-Assisted Question Paper Sharing

International Journal of Electrical and Electronics Engineering
© 2023 by SSRG - IJEEE Journal
Volume 10 Issue 4
Year of Publication : 2023
Authors : B. Nagarajan, C. Ananth, N. Mohananthini
pdf
How to Cite?

B. Nagarajan, C. Ananth, N. Mohananthini, "Artificial Bee Colony Optimization with Hybrid Image Encryption with Random Key Driven Share Creation Scheme for Blockchain-Assisted Question Paper Sharing," SSRG International Journal of Electrical and Electronics Engineering, vol. 10,  no. 4, pp. 131-140, 2023. Crossref, https://doi.org/10.14445/23488379/IJEEE-V10I4P113

Abstract:

Educational tests and examinations cover massive data sharing to distribute question papers, aptitude tests, answer sheets, and quizzes for new admissions. Question Paper Leaking (QPL) can cause an unreasonable issue during exams. Today, QPL was a severe problem worldwide, from university entrance exams to public exams, and the situation is getting worse in emerging countries. QPL can cause specific rigorous results such as erosion of ethical standards and the education quality being compromised. There is a need for the security of e-learning mechanisms through cryptographic techniques. Blockchain (BC) fulfilled educational valuations and personalized curricula with smart contracts over a public permission BC. It exhibits the potential of this developing technology to enhance various core learning experiences, such as learner privacy, assessments, and curriculum personalization. This study presents an Artificial Bee Colony Optimization with Hybrid Image Encryption with Random Key Driven Share Creation Scheme for Blockchain Assisted Question Paper Sharing (ABCHIE-RKDSC) technique. In the presented ABCHIE-RKDSC model, three main procedures are involved, called share creation, share encryption, and BC-enabled transmission. During the process of share creation, a set of four shares is created for every input image and the random key generation method is performed by a user input equation instead of a conventional random seed function. Next, the generated shares undergo encryption by hybrid Advanced Encryption Standard with the Elliptic Curve Cryptography (AES-ECC) method. Moreover, the key generation process of the AES-ECC method is performed by the use of the ABC algorithm. The proposed ABCHIE-RKDSC technique involves BC technology that enables secure transmission of encrypted QPs. Finally, the share reconstruction and image decryption process take place to retrieve the original QPs. The experimental validation of the ABCHIE-RKDSC algorithm is investigated, and the outputs are evaluated under varied measures. A comprehensive result investigation highlighted the advancement of the ABCHIE-RKDSC method over other methods.

Keywords:

Blockchain, Question paper leakage, Image encryption, Optimal key generation, Share creation.

References:

[1] Fausto Neri da Silva Vanin et al., “A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach,” Sensors, vol. 23, no. 1, p. 14, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Bannishikha Banerjee et al., “Digital Image Encryption Using Double Crossover Approach for SARS-Cov-2 Infected Lungs in a Blockchain Framework,” Frontiers in Blockchain, vol. 4, p. 771241.
[CrossRef] [Google Scholar] [Publisher Link]
[3] C. Edward Jaya Singh, and C. Adline Sunitha, “Chaotic and Paillier Secure Image Data Sharing Based on Blockchain and Cloud Security,” Expert Systems with Applications, vol. 198, p. 116874, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] E. Sweetline Priya, R. Priya, and R. Surendiran, "Implementation of Trust-Based Blood Donation and Transfusion System Using Blockchain Technology," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 104-117, 2022.
[CrossRef] [Publisher Link]
[5] Randhir Kumar et al., “A Secured Distributed Detection System Based on IPFS and Blockchain for Industrial Image and Video Data Security,” Journal of Parallel and Distributed Computing, vol. 152, pp. 128-143.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Taehyoung Kim, Im Y. Jung, and Yih-Chun Hu, “Automatic, Location-Privacy Preserving Dashcam Video Sharing Using Blockchain and Deep Learning,” Human-Centric Computing and Information Sciences, vol. 10, no. 1, pp.1-23, 2001.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Jhanavi J, and Dr.M.Dakshayini, "Blockchain Implementation for Storage," SSRG International Journal of Mobile Computing and Application, vol. 5, no. 2, pp. 9-12, 2018.
[CrossRef] [Publisher Link]
[8] Zhaofeng Ma et al., “Fully Homomorphic Encryption-Based Privacy-Preserving Scheme for Cross Edge Blockchain Network,” Journal of Systems Architecture, vol. 134, p.102782.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Widiwidayat, I., and Köppen, M., “Blockchain Simulation Environment on Multi-Image Encryption for Smart Farming Application,” International Conference on Intelligent Networking and Collaborative Systems, pp. 316-326, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] M. Amirthalingam, and R. Ponnusamy, "Intelligent Wireless Endoscopic Image Classification Using Gannet Optimization with Deep Learning Model," SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 3, pp. 104-113, 2023.
[CrossRef] [Publisher Link]
[11] M. Sunitha, and G. Mary Valantina, "Fowlkes-Mallows Correlated Cohen Kappa Coefficient Block Matching Based Multi-Layer Perceptron Classification for Motion Estimation in VLSI," SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 2, pp. 102-109, 2023.
[CrossRef] [Publisher Link]
[12] L. Srinivasan et al., "IoT-Based Solution for Paraplegic Sufferer to Send Signals to Physician Via Internet," SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 1, pp. 41-52, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Kunpeng Wang et al., “Formation Optimization of Blockchain-Assisted Swarm Robotics Systems Against Failures Based on Energy Balance,” Simulation Modelling Practice and Theory, vol. 120, p. 102599.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Muhammad Mateen Yaqoob et al, “Modified Artificial Bee Colony Based Feature Optimized Federated Learning for Heart Disease Diagnosis in Healthcare,” Applied Sciences, vol. 12, no. 3, p. 12080, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[15] M. Selvavathi, and S.Edwin Raja, "Anticipation of Vulnerable Attacks in Vanet Using Blockchain Technique," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 1, pp. 19-23, 2021.
[CrossRef] [Publisher Link]
[16] Fadwa Alrowais et al., "Cyber Attack Detection in Healthcare Data Using Cyber-Physical System With Optimized Algorithm,” Computers and Electrical Engineering, vol. 108, p. 108636.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Muhammad Mateen Yaqoob, “Hybrid Classifier-Based Federated Learning in Health Service Providers for Cardiovascular Disease Prediction,” Applied Sciences, vol. 13, no. 3, p.1911.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Mohammad Babar et al., “Intelligent Computation Offloading for IoT Applications in Scalable Edge Computing Using Artificial Bee Colony Optimization,” Complexity, vol. 2021, pp.1-12, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Cheng Ting Tsai, and Ja Ling Wu “A Blockchain-Based Fair and Transparent Homework Grading System for Online Education,” Principles and Practice of Blockchains, pp. 303-326, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Ashutosh Dhar Dwivedi et al., “Tracing the Source of Fake News Using a Scalable Blockchain Distributed Network,” 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 38-43, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Shyamala G et al, "Home Automation Security Using Blockchain," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 7, pp. 63-68, 2020.
[CrossRef] [Publisher Link]
[22] Sachi Nandan Mohanty et al., “An Efficient Lightweight Integrated Blockchain (ELIB) Model for Iot Security and Privacy,” Future Generation Computer Systems, vol. 102, pp. 1027-1037, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Monther Tarawneh et al., “Secure Exam Storage Using RSA Public Key Encryption,”
[CrossRef] [Google Scholar] [Publisher Link]
[24] Jeonghun Cha et al., “Blockchain-Empowered Cloud Architecture Based on Secret Sharing for Smart City,” Journal of Information Security and Applications, vol. 57, p. 102686, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Rishabh Mehta et al., “Decentralized Image Sharing and Copyright Protection Using Blockchain and Perceptual Hashes,” 2019 11th International Conference on Communication Systems & Networks (COMSNETS), pp. 1-6, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Minu, M., and R. Aroul Canessane, “Secure Image Transmission Scheme in Unmanned Aerial Vehicles Using Multiple Share Creation with Optimal Elliptic Curve Cryptography,” Indian Journal of Computer Science and Engineering, vol. 12, no. 1, pp.129-134, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Mansi Bosamia, and Dharmendra Patel, "An Experiment of a Parallel Entry Security Testing Approach Using Ethereum Blockchain," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 295-304, 2022.
[CrossRef] [Publisher Link]
[28] Saba Rehman et al., “Hybrid AES-ECC Model for the Security of Data Over Cloud Storage,” Electronics, vol. 10, no. 21, p. 2673, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Dr. I. Jeena Jacob, and Dr. P. Ebby Darney, “Artificial Bee Colony Optimization Algorithm for Enhancing Routing in Wireless Networks,” Journal of Artificial Intelligence, vol. 3, no. 1, pp. 62-71, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[30] YongJoo Lee, Keon Myung Lee, and Sang Ho Lee, “Blockchain-Based Reputation Management for Custom Manufacturing Service in the Peer-to-Peer Networking Environment,” Peer-to-Peer Networking and Applications, vol. 13, no. 2, pp. 671-683, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[31]Mohananthini, N., and Yamuna, G., “Watermarking for Images Using Wavelet Domain in Back-Propagation Neural Network,” IEEE-International Conference on Advances in Engineering, Science and Management (ICAESM -2012), pp. 100-105, 2012.
[Google Scholar] [Publisher Link]