An Innovative Cryptography Safety Algorithm Called S-RSB-23 for Protecting Data Using Machine Learning Algorithm

Authors

  • C. Bagath Basha Department of CSE, Kommuri Pratap Reddy Institute of Technology, Autonomous, Hyderabad, Telangana, India.
  • S. Rajaprakash Department of CSE, Aarupadai Veedu Institute of Technology (AVIT),VMRF, Chennai, Tamil Nadu, India
  • Nitisha Aggarwal Panipat Institute of Engineering and Technology, Samalkha, Haryana.
  • MD Riyazuddin Department. of Information Technology, Anurag University, Hyderabad, Telangana, India.
  • Mohd Sirajuddin Department of Information Technology, Vidya Jyothi Institute of Technology, Hyderabad, Telangana, India.
  • Srihari Babu Gole Department of Information Technology, Anurag University, Hyderabad, Telangana, India.

Keywords:

Data, Twitter, MLA, SALSA, S-RSB-23

Abstract

The modern world is dependent on information as a result of the fact that information is most compelling when presented in an open setting. The only judgements that could be made with this data concerned people's lives and the global financial market and were either good or negative. We need to be able to store, analyse, and organise the ever-increasing quantity of data that we are collecting on a daily basis since it will only continue to rise. These Twitter data will be analysed using Machine Learning Algorithms (MLA), which will also download them for further study. This data analysis does not provide dependable cryptographic techniques. In this study, we present the quick encryption technique S-RSB-23 and show how to transform the ASCII code to the corresponding hexadecimal value using this approach. The cells in this transformed code have been paired and then swapped. In comparison to the SALSA technique, the S-RSB-23 approach offers a much improved level of encryption throughput.

Downloads

Download data is not yet available.

References

M. Coutinho, R. T. De Sousa and F. Borges, "Continuous Diffusion Analysis," in IEEE Access, vol. 8, pp. 123735-123745, 2020, doi: 10.1109/ACCESS.2020.3005504. [1main]

L. E. Kane, J. J. Chen, R. Thomas, V. Liu and M. Mckague, "Security and Performance in IoT: A Balancing Act," in IEEE Access, vol. 8, pp. 121969-121986, 2020, doi: 10.1109/ACCESS.2020.3007536.[2main]

D. Jung, J. Shin, C. Lee, K. Kwon and J. T. Seo, "Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology," in IEEE Access, vol. 11, pp. 15229-15241, 2023, doi: 10.1109/ACCESS.2023.3244991.

F. Ö. Sönmez and B. G. Kiliç, "Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results," in IEEE Access, vol. 9, pp. 25858-25884, 2021, doi: 10.1109/ACCESS.2021.3057044.

S. An, A. Leung, J. B. Hong, T. Eom and J. S. Park, "Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security," in IEEE Access, vol. 10, pp. 75117-75134, 2022, doi: 10.1109/ACCESS.2022.3190545.

N. Sun et al., "Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges," in IEEE Access, vol. 10, pp. 44756-44777, 2022, doi: 10.1109/ACCESS.2022.3168716.

N. M. Karie, N. M. Sahri, W. Yang, C. Valli and V. R. Kebande, "A Review of Security Standards and Frameworks for IoT-Based Smart Environments," in IEEE Access, vol. 9, pp. 121975-121995, 2021, doi: 10.1109/ACCESS.2021.3109886.

J. Xiao, B. Zhang and F. Luo, "Distribution Network Security Situation Awareness Method Based on Security Distance," in IEEE Access, vol. 7, pp. 37855-37864, 2019, doi: 10.1109/ACCESS.2019.2906779.

X. He, J. Liu, C. -T. Huang, D. Wang and B. Meng, "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology," in IEEE Access, vol. 7, pp. 131050-131067, 2019, doi: 10.1109/ACCESS.2019.2940512.

H. Zhang, P. Li, Z. Du and W. Dou, "Risk Entropy Modeling of Surveillance Camera for Public Security Application," in IEEE Access, vol. 8, pp. 45343-45355, 2020, doi: 10.1109/ ACCESS. 2020.2978247.

C. Choi and J. Choi, "Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service," in IEEE Access, vol. 7, pp. 110510-110517, 2019, doi: 10.1109/ACCESS.2019.2933859.

J. Son, J. Choi and H. Yoon, "New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants," in IEEE Access, vol. 7, pp. 78379-78390, 2019, doi: 10.1109/ACCESS.2019.2922335.

S. Siboni et al., "Security Testbed for Internet-of-Things Devices," in IEEE Transactions on Reliability, vol. 68, no. 1, pp. 23-44, March 2019, doi: 10.1109/TR.2018.2864536.

M. Afhamisis and M. R. Palattella, "SALSA: A Scheduling Algorithm for LoRa to LEO Satellites," in IEEE Access, vol. 10, pp. 11608-11615, 2022, doi: 10.1109/ACCESS.2022.3146021.

Batcha, B.B.C., Singaravelu, R., Ramachandran, M. et al., “A Novel Security Algorithm RPBB31 for Securing the Social Media Analyzed Data using Machine Learning Algorithms”, Wireless Pers. Commun., 2023, doi: https://doi.org/10.1007/s11277-023-10446-9

Bagath Basha C and Rajapraksh S, “Enhancing The Security Using SRB18 Method of Embedding Computing”, Microprocessor and Microsystems, 2020.

Bagath Basha C and Somasundaram K., “A Comparative Study of Twitter Sentiment Analysis Using Machine Learning Algorithms in Big Data”, International Journal of Recent Technology and Engineering, pp. 591-599, 2019.

K Shantha shalini and M Nithya published a paper entitled, “A survey on adoption of blockchain in healthcare” in the International Journal of Business Intelligence and Data Mining (ISSN 1743-8195) on November 2022, Vol. 22, No. 1/2, 2023.

K Shantha shalini and M Nithya published a paper entitled, “An Integrated approach of Block chain Technology with Machine learning and Cloud computing for handling healthcare data” in the International Journal of Health Sciences (ISSN 2550-6978) on May 2022,Special Issue-I.

K Shantha shalini and M Nithya published a paper entitled “Block chain Based Healthcare System to Ensure Data Integrity and Security in Computing Environments” in the Journal of Green Engineering (ISSN: 2245-4586) on November 2020, Volume-10, Issue-11.

Yaseen, M., Hayder Sabah Salih, Mohammad Aljanabi, Ahmed Hussein Ali, & Saad Abas Abed. (2023). Improving Process Efficiency in Iraqi universities: a proposed management information system. Iraqi Journal For Computer Science and Mathematics, 4(1), 211–219. https://doi.org/10.52866/ijcsm.2023.01.01.0020

Aljanabi, M. ., & Sahar Yousif Mohammed. (2023). Metaverse: open possibilities. Iraqi Journal For Computer Science and Mathematics, 4(3), 79–86. https://doi.org/10.52866/ijcsm.2023.02.03.007

Atheel Sabih Shaker, Omar F. Youssif, Mohammad Aljanabi, ABBOOD, Z., & Mahdi S. Mahdi. (2023). SEEK Mobility Adaptive Protocol Destination Seeker Media Access Control Protocol for Mobile WSNs. Iraqi Journal For Computer Science and Mathematics, 4(1), 130–145. https://doi.org/10.52866/ijcsm.2023.01.01.0011

Hayder Sabah Salih, Mohanad Ghazi, & Aljanabi, M. . (2023). Implementing an Automated Inventory Management System for Small and Medium-sized Enterprises. Iraqi Journal For Computer Science and Mathematics, 4(2), 238–244. https://doi.org/10.52866/ijcsm.2023.02.02.021

Hemanand, D., Reddy, G. ., Babu, S. S. ., Balmuri, K. R. ., Chitra, T., & Gopalakrishnan, S. (2022). An Intelligent Intrusion Detection and Classification System using CSGO-LSVM Model for Wireless Sensor Networks (WSNs). International Journal of Intelligent Systems and Applications in Engineering, 10(3), 285–293. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2167

Naga Swetha, G. ., & M. Sandi, A. . (2023). A Brand-New, Area - Efficient Architecture for the FFT Algorithm Designed for Implementation of FPGAs. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2), 114–122. https://doi.org/10.17762/ijritcc.v11i2.6135

Isabella Rossi, Reinforcement Learning for Resource Allocation in Cloud Computing , Machine Learning Applications Conference Proceedings, Vol 1 2021.

Downloads

Published

27.10.2023

How to Cite

Basha, C. B. ., Rajaprakash, S. ., Aggarwal, N. ., Riyazuddin, M. ., Sirajuddin, M. ., & Gole, S. B. . (2023). An Innovative Cryptography Safety Algorithm Called S-RSB-23 for Protecting Data Using Machine Learning Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 12(2s), 503–510. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3650

Issue

Section

Research Article