Secure data transmission and authentication scheme using advanced blockchain cryptography approach for protecting financial assets in decentralized third party intranet communication
DOI:
https://doi.org/10.22399/ijcesen.2062Keywords:
security mechanisms, authentication , data transmission , financial assets, blockchainAbstract
As the digital landscape advances, the need for robust security mechanisms in the transmission and authentication of data, particularly in financial sectors, becomes increasingly critical. This progressive data transmission and authentication scheme leveraging advanced blockchain cryptography for the protection of financial assets across decentralized third-party intranet communications. Traditional security methods, widely employed in contemporary systems, have exhibited numerous vulnerabilities leading to security breaches, token mismanagement, and susceptibility to packet injections, culminating in compromised security keys. To resolve this. This paper presents an innovative approach leveraging advanced blockchain cryptography to protect financial assets during inter-party communication. The proposed method begins with the generation of a data block based on a Hash Index Policy (HIP) that systematically enhances data integrity. Then create of Proof Of Key Stack (PoKS) for chain link shuffle status and Private keys are generated with role of access rights. Finally, the Peer End Master Node Authentication (PEMNA) verifies the key authenticity to handover the data to ensure the safety to the access right person. The final authentication process is governed by a peer-end master node, which rigorously verifies key authenticity prior to data handover, ensuring that only authorized individuals can access sensitive information. The proposed system demonstrates superior security performance metrics compared to conventional methods, evidenced by enhancements in cryptographic policy compliance, authentication validity, and key verification processes. The proposed system proves higher security performance as well in Crypto-policy enrich standard, proof of authentication, key validation, verification and higher secured true positives rates to allow permissions to improve the security compared to the tradition methods.
References
[1] Demirkan, S., Demirkan, I., & McKee, A. (2020). Blockchain technology in the future of business cyber security and accounting. Journal of Management Analytics, 7(2), 189–208. https://doi.org/10.1080/23270012.2020.1731721
[2] Amponsah, A. A., Adekoya, A. F., & Weyori, B. A. (2022). Improving the financial security of national health insurance using cloud-based blockchain technology application. International Journal of Information Management Data Insights, 2(1), 100081. https://doi.org/10.1016/j.jjimei.2022.100081
[3] Bhatti, M. G., Shah, R. A., & Chuadhry, M. A. (2022). Impact of blockchain technology in modern banking sector to exterminate the financial scams. Sukkur IBA Journal of Computing and Mathematical Sciences, 6(2), 27–38.
[4] Javaid, M., Haleem, A., Singh, R. P., Suman, R., & Khan, S. (2022). A review of blockchain technology applications for financial services. BenchCouncil Transactions on Benchmarks, Standards and Evaluations, 2(3), 100073. https://doi.org/10.1016/j.tbench.2022.100073
[5] Zhang, L., Xie, Y., Zheng, Y., Xue, W., Zheng, X., & Xu, X. (2020). The challenges and countermeasures of blockchain in finance and economics. Systems Research and Behavioral Science, 37(4), 691–698. https://doi.org/10.1002/sres.2710
[6] Zhang, Z., & Ren, X. (2021). Data security sharing method based on CP-ABE and blockchain. In Proceedings (pp. 2193–2203). [Conference name eksik]
[7] Wei, P., Wang, D., Zhao, Y., Tyagi, S. K. S., & Kumar, N. (2019). Blockchain data-based cloud data integrity protection mechanism. Future Generation Computer Systems, 102, 902–911. https://doi.org/10.1016/j.future.2019.09.028
[8] Zheng, K., et al. (2022). Blockchain technology for enterprise credit information sharing in supply chain finance. Journal of Innovation & Knowledge, 7(4), 100256. https://doi.org/10.1016/j.jik.2022.100256
[9] Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., & Ni, W. (2019). PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security, 88, 101653. https://doi.org/10.1016/j.cose.2019.101653
[10] Hongmei, Z. (2020). A cross-border e-commerce approach based on blockchain technology. Mobile Information Systems, 2021(1), 2006082. https://doi.org/10.1155/2021/2006082
[11] Kumar, A., & Mallick, P. K. (2018). The role of big data and machine learning in secure blockchain-based voting systems. Computer Communications, 136, 495–507.
[12] Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., & Brooks, R. (2016). A brief survey of cryptocurrency systems. In Proceedings of the 14th Annual Conference on Privacy, Security and Trust (pp. 745–752). IEEE.
[13] Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.
[14] Yue, X., Wang, H., Jin, D., Li, M., & Jiang, W. (2016). Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control. Journal of Medical Systems, 40(10), 218. https://doi.org/10.1007/s10916-016-0574-6
[15] Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the Internet of Things. IEEE Access, 4, 2292–2303. https://doi.org/10.1109/ACCESS.2016.2566339
[16] Hassan, S., Islam, S., & Yousafzai, A. (2020). Application of blockchain in banking: A critical review. Journal of Banking and Financial Technology, 4(1), 1–10.
[17] Yli-Huumo, J., Ko, D., Choi, S., Park, S., & Smolander, K. (2016). Where is current research on blockchain technology?—A systematic review. PloS One, 11(10), e0163477.
[18] Iansiti, M., & Lakhani, K. R. (2017). The truth about blockchain. Harvard Business Review, 95(1), 118–127.
[19] Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017). Blockchain. Business & Information Systems Engineering, 59, 183–187. https://doi.org/10.1007/s12599-017-0467-3
[20] Casino, F., Dasaklis, T. K., & Patsakis, C. (2019). A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics and Informatics, 36, 55–81. https://doi.org/10.1016/j.tele.2018.11.006
[21] Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: How the technology behind bitcoin is changing money, business, and the world. Penguin.
[22] Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf
[23] Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation Review, 2, 6–10.
[24] Pilkington, M. (2016). Blockchain technology: Principles and applications. In Research handbook on digital transformations (pp. 225–253). Edward Elgar.
[25] Underwood, S. (2016). Blockchain beyond bitcoin. Communications of the ACM, 59(11), 15–17.
[26] Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE International Congress on Big Data (pp. 557–564). IEEE.
[27] Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of Economic Perspectives, 29(2), 213–238.
[28] Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2020). A survey on the security of blockchain systems. Future Generation Computer Systems, 107, 841–853.
[29] Al-Bassam, M. (2018). SCPKI: A smart contract-based PKI for Ethereum. In Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security (pp. 35–47). ACM.
[30] Conti, M., Kumar, S., Lal, C., & Ruj, S. (2018). A survey on security and privacy issues of blockchain technology. IEEE Communications Surveys & Tutorials, 21(2), 1–24.
[31] Wang, W., Hoang, D. T., Xiong, Z., Niyato, D., Wang, P., Hu, P., & Wen, Y. (2019). A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access, 7, 22328–22370.
[32] Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., & Wang, F. Y. (2019). Blockchain-enabled smart contracts: Architecture, applications, and future trends. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49(11), 2266–2277.
[33] Mohanta, B. K., Jena, D., Panda, S. S., & Sobhanayak, S. (2019). Blockchain technology: A survey on applications and challenges. Computers & Electrical Engineering, 76, 394–406.
[34] Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M. (2018). On blockchain and its integration with IoT. Future Generation Computer Systems, 88, 173–190.
[35] Lin, I. C., & Liao, T. C. (2017). A survey of blockchain security issues and challenges. International Journal of Network Security, 19(5), 653–659.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.