A Data Preservation Method Based on Blockchain for Digital Sensitive Text Integrity

Zineb Touati-Hamad, Mohamed Ridda Laouar, Issam Bendib
{"title":"A Data Preservation Method Based on Blockchain for Digital Sensitive Text Integrity","authors":"Zineb Touati-Hamad, Mohamed Ridda Laouar, Issam Bendib","doi":"10.1109/ICISAT54145.2021.9678467","DOIUrl":null,"url":null,"abstract":"Since the popularity of digital data sharing has grown, data authentication and integrity have received increased attention, and data preservation technology has evolved to suit the demands of the times. However, the current models and techniques for data preservation are simply a mixture of encryption technology. The process of applying these techniques in data authentication requires the participation of the human factor as a third party, which may lead to the risk of data tampering, attacks, and cracks. Recently, Blockchain technology has occupied the place of the most disruptive technological innovation. Blockchain is based on the concept of decentralizing administration, so instead of having a single authoritative source, the system will have a plethora of records that hold the truth. Whenever a change is required or introduced, all records will need to be updated with the new information after being validated. This one-of-a-kind approach prevents the possibility of adding new information to a single record because there are so many to check to see whether it is correct. If we take the most sensitive text as a case study, then the Holy Quran represents the main reference for authenticity and integrity. However, attacks directed at the digital type of this text have witnessed a continuous increase due to the ease and speed of publishing and sharing verses and surahs and the lack of monitoring and confirmation bodies. To solve the present problem, we introduce a blockchain-based Ayat/Surah preservation model. Through the decentralization and smart contract features of the blockchain, tokens can be maintained automatically without human participation to form a guarding sub-chain in the state unit, and the blockchain has a good performance in combating attacks, which is called the 51% attack. Meanwhile, to solve the problem of data confusion and query difficulty caused by an excessive number of cases, the union of cryptography, hashes, and timestamps is used to form a concatenated master string for preservation. Due to the problem of the repetition of some verses of the Quran in some surahs and the need to absolutely guarantee the sequence of verses, the Merkle tree feature for segmentation is used to calculate the segmentation of the verses of each surah. In this way, memorizing verses becomes an automatic process that allows the Holy Quran to withstand the tests of distortion and distortion. On the other side, it gives us the ability to verify the authenticity and integrity of the Quranic texts scattered on websites and applications.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISAT54145.2021.9678467","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Since the popularity of digital data sharing has grown, data authentication and integrity have received increased attention, and data preservation technology has evolved to suit the demands of the times. However, the current models and techniques for data preservation are simply a mixture of encryption technology. The process of applying these techniques in data authentication requires the participation of the human factor as a third party, which may lead to the risk of data tampering, attacks, and cracks. Recently, Blockchain technology has occupied the place of the most disruptive technological innovation. Blockchain is based on the concept of decentralizing administration, so instead of having a single authoritative source, the system will have a plethora of records that hold the truth. Whenever a change is required or introduced, all records will need to be updated with the new information after being validated. This one-of-a-kind approach prevents the possibility of adding new information to a single record because there are so many to check to see whether it is correct. If we take the most sensitive text as a case study, then the Holy Quran represents the main reference for authenticity and integrity. However, attacks directed at the digital type of this text have witnessed a continuous increase due to the ease and speed of publishing and sharing verses and surahs and the lack of monitoring and confirmation bodies. To solve the present problem, we introduce a blockchain-based Ayat/Surah preservation model. Through the decentralization and smart contract features of the blockchain, tokens can be maintained automatically without human participation to form a guarding sub-chain in the state unit, and the blockchain has a good performance in combating attacks, which is called the 51% attack. Meanwhile, to solve the problem of data confusion and query difficulty caused by an excessive number of cases, the union of cryptography, hashes, and timestamps is used to form a concatenated master string for preservation. Due to the problem of the repetition of some verses of the Quran in some surahs and the need to absolutely guarantee the sequence of verses, the Merkle tree feature for segmentation is used to calculate the segmentation of the verses of each surah. In this way, memorizing verses becomes an automatic process that allows the Holy Quran to withstand the tests of distortion and distortion. On the other side, it gives us the ability to verify the authenticity and integrity of the Quranic texts scattered on websites and applications.
一种基于区块链的数字敏感文本完整性数据保存方法
随着数字数据共享的日益普及,数据的认证和完整性受到越来越多的关注,数据保存技术也随着时代的要求而不断发展。然而,目前的数据保存模型和技术只是加密技术的混合。在数据身份验证中应用这些技术的过程需要人为因素作为第三方的参与,这可能导致数据篡改、攻击和破解的风险。近年来,区块链技术已经占据了最具颠覆性的技术创新的位置。区块链基于分散管理的概念,因此该系统将拥有大量记录,而不是单一的权威来源。每当需要更改或引入更改时,所有记录都需要在验证后使用新信息进行更新。这种独一无二的方法防止了向单个记录添加新信息的可能性,因为有太多的信息需要检查以确定它是否正确。如果我们以最敏感的文本作为案例研究,那么神圣的古兰经代表了真实性和完整性的主要参考。然而,由于出版和分享经文的便利性和速度以及缺乏监督和确认机构,针对这种文本的数字类型的攻击不断增加。为了解决目前的问题,我们引入了一个基于区块链的Ayat/Surah保存模型。通过区块链的去中心化和智能合约特性,可以在没有人参与的情况下自动维护代币,在状态单元中形成一个守护子链,并且区块链在对抗攻击方面有很好的表现,这种攻击被称为51%攻击。同时,为了解决案例过多造成的数据混乱和查询困难的问题,采用密码学、哈希和时间戳的联合,形成一个连接的主字符串进行保存。由于《古兰经》的某些章节在某些章节中存在重复的问题,需要绝对保证章节的顺序,因此使用分割的Merkle树特征来计算每个章节的章节分割。这样,背诵经文就变成了一个自动的过程,使《古兰经》经受住了歪曲和歪曲的考验。另一方面,它使我们能够验证散布在网站和应用程序上的古兰经文本的真实性和完整性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信