Fraudulent and censorship issues, ECC techniques (ECDSA and ECDH), SHA 256 Hashing Technique. Text mining
Abstract
The original material in the content has become exceedingly challenging because of the data's rapid daily expansion. Social media is quite helpful in providing us with timely information. As individuals become more accustomed to using social media and gathering their news from a variety of sources, fake news can occasionally have a significant negative impact on people's daily lives. Blockchain technology facilitates access to accurate information in a number of industries, including the banking, fashion, food, and supply chain industries. The previously mentioned sector can benefit from the technology being enhanced by blockchain's broadcast and transparent nature, which also makes it easier to spot breaking news in the moment. We provided a thorough overview of the blockchain technology approaches and techniques utilised frequently in false news detection in this study. This method can be acquired by merging and altering the blockchain method using the Text Mining (TM) algorithm. To perform quick and secure digital signatures and key sharing using ECDSA and ECDH, respectively, the system in this project uses an ECC technique in line with recent developments in cryptography and WEB3 Technology. Additionally, while utilising SHA256 as a hashing method to ensure the integrity of the blockchain The study paper mentioned above discusses a succinct research methodology on blockchain technology . It is a result of testing data that unambiguously defines and illustrates the significance of the blockchain methodology in the implementation technique. The paper's principal objective in this case is to locate a security system ledger.
Article Details
Unique Paper ID: 160927
Publication Volume & Issue: Volume 10, Issue 2
Page(s): 74 - 79
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024