International Journal of Artificial Intelligence and Education Technology

Journal DOI

https://doi.org/10.54216/IJAIET

Submit Your Paper

2835-2432ISSN (Online)

Volume 1 , Issue 1 , PP: 25-40, 2022 | Cite this article as | XML | Html | PDF | Full Length Article

Proposed Architecture Diagrams for developing an electronic system based on block chain technology to secure confidential data in university

Samia Ahmed Elsayed abou Elwafa 1 * , Elsaeed Elsaeed Mohamed Abd El-razk 2 , Samir Aboul Fotouh Saleh 3 , Safaa M. Elatawy 4

  • 1 Faculty of Specific Education, Damietta University, Egypt - (samiaahmed1123456@gmail.com )
  • 2 Faculty of Specific Education, Damietta University, Egypt - (Dr_elsaeed2004@hotmail.com )
  • 3 Professor of Accounting and Information Systems, Mansoura University College of Business - (Prof_samir@hotmail.com)
  • 4 Faculty of Specific Education, Damietta University, Egypt - (zizoabdo1210@gmail.com)
  • Doi: https://doi.org/10.54216/IJAIET.010103

    Received: February 20, 2022 Accepted: May 20, 2022
    Abstract

    The current system inside Egyptian universities s relies on the minimum and traditional methods of securing data that do not keep pace with the current digital development. Therefore, the education sector needs to take advantage of the advantages of block chain technology in securing and encrypting data from the risks of hacking and leakage of records. Through the above, an electronic system for generating a data encryption key based on block chain technology and the AES algorithm has been proposed.

    Keywords :

    Blockchain technology, Encryption Algorithm, (AES) algorithm

    References

    [1] https://www.nap.edu/read/9601/chapter/7

    [2] Columbus L. Gartner hype cycle for emerging technologies, 2016 Adds blockchain & machine learning for

    firsttime[OL]. <http: // www. forbes. com/ sites /louiscolumbus /2016/08/21/ gartner- hype- cycleforemerging- technologies-2016-adds-blockchain

    [3] T.J. Gopane, “Blockchain Technology and Smart Universities,” Proceedings of 4th International Conference

    on the Internet Cyber Security and Information Systems

    [4]DaemenJ,RijmenV.ThedesignofRijndael:AEStheadvancedencryptionstandard.SpringerScience&BusinessMed

    ia;2013

    [5]BouillaguetC,DerbezP,FouquePA.Automaticsearchofattacksonround reducedAESandapplications.In:AnnualCryptologyConference.Springer;2011.p.169–187. [6]FazackerleyS,McAvoySM,LawrenceR.GPUacceleratedAES CBCfordatabaseapplications.In:Proceedingsofthe27thAnnualACMSymposiumonAppliedComputing.ACM;2012. p.873–878 . [7] Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. R., & Zhang, N. (2019). Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95, 420-429. [8] Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32-45. [9] Khan, P. W., & Byun, Y. (2020). A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things. Entropy, 22(2), 175. [10] (https://techterms.com/definition/blockchain) [11] (https://blockgeeks.com/guides/what-is-blockchain-technology) [12] F. Tschorsch and B. Scheuermann, “Bitcoin and Beyond: A Technical Survey onDecentralized Digital Currencies,” IEEE 18, No. 3, 2016, pp. 2084-2123 [13.14) (J-Chen, S., Wang, H. & Zhang, ).2018 [15] https://www.conicryptocash .com [16]. Alrahili & Aldahawi, Journal of Information Studies & Technology, Vol. 2020(1). Art 5 [17]. Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., & Roback, E. (2001). Report on the development of the Advanced Encryption Standard (AES). Journal of Research of the National Institute of Standards and Technology, 106(3), 511. [18] . Alex Biryukov; Orr Dunkelman; Nathan Keller; Dmitry Khovratovich; Adi Shamir (2009-08-19).

    Cite This Article As :
    Ahmed, Samia. , Elsaeed, Elsaeed. , Aboul, Samir. , M., Safaa. Proposed Architecture Diagrams for developing an electronic system based on block chain technology to secure confidential data in university. International Journal of Artificial Intelligence and Education Technology, vol. , no. , 2022, pp. 25-40. DOI: https://doi.org/10.54216/IJAIET.010103
    Ahmed, S. Elsaeed, E. Aboul, S. M., S. (2022). Proposed Architecture Diagrams for developing an electronic system based on block chain technology to secure confidential data in university. International Journal of Artificial Intelligence and Education Technology, (), 25-40. DOI: https://doi.org/10.54216/IJAIET.010103
    Ahmed, Samia. Elsaeed, Elsaeed. Aboul, Samir. M., Safaa. Proposed Architecture Diagrams for developing an electronic system based on block chain technology to secure confidential data in university. International Journal of Artificial Intelligence and Education Technology , no. (2022): 25-40. DOI: https://doi.org/10.54216/IJAIET.010103
    Ahmed, S. , Elsaeed, E. , Aboul, S. , M., S. (2022) . Proposed Architecture Diagrams for developing an electronic system based on block chain technology to secure confidential data in university. International Journal of Artificial Intelligence and Education Technology , () , 25-40 . DOI: https://doi.org/10.54216/IJAIET.010103
    Ahmed S. , Elsaeed E. , Aboul S. , M. S. [2022]. Proposed Architecture Diagrams for developing an electronic system based on block chain technology to secure confidential data in university. International Journal of Artificial Intelligence and Education Technology. (): 25-40. DOI: https://doi.org/10.54216/IJAIET.010103
    Ahmed, S. Elsaeed, E. Aboul, S. M., S. "Proposed Architecture Diagrams for developing an electronic system based on block chain technology to secure confidential data in university," International Journal of Artificial Intelligence and Education Technology, vol. , no. , pp. 25-40, 2022. DOI: https://doi.org/10.54216/IJAIET.010103