Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
Search Results
Item Blockchain-based Data Security and Integrity Management Framework for Cyber-Physical Systems Using Hyperledger and Storj(Institute of Electrical and Electronics Engineers Inc., 2025) Vanja, S.K.; Janani, T.Modern Cyber-Physical Systems (CPS) generate large volumes of sensitive data, requiring secure management. Traditional centralized storage systems are vulnerable to breaches and unauthorized access, making them unsuitable for safeguarding CPS data. This paper presents a blockchain-based architecture integrating Hyperledger Fabric and Storj to enhance data security, integrity, and privacy. Hyperledger Fabric ensures data integrity and transparency through a tamper-proof distributed ledger, fine-grained a ccess c ontrol, a nd automated smart contract protocols. Storj provides decentralized storage, splitting encrypted data into segments across global nodes to eliminate single points of failure and improve redundancy. Experimental evaluation demonstrates a 20% improvement in data retrieval speed, 100% integrity accuracy, and 1,000 transactions per second with minimal CPU usage. Additionally, the integration of homomorphic encryption enables real-time computations on encrypted data while preserving privacy. The proposed framework addresses critical CPS challenges, delivering a scalable, secure, and resilient system for managing CPS data. © 2025 IEEE.Item PMSChain: A Blockchain-based Prison Management System using the Ethereum Platform(Institute of Electrical and Electronics Engineers Inc., 2025) Niha, N.K.; Janani, T.; Kumar, V.S.; Shrivas, M.The prison system in India lags other industries, such as healthcare, in terms of automation. The existing prison management system often lacks transparency, consistency in security information, and well-defined procedures. To address this issue, we developed a system to digitize daily prison operations. The proposed blockchain-based prison management system is a comprehensive software application designed to manage activities related to prisons using a distributed ledger for efficient storage and managing information related to lawbreakers. The prison authority can have access to add, delete, or update the lawbreaker data that is collected from the police. The suggested system defines various roles for accessing the data inside the prison. Proper and timely access to data is enabled for the prison authorities. The proposed system has been implemented using the Ethereum Sepolia test net with 1000 tractions and its total transaction cost is 0.015357. Additionally, gas price, throughput, and latency has been computed for the proposed work. This system has been designed to provide secure, efficient, and user-friendly management of inmate records, scheduling, and communication. This system enables tamper-proofness, accountability and security of data by incorporating blockchain technology for secure and immutable record transaction within prison which prevents fraud, and corruption. © 2025 IEEE.Item Enhanced Quantum Permutation Pad for Quantum Based Text Encryption(Institute of Electrical and Electronics Engineers Inc., 2025) Goyal, A.; Janani, T.This paper proposes an advanced quantum text encryption scheme based on an Enhanced Quantum Permutation Pad (QPP). The method begins by generating 6 × 6 padded matrices derived from all possible permutations of four basis vectors in R4. These matrices are converted into binary strings and encrypted using two-qubit quantum circuits, where X and CNOT gates enable quantum entanglement and conditional operations. A binary key is applied to influence the behavior of the quantum circuits during both encryption and decryption. The encryption logic is simulated using Qiskit's AerSimulator, and the resulting binary data is reconstructed into its original structure through matrix extraction. Experimental evaluation using the ENT test demonstrates a high entropy value of 7.66, indicating strong randomness and robustness of the encryption. This methodology presents a secure and structured approach to quantum encryption, combining permutation logic with quantum operations to ensure confidentiality and resistance to classical attacks. © 2025 IEEE.
