Skip to main content

Internet – Voting System Using Blockchain Technology

Page 1

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN: 2395 0072

Internet Voting System Using Blockchain Technology

S.Thiruvenkatasamy1, L.Barathkumar2, P.Navinkumar3, K.Ranjith4, A.Vigneshwaran5

1Assistant Professor, Dept.of Computer Science and Engineering(CSE), Nandha College of Technology, TamilNadu, India

2,3,4,5UG Student, Department of CSE, Nandha College of Technology, TamilNadu, India ***

Abstract - In recent years, the blockchain has gained popularity, and its underlying consensus algorithms have become the subject of research. Most consensus mechanism research is now focused on public blockchains and is based on existing consensus mechanisms or complex distributed algorithms. Various application scenarios based on the consortium blockchain have been developed, although few researchers have focused on proprietary consistency algorithms. Electronic voting has gradually replaced paper voting to avoid redundancy and inconsistencies. Due to security and privacy vulnerabilities noticed over time, the historical viewpoint offered in the last two decades implies that it has not been as successful. This paper proposes a methodology for ensuring data security by employing effective hashing techniques. This paper introduces the concepts of block formation and block sealing. The implementation of a block sealing concept aids in the customization of the blockchain to match the requirements of the polling process. It is advised that aconsortium blockchain be used, which ensures that the blockchain is held by a governing body (e.g., an election commission) and that unauthorized access from the outside is impossible. The framework suggested in this study uses the customizable blockchain technique to discuss the effectiveness of the polling process, the value of hashing algorithms, block formation and sealing, data accumulation, and result declaration. It claims to understand blockchain's security and data management concerns and to provide a better representation of the electronic voting process.

Key Words: Blockchainvoting,I voting,E voting,Rankedvotingsystems,SHA,Futurevoting.

1. INTRODUCTION

Theimplementationofe votinghasthesameobstaclesasanyother"e" relatedtopic,suchase government.Legislatorsor administratorsmayanticipatesimplyuploadingapaperversionofaserviceorprocesson theinternet.Unfortunately,the realityismorecomplicated,andnowhereisthismoretruethanelectronicvoting.Institutionssuchasthe'ElectionCommission' wereestablishedinmanyparliamentarydemocraciestoimprovethevotingprocess.

Alongwithestablishingtheprocedureandlegislationforconductingelections,theinstitutionsestablishedvotingdistricts, electoralprocesses,andballotingsystemstoaidintheconductoftransparent,free,andfairelections.Sincetheinceptionofthe votingsystem,theconceptofsecretvotinghasbeenintroduced.

Becausepublicfaithindemocraticsystemsisgrowing,publictrustinvotingsystemsmustn'tdeteriorate.SincetheCommitteeof MinistersadoptedtheCouncilofEuropeRecommendationonlegal,operational,andtechnicalstandardsfore votingin2004, therehavebeennumerousdevelopmentsinthefieldofe voting.

Some countries no longer use e voting, while others have experimented with it and decided not to implement it. Other countries,ontheotherhand,arecontinuingtorunpilotprogramsandimplemente voting.Otherelections,suchasstudent councilsoryouthboards,haveusedelectronicvoting.Somecountriesororganizationswanttostartpilotinge votingschemes buthaven'tlookedintoallthepossibilities.Thisdocumentwaswrittenspecificallyforthem.

2. METHODOLOGY

Wewilladoptaprocesstoaddressthefollowingactivities.

2.1 MODELING OF ENTIRE E VOTING PROCESS

Thesystemmodelinghelpsindrawingtheentiresystemonpapertodevelopa deep understandingofthesystemandto identifyerrorsandflawsthatcanbeobservedbeforethesystemcanbeimplemented.

2.3 DETERMINATION OF THE TECHNOLOGY PLATFORM TO ENSURE PRIVACY AND SECURITY

The e voting process requires the features like privacy, security, anonymity, and verifiability as the core function of this solution, it is important that the choice of the underlying technology is consistent to meet these challenges. It has been identifiedthatBlockchaintechnologysufficientlydealswithallsuchchallenges.

©
| Page3287
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN: 2395 0072

2.4 DEVELOPMENT & TECHNOLOGY INTEGRATION WITH THE PERCEIVED E-VOTING MODEL

Basedonthesystemmodel,thesystemwillbedevelopedandwillbeintegratedwiththebaselinetechnology.

3.VOTER AUTHENTICATION

Any voting system should have voter authentication. A voting system must ensure that a voter:

Isexactlywhotheyclaimtobe

Hastherighttovotewhenauthenticatingthem.

Hasnotyetvoted

Asystemthatdoesnotauthenticatevoterswillbeunabletopreventduplicatevoting,voterimpersonation,andanotherelection tampering.Inoldervotingsystems,pollingstationstafffrequentlyconfirmvoteridentitymanually.Inonlinevotingsystems, however,digitalidentityverificationtechniquesshouldbeimplemented.

A person's identity can now be verified using the following information:

Digitalidentification

Keystopersonalsecurity

Authenticatedmobiledevices

Fig 1 : Theelectronicvotingprocessandcontributingentities

Thevoterisrouted(Fig 1)tothevotingscreentocasthisballotafterpassingtheauthenticationcheck.Eachcandidate'sname andrelevantpartyinsigniaaredisplayedonthevotingmachine,andthevotercanvoteashelikes.Thevoter'svoteisrecorded ontheconfirmationscreen,andthevoter'sconfirmationis sought.

a) Avotercan onlyvoteonce, andonce thatvote ismade, thevoter'svoting record is marked as"voted,"making it impossibleforthemtovoteagain.Avoter'snamecanbeblockedorremovedfromthelistofeligiblevotersforthe currentelectionsafterhehascasthisvote.

Hedevelopedamethodinwhichvoterscanvotemanytimes,witheachvotecancelingthepreviousoneinhis workon internetvoting.Ifthevotingprocedureistobecompletedinonedayandroughly110millionpeoplearerequiredtovote,asin Pakistan,thisdoesnotappeartobeapracticalapproach.

b)Thepollingprocesscontinuesuntilthevotingtimeendsorallvotersonthevoterlisthavecasttheirballots.

c)Thepollingstationresultsareannounced,togetherwiththevotetotalsforeachcandidate.Theprocessisrepeatedfor allvotingstationsintheconstituency,withthesumofallpollingstationresultsdeterminingtheconstituency'soutcome. Similarly,alloftheconstituencyresultsarepooledtoprovidenationalelectionresults.Thevotingprocedureandthe resultsaredepictedinthisdiagram.

d)Fig 2illustratesthemethod'sthree layeredoperation.Thefirstlayer(Who)definesthesystem'sparticipants,suchas voters,pollingemployees,andpollingmachines,whocaninteractwiththepollingprocess.Thesecondlayer(How)is focusedondeterminingthenecessarytoolsandtechnologiestoensurethattheprocessrunssmoothly.

©
Journal | Page3288
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN: 2395 0072

Fig-2 : Theelectronicvotingprocesswithinstitutionsinvolved

4.HASHING & BLOCKCHAIN TYPES

Previouseventsinaperson'slifehavebeentimestampedandconnected.Theyareimpossibletoreverseorduplicateinanyway. Manyothersarealsoawareoftheevents'correctnessandmaydouble checkthefactsifnecessary.Theblockchaincomesinto playhere,asitcreatesanirreversible,distributed,publicledgertostoredatachunks.Theeventscanberepresentedasdata blocksthatareconnectedtoformaninvisibleblockchainofourlives.Acomputationalblockchainissimilarinconcept.Inthe past,acomputationalblockchainwasanopenanddistributedledgerthat,dependingontheconditions,couldbeaccessedand amendedbyanybody.Thegoalistoestablishatrust basedsysteminwhichrecordscannotbealtered.

4.1 TYPE OF BLOCKCHAIN

Thethreetypesofblockchainarepublicblockchain,privateblockchain,andconsortiumblockchain.Publicblockchains,suchas BitcoinandEthereum,allowanyone,fromanywhere,tojoinandberelievedathisdiscretion.This isdemonstratedbythe complicatedmathematicalfunctions.Theprivateblockchainisthecorporation'sinternal publicledger,andthecompanythat ownstheblockchainprovidesaccesstoit.Blockconstructionandminingaremuchfasterinaprivateblockchainthaninapublic blockchainsincetherearefewernodes.Insteadofconsensus,membershipstandardsaredevelopedtobettermanageblockchain transactionsintheconsortiumblockchain,whichexistsamongcorporationsorgroupsoffirms.Thisstudyusesaconsortium sincetheblockchainwillberegulatedbyanationalauthorityinthecountry.

Theblockchain'sfoundationistheblock.Thetransactionstobewrittentothesystemarecontainedinthebodyofablock,which hasaheaderandabody.Theblock'sheadercontainsinformationabouttheblock,suchastheprevioushash,noncevalue,and difficulty,aswellasthetimestampsoftheblockandtransactions.Thelengthoftheblockisunknown.however,itisthoughtto bebetween1and8megabytes.Theblock'sheaderuniquelyidentifiestheblocktobeput.

4.2 HASHING

The technique of converting an arbitrary and variable size input to a fixed size output is known as hashing. Encryption converts data into a secure format that cannot be read unless the recipient possesses a key. The data can be any size in

©
Certified Journal | Page3289
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN: 2395 0072

encryptedformandistypicallyjustaslongasitisunencrypted.ByusingSHA 256hashing,a512 bitstringofdatacanbe turnedintoa256 bitstring.

Table 1 : Hashingalgorithms.

Name Input block size Message limit (bits) Hash code size

MD5 512 264 128

SHA 1 512 264 160 SHA 256 512 264 256 SHA 512 1024 2128 512

TheMD5algorithmgivesa128 nitor32 characterhashoutputandiswidelyusedforhashing.MD5,whichcameafterMd2, Md3,andMd4,isthemostcurrentalgorithminthesequence.Thealgorithmwasdesignedasacryptographichashingapproach. however,ithasweaknessesthatlimitthenumberofuniquehashvaluesitcangenerate,makingitvulnerable.In1996,Hans DobbertincreatedtheRIPEMD(RaceIntegrityPrimitiveEvaluationMessageDigest)familyofhashalgorithms.Thisapproach was developed as a safer alternative to MD5. Some of the versions that have emerged throughout time are RIPEMD 128, RIPEMD 160,RIPEMD256,andRIPEMD 320.

The MD5 technique is frequently used for hashing and produces a 128 nit or 32 character hash output. The most recent algorithminthesequenceisMD5,whichcomesafterMd2,Md3,andMd4.Althoughthetechniquewasintendedtobeusedfor cryptographichashing,ithasflawsthatlimitthenumberofuniquehashvaluesitcangenerate,renderingitvulnerable.Hans DobbertindevelopedtheRIPEMD(RaceIntegrityPrimitiveEvaluationMessageDigest)hashalgorithmfamilyin1996.This methodwascreatedtobeasaferalternativetoMD5.RIPEMD 128,RIPEMD 160,RIPEMD256,andRIPEMD 320aresomeof thevariationsthathaveappearedovertime.

5. PROOFS

5.1 Proof of Work:

Theproofofworkideadealswithmining/blockcreationinsuchawaythatitcanbedemonstratedthatasignificantamountof effortwasputintosolvingthemathematicalissuegivenbytheblockchain'sdevelopment.Witheachnewblockconstructed,the mathematicaldifficultygrows,makingblockconstructionachallengingandgratifyingactivity.Tointroduceincreasinglevelsof complexity,hashfunctions,Markletrees,andthenoncevalueareused.

5.2 Proof of Stake:

Theproofofstakeconceptisbasedontheblockchain'sidentificationofstakes.Theownersofassetshaveahigherpriority whenitcomestoformingblocks.It'simpossibletodismissthenotionthatafewblockauthorscontroltheentireblockchain throughtheirholdings.Thismethodcanbeemployedinaconsortiumblockchainoraprivateblockchainwheretheholding corporationsneedadministrativeaccess.

5.3 Proof of Burn:

Theproofofstakeconceptisbasedontheblockchain'sidentificationofstakes.Theownersofassetshaveahigherpriority whenitcomestoformingblocks.Thismethodcanbeemployedinaconsortiumblockchainoraprivateblockchainwherethe holdingcorporationsneedadministrativeaccess.

The proofs described above are commonly used in bitcoin mining and are well known in the literature. However, the applicationofblockchainvariesinvariousindustries,andtheproofspresentedinthissectionmaynotbeapplicableinpractice; however,basedonthenatureoftheapplication,amodificationtotheimplementationmayberequested.Theanswertothe questionisdeterminedbythenatureoftheapplicationareawhereblockchaintechnologywillbedeployed.

Thisstudyexaminestheuseofblockchaininsecureelectronicvoting,anditisfoundthatthecurrentblockchainmayrequire somechangesforthefollowingreasons.CreationofBlock,Blockcreationisacriticalpartoftheelectionprocess;withoutit, voterswillbeunabletorecordtheirballots.Asaresult,thebricksmustbeconstructedwithoutfirstsolvingthemathematical

2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal |

Page3290
©

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN: 2395 0072

puzzlesthatcomprisetheevidenceoflabor.Proofofstakeandproofofburnwillbeirrelevantbecauseeachproducedblockwill beheldbyasingleindividual,asitwillbeaconsortiumblockchain.SealingofBlocks:

Voterscancastballots,andtheirchoicesarerecordedinblocks.Theblocksmustbesealedusinghashfunctions,theMerkle tree,andthenoncefunctiononcethepollingperiodhasended.Sealingisnotmentionedinanyoftheextanttheories.

5.3.1 Polling Time:

Becausethevotingprocesstakesbetween8and10hours,theblocksmustbeconstructed,sealedand securedduring thatperiod.Proofofwork,proofofstake,andproofofburnarenotsuitableforuseintrustworthyelectronicvotingsincethey requirealengthyprocesstoapply.

5.3.2 Result Delay:

Afterthepollingprocessiscompletedandtheresultsarepublished,therewillbenoneedtocontinueminingorblock generation.Theproofoflaborandproofofstakealgorithmsconsume(waste)asubstantialamountofcomputationalresources overtimebecausetheyrecursivelyrepeatthemselves.Becausethesuggestedsystemusesfewresources,itiscost,time,and energy efficient.

Giventhelimitationsofexistingalgorithms,it'svitaltobuildanalgorithmthatcansolvetheproblemwhilealsoovercoming thelimitationsofexistingalgorithmswhenappliedtothefieldoftrustworthiness.Thepreviousblock'shashismixedwitha freshrandominteger,andtheresultishashedonceagaintoensurethatthehashoutcomefunctioncannotbesolvedwithoutthe abilitytotackleNP hardproblems.

Thegoalofblockchain basedelectronicvotingistoprovideasafevotingsystemthatcangainthetrustofallstakeholders, includingvoters,politicalparties,andgovernmentagencies.

Thesecurityofthecastingvoteisensuredthroughblockcreation,blocksealing,andcontenthashing.Theproducedblockis secureandemploystheSHA 256algorithm.TheblocksaresealedwiththeSHA 256algorithm'suniquehashes,whichare knowntobesufficientlysecureforthee votingprocess.

Intermsofacceptinganddeliveringthehashvaluethatisusedtostitchtheblockwiththechain,eachblock(exceptthefirstand lastblock)isassociatedwiththenextandpreviousblock,buildingMerkletrees.

Fig3 Block2…n=hash(hash(pairsoftransactions)+hash(Block(n 1))+RandomNumber(lengthn+2)

Fig 3: Blockchain basedhashingmechanism

Themethodforsealingtheblocksisdemonstrated.Thesealedblockreflectstheactualblockonceithasbeensealed.Thesealed blocksarerepresentedinsuchawaythattheyarelinkedusingachainedhashkey,withthekeyfromoneblockbeingutilizedby thenextblocktogeneratethenexthash,andsoonuntilalloftheblocksarecompleted.

Duringtheprocessofapplyingthehashfunctiontothetransactions,apairoftransactions(sequential)arechosenandthehash functionisappliedtothem.Allpairsoftransactionsaresequentiallyhashed,andahashiscreatedusingtheSHA256method basedonallhasheddata.It'stimetouseablock'shashafterit'sbeengenerated.

2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal

Page3291
©
|

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN: 2395 0072

6. VOTING RESULT COLLECTION

Fig 4: Conversionofblockstosealedblocks.

Fig 5: Distributedblockstructure.

Thankstotheblockchain'sexcellentnodeorganization,thefindingsarederivedfromthedatastoredontheblocks.The chainofblocksatthebottomcollectsdataincontainers(blocks)thatareseriallyconnectedbyanalgorithm.

AMerkletree,ontheotherhand,isretainedtotracktheblock'sdistributionanddegreeofbreakdown.Fig4depictsthe logicalallocationofnationalassemblyseatsandpollingplacesineachnationalassemblyseat.

Fig5showstheMerkletreerepresentationofthesystem,anditcanbeobservedthateachtransaction'srecordissaved atthetoplevel,i.elevel0.Thenationalseatsaredepictedatlevel1,whereaspollingstationsinanyregionaredepictedat level2.

Eachtransactioninanyblockcanbedirectlydiscoveredanddocumentedbykeepingthemdispersedandopenfortransactions whilepreservingthecontentswiththeBSJCtechniqueofproofofcompletion.Toincreaseandmaintainvotertrust,itisvitalto tellvotersabouttheresultsoftheirballots.Tomaketheprocessvisible,atrailofthevoterswhocasttheirvotesisestablished attheendofthepollingsession.

7. LIMITATIONS

Severalassumptionsareconsideredinthisresearch.

a) Thevoterunderstandshisconstitutionalrightsandthepollingprocess.Withinthetimelimit,eachvotermustbe abletovote.

b) Allvoterinformationispublicandavailableforverification.Thedatamustbesubmittedbythedatamanagement

2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified

©
| Page3292
Journal

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN: 2395 0072

agencyatthenationallevel.Itisalsoexpectedthatinternetconnectivityisalwaysavailable,withnocommunication delaysorpausesduetointernetoutages.

c) Pollingofficialsshouldbefamiliarwiththetechnologyandabletohelpvotersthroughtheprocedure.

8. CONCLUSION

The purposeof thisstudy is to examineand evaluate electronic votingsystems basedon blockchain technology. First, the blockchainconceptanditsapplicationsarediscussed,followedbyexistingelectronicvotingmethods.Theblockchain'spotential toimproveelectronicvoting,presentsolutionsforblockchain basedelectronicvoting,andfutureresearchroutesonblockchain basedelectronicvotingsystemsareallimportantconsiderations.Legislators,technologists,civilsociety,andthegeneralpublic mustallthinkdeeplyaboutsomeissues.Thisresearchproposedaframeworkbasedonanadaptableblockchainthatcanaddress challengesinthepollingprocesssuchaschoosingasuitablehashalgorithm,choosingblockchainupdates,managingvotingdata, andvotingprocesssecurityandauthentication.Becauseofitsadaptability,blockchainhasbeenabletoadapttothedynamicsof electronicvoting.

REFERENCES

[1] Nakamoto, S. Bitcoin: A Peer to Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf. (accessedon28July2020).

[2] Prashar,D.;Jha,N.;Jha,S.;Joshi,G.;Seo,C.IntegratingIoT,andblockchainforensuringroadsafety:Anunconventional approach.Sensors2020,20,3296.[CrossRef]

[3] Mohanta,B.K.;Jena,D.;Panda,S.S.;Sobhanayak,S.Blockchaintechnology:Asurveyonapplicationsandsecurityprivacy challenges.InternetThings2019,8,100107.[CrossRef]

[4] Hussain,H.A.;Mansor,Z.;Shukur,Z.ComprehensiveSurveyAndResearchDirectionsOnBlockchainIoTAccessControl. Int.J.Adv.Comput.Sci.Applications.2021,12,239 244.[CrossRef]

[5] Schinckus,C.Thegood,thebadandtheugly:Anoverviewofthesustainabilityofblockchaintechnology.EnergyRes. Soc.Sci.2020,69,101614.[CrossRef]

[6] Typographicdimensionsandconventionalwisdom:Adiscrepancy?TechnicalCommunication46(1):67 74.Wright, Patricia.1988.Issuesofcontentandpresentationindocumentdesign.InHandbookofhuman computerinteraction,ed. M.Helander,629 652.NewYork:North Holland.Wright,Patricia.1998.

[7] Printedinstructions:Canresearchmakeadifference?InVisualinformationforeverydayuse:Designandresearch perspectives,ed.HarmJ.G.Zwaga,TheoBoersema,andHenrietteC.M.Hoonout,45 66.London:TaylorandFrancis. Zimmerman,DonaldE.andTerriPrickett.2000.

[8] Ausabilitycasestudy:Prospectivestudents’useofauniversitywebpage.Innings:STC’s47thAnnualConference. SocietyforTechnicalCommunication.http://www.stc.org/ConfProceed/2000/PDFs/00099.pdf(accessedDecember4, 2007).

[9] M.Feldhofer,S.Dominikus,andJ.Wolkerstorfer,‘‘StrongauthenticationforRFIDsystemsusingtheAESalgorithm,’’ inCryptographic Hardware and Embedded Systems.2004,pp.357 370.

[10] Y.SteinandH.Primo,‘‘Programmabledataencryptionengineforadvancedencryptionstandardalgorithm,’’U.S.Patent 7508937B2,2009.Accessed:Aug.1,2018.[Online].Available:https://patents.google.com/patent/US7508937B2/en [10]B.Shehzad,K.M.Awan,M.I. U.Lali,andW.Aslam,‘‘Identificationofpatternsinfailureofsoftwareprojects,’’ J. Inf. Sci. Eng.,vol.33,no.6,pp.1465 1480,2017.

[11] A.M.Abdullatif,B.Shahzad,andA.Hussain,‘‘Evolutionofsocialmediainscientificresearch:Acaseoftechnologyand healthcareprofessionalsinSaudiUniversities,’’ J. Med. Imag. Health Inform.,vol.7,no.6,pp.1461 1468,2017.

[12] B.Shahzad,‘‘Identificationofriskfactorsinlargescalesoftwareprojects:Aquantitativestudy,’’ Int. J. Knowl. Soc. Res., vol.5,no.1,pp.1 11,2014.

[13] A.B.ShahzadandA.Said,‘‘Applicationofquantitativeresearchmethodsinidentifyingsoftwareprojectfactors,’’ Int. J.

2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal

Page3293
©
|

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 05 | May 2022 www.irjet.net p ISSN: 2395 0072

Inf. Technol. Elect. Eng.,vol.1,no.1,pp.30 33,2012.

[14] K. Saleem, A. Derhab, J. Al Muhtadi, and B. Shahzad, ‘‘Human oriented design of secure machine to machine communicationsystemfore healthcaresociety,’’ Comput. Hum. Behav ,vol.51,pp.977 985,Oct.2015.

[15] K.Saleem,A.Derhab,J.Al Muhtadi,B.Shahzad,andM.A.Orgun,‘‘Securetransferofenvironmentaldatatoenhance humandecisionaccuracy,’’ Comput. Hum. Behav.,vol.51,pp.632 639,Oct.2015.

[16] R.A.Abbasi et al.,‘‘Savinglivesusingsocialmedia:AnalysisoftheroleofTwitterforpersonalblooddonationrequests anddissemination,’’Telematics Inform.,vol.35,no.4,pp.892 912,2018.E.

[17] Alwagait,B.Shahzad,andS.Alim,‘‘ImpactofsocialmediausageonstudentacademicperformanceinSaudiArabia,’’ Comput. Hum. Behav.,vol.51,pp.1092 1097,Oct.2015.

[18] B.ShahzadandE.Alwagait,‘‘Doesachangeinweekenddayshaveanimpactonsocialnetworkingactivity?’’ J. UCS,vol. 20,no.15,pp.2068 2079,2014.

[19] Z.Zheng,S.Xie,H. N.Dai,X.Chen,andH.Wang,‘‘Blockchainchallengesandopportunities:Asurvey,’’ Int. J. Web Grid Services, vol. 14, no. 4, pp. 352 375, 2018. [20] D. Johnson, A. Menezes, and S. Vanstone,‘‘Theelliptic curve digital signaturealgorithm(ECDSA),’’ Int. J. Inf. Secure.,vol.1,no.1,pp.36 63,Aug.2001.

[20] J.Barcelo,‘‘Userprivacyinthepublicbitcoinblockchain,’’ J. Latex Class Files,vol.6,no.1,p.4,2007.

2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal

Page3294
©
|

Turn static files into dynamic content formats.

Create a flipbook