CFP last date
20 January 2025
Reseach Article

Encrypting of Digital Banking Transaction Records: An Blockchain Cryptography Security Approach

by Nabilah Aziz, Rodiah Rodiah, Heru Susanto
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 24
Year of Publication: 2021
Authors: Nabilah Aziz, Rodiah Rodiah, Heru Susanto
10.5120/ijca2021921147

Nabilah Aziz, Rodiah Rodiah, Heru Susanto . Encrypting of Digital Banking Transaction Records: An Blockchain Cryptography Security Approach. International Journal of Computer Applications. 174, 24 ( Mar 2021), 21-26. DOI=10.5120/ijca2021921147

@article{ 10.5120/ijca2021921147,
author = { Nabilah Aziz, Rodiah Rodiah, Heru Susanto },
title = { Encrypting of Digital Banking Transaction Records: An Blockchain Cryptography Security Approach },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2021 },
volume = { 174 },
number = { 24 },
month = { Mar },
year = { 2021 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number24/31822-2021921147/ },
doi = { 10.5120/ijca2021921147 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:22:58.943048+05:30
%A Nabilah Aziz
%A Rodiah Rodiah
%A Heru Susanto
%T Encrypting of Digital Banking Transaction Records: An Blockchain Cryptography Security Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 24
%P 21-26
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Increased use of digital banking poses a risk to the security of its transactions. As result the system more vulnerable risks faced by digital banking stemmed of cyber-attacks. This study reveals blockchain technology algorithms that encrypted through RSA cryptography and SHA-256 hashes, to enhance digital banking security and reduce the risk of cyberattacks over the banking transaction. The level of blockchain data accuracy and completeness tested through the mathematics permutation method to find out which data-combination that may lead to vulnerable. However, this study is very promosing. The most significant parameter in influencing the validity of the transaction is Value with an accuracy percentage value of 88%, and then followed by Sender Address with an accuracy percentage value of 70% and the last is the Recipient Address with a percentage value. an accuracy of 62%. In other hand, the study reveals that the use of key pairs improves system reliability by implementing of SHA-256 hash on the blockchain.

References
  1. Abomhara, M. & Køien, G. M., “Cyber security and the internet of things : vulnerabilities , threats , intruders”, 2015, Journal of Cyber Security and Mobility, 4(1), pp. 65–88.
  2. Kaur, J., “Improving data integrity using blochain technology”, 2018, International Journal of Electronics Engineering, 10(1), 315–320.
  3. Bernardini, M., Pennino, D., Pizzonia, M., Roma, S., & Ingegneria, D., “Blockchains meet distributed hash tables : Decoupling validation from state storage ( Extended Abstract )”, 2019, DLT Paper, 2334, 1–13.
  4. Wang, S., Zhang, D., Zhang, Y., “Blockchain-based personal health records sharing scheme with data integrity verifiable”, IEEE Access, 2015, (4), 1-1.
  5. Lukman, A., Agajo, J., Adedokun, E., & Loveth, K., “Crypto hash algorithm-based blockchain technology for managing decentralized ledger database in oil and gas industry”, Multidisciplionary Scientific Journal, 2019, 2(3), 300–325.
  6. Wu, H. & Tsai, C., “An intelligent agriculture network security system based on private blockchains”, Journal of Communications and Networks, 2019, 21(5), 503–508
  7. J Romano, D. & Schmid, G., “Beyond Bitcoin: A Critical Look at Blockchain-Based Systems”,2017,Cryptography, 1-15.
  8. Sobti, R., & Ganesan, G., “Cryptographic hash functions: A review”,2012, International Journal of Computer Science Issues, 9, pp. 461 - 479.
Index Terms

Computer Science
Information Sciences

Keywords

Blockchain RSA Cryptography SHA-256 Data Integrity Security