IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

BLOCKCHAIN-BASED SECURITY MODEL FOR SECURE DATA TRANSACTIONS

AUTHORS:
Sowmya.G
Mentor
C.Mohanapriya
Affiliation
Department Of Computer Technology, Dr.N.G.P. Arts and Science College, Coimbatore, Tamil Nadu, India
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

The frequency of online transaction between businesses and individuals is increasing every day, when it includes banking, data sharing and transaction record keeping. Many institutions today experience severe security issues such as ongoing data breaches and unauthorized access or modifications to their transaction records. These security issues show that there is very little to no secure and dependable way to manage digital transactions. A majority of people believe that blockchain technology can solve these issues because of its distinguishing features of being decentralized, allowing for the use of cryptographic techniques to secure data and providing a transparent public process for recording transactions.


This research proposes a new method for providing the security needed to conduct data transactions in a more trustworthy and efficient manner using blockchain technology. The proposed framework will provide additional integrity, transparency, reliability, and security to digital transaction systems by creating an alternative digital transaction system through blockchain network data storage and transaction validation without having a central authority. In addition to having the additional integrity, transparency, reliability and security provided to digital transaction systems, all transactions are also secured using cryptography and recorded in a series of blocks with secure links between blocks.


The proposed digital transaction model will ensure the integrity of individual transactions by supplying the means to prevent unauthorized modification and maintain the consistency of data generated by all transactions throughout the entire blockchain network. Therefore, the model will provide a secure and transparent platform for conducting digital transactions through the use of cryptographic hashes and consensus mechanisms. This research concludes that through the application of the proposed digital transaction model digital transactions will have a higher level of integrity and security through the implementation of integrated blockchain transactions.

Keywords
Article Metrics
Article Views
145
PDF Downloads
1
HOW TO CITE
APA

MLA

Chicago

Copy

Sowmya.G, (2026). Blockchain-Based Security Model for Secure Data Transactions. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.059

Sowmya.G, . "Blockchain-Based Security Model for Secure Data Transactions." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.059.

Sowmya.G, . "Blockchain-Based Security Model for Secure Data Transactions." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.059.

References
1.Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System”, 2008.

2.Crosby, P. Pattanayak, S. Verma, and V. Kalyanaraman, “Blockchain Technology: Beyond Bitcoin,” Applied Innovation Review, 2016.

3.Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” IEEE International Congress on Big Data, 2017.

4.Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, “A Survey on the Security of Blockchain Systems,” Future Generation Computer Systems, 2019.

5.Xu et al., “A Taxonomy of Blockchain-Based Systems for Architecture Design,” IEEE International Conference on Software Architecture, 2017.

6Yaga, P. Mell, N. Roby, and K. Scarfone, “Blockchain Technology Overview,” National Institute of Standards and Technology (NIST), 2018.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
AI-Driven Resume Skill Extraction and Job Recommendation System using Hybrid Transformer Mamba Model
string(16) "Bala Amithesh. S" S, B. A.
(2026)
DOI: 10.55041/ijsmt.v2i4.199
Impact of Store and Product Display Characteristics on Impulse Buying Behavior: Evidence from Kozhikode District
string(10) "Rishad P T" T, R. P.
(2026)
DOI: 10.55041/ijsmt.v2i3.234
TrustNet a Deep Learning based intelligent system for digital image authenticity and forgery avoidance
string(10) "K. Vinotha" Vinotha, K.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.094
Scroll to Top