Skip to main content
Log in

A Novel Security Algorithm RPBB31 for Securing the Social Media Analyzed Data using Machine Learning Algorithms

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The present world data is most important in public because without data cannot live in the world. This data is big data and that data daily increases through Social Media like “Twitter, Facebook, Youtube, WhatsApp, Instagram, LinkedIn”, etc.., because this media only share public opinion very fast through the net. From this media, more people used especially Twitter. Thus media are used to analyze the public opinion of the tweets and predict the future through Machine Learning Algorithm. This analyzed data should make it polarity score. This score data has very little security because, this score can change the score and affected the future, so apply the existing security algorithms is Salsa and ChaCha. The Salsa algorithm is diagonal values moved to the first row. The ChaCha algorithm is diagonal values moved to the first column. The existing algorithms do not have good security because they focused only on performance, not security. So, the novel security algorithm is RPBB31. This algorithm has seven stages. The 1st stage is to find the secret key N, n, and p values from the matrix. The 2nd stage is to apply the secret key in PN(n) operation. The 3rd stage operation of PN(n) up to n = 1. The 4th stage is all PN(n) operations make their single line. The 5th stage is to pair the values and swap the values in the matrix. The 6th stage is column operations in the matrix. The 7th stage is again Step 4 values used to swap but “0th" cell value start from reverse in the matrix. In world cricket is the most famous game. In all social media Millions of people are following in different manner, especially in indian cricketer are more famous in India and world. In some point of time it may lead to match fixing, betting. To overcome this kind of issue the four datasets chosen. The proposed algorithm has provide good security and performance while compare to existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

References

  1. Bagath Basha, C., & Somasundaram, K. (2019). A comparative study of twitter sentiment analysis using machine learning algorithms in big data. International Journal of Recent Technology and Engineering, 8, 591–599.

    Google Scholar 

  2. Bernstein, D. J. (2008). The salsa20 family of stream ciphers. New Stream Cipher Designs: The eSTREAM Finalists. https://doi.org/10.1007/978-3-540-68351-3_8

    Article  Google Scholar 

  3. Bagath Basha, C., & Rajaprakash, S. (2020). Applying the CBB21 phase 2 method for securing twitter analyzed data. Advances in Mathematics: Scientific Journal, 9, 1085–1091.

    Google Scholar 

  4. Bagath Basha, C., Rajaprakash, S., Muthuselvan, S., Saisatishsunder, P., & Alekhya Rani, S. V. L. (2020). Applying the CBB20 algorithm for twitter analyzed data. In Journal of Physics: Conference Series-First International Conference on Advances in Physical Sciences and Materials Coimbatore, Tamil Nadu, India.

  5. Bagath Basha, C., & Rajaprakash, S. (2020). Applying the SRB21 phase II methodology for securing twitter analyzed data. In AIP Conference Proceedings of the International Conference on Mechanical Electronics and Computer Engineering.

  6. Bagath Basha, C., & Rajapraksh, S. (2020). Enhancing the security using SRB18 method of embedding computing. Microprocessor and Microsystems, 77, 103125.

    Article  Google Scholar 

  7. Sobti, R., & Ganesan, G. (2016). Analysis of quarter rounds of salsa and chacha core and proposal of an alternative design to maximize diffusion. Indian Journal of Science and Technology, 9, 1–10.

    Article  Google Scholar 

  8. Rajaprakash, S., Bagath Basha, C., Muthuselvan, S., Jaisankar, N., & Ravi Pratap, S. (2020). RBJ25 cryptography algorithm for securing big data. In Journal of Physics: Conference Series–First International Conference on Advances in Physical Sciences and Materials Coimbatore, Tamil Nadu, India.

  9. Karthik, K., Bagath Basha, C., Bhaswanth Thilak, U., Sai Kiran, T., & Raj, J. (2020). Securing social media analyzed data using RB20 method. Advances in Mathematics: Scientific Journal, 9(3), 1157–1163.

    Google Scholar 

  10. Bagath Basha, C., Rajaprakash, S., Harish, V. V. A., Krishna, M. S., & Prabhas, K. (2020). Securing twitter analysed data using CBB22 algorithm. Advances in Mathematics: Scientific Journal, 9, 1093–1100.

    Google Scholar 

  11. Bagath Basha, C., & Rajaprakash, S. (2019). Securing twitter data using SRB21 phase I methodology. International Journal of Scientific & Technology Research, 8, 1952–1955.

    Google Scholar 

  12. Jaichandran, R., Bagath Basha, C., Shunmuganathan, K. L., Rajaprakash, S., & Kanagasuba Raja, S. (2019). Sentiment analysis of movies on social media using R studio. International Journal of Engineering and Advanced Technology (IJEAT). https://doi.org/10.35940/ijeat.F8586.088619

    Article  Google Scholar 

  13. Rajaprakash, S., Karthik, K., Mohan, A., Sarkar, S., & Mathew, J. (2020). Design of new security system using RB21 algorithm. Advances in Mathematics: Scientific Journal, 9, 1149–1155.

    Google Scholar 

  14. Jaichandran, R., Pushpa, P. N., Narayanan, A., Minhaj Ali, K., & Thangal, S. S. (2020). Security of predicting the data using RB29 algorithm. Advances in Mathematics: Scientific Journal. https://doi.org/10.37418/amsj.9.9.33

    Article  Google Scholar 

  15. Shantha Shalini, K., Leelavathy, S., Otk, A. K., Varghese, R. T., & Viswanathan, N. (2020). Securing the prediction data using RB27 algorithm. Advances in Mathematics: Scientific Journal. https://doi.org/10.37418/amsj.9.9.28

    Article  Google Scholar 

  16. Jaichandran, R., Shantha Shalini, K., Leelavathy, S., Johnson Rajaguru, J., & Pradeep, K. (2020). Securing generalized data using RB23 algorithm. Advances in Mathematics: Scientific Journal. https://doi.org/10.37418/amsj.9.9.25

    Article  Google Scholar 

  17. Dhasaradhan, K., Jaichandran, R., Shunmuganathan, K. L., Usha Kiruthika, S., & Rajaprakash, S. (2020) Hybrid machine learning model using decision tree and support vector machine for diabetes identifification. In Proceeding of ICICC, Data Engineering and Intelligent Computing, Springer, pp. 293–305.

  18. Djaballah, K. A., Boukhalfa, K., & Boussaid, O. (2019) Sentiment analysis of twitter messages using Word2vec by weighted average. In 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS), pp. 223–228.

  19. Joseph, M., Sekar, G., Balasubramanian, R., & Venkiteswaran, G. (2021). On the security of the stream ciphers RCR-64 and RCR-32. The Computer Journal, 65, 3091–3099.

    Article  MathSciNet  Google Scholar 

  20. Rajaprakash, S., Jaisankar, N., Bagath Basha, C., Jayan, A., & Sebastian, G. (2022) RBJ20 cryptography algorithm for securing big data communication using wireless networks. WorldS4, Springer, LNNS Book Series (ISSN: 237-3370, London, July 29–30, 2021), Vol. 334, pp. 499–507.

Download references

Funding

There was no financial support received from any organization for carrying out this work.

Author information

Authors and Affiliations

Authors

Contributions

BBCB: Drafting the manuscript. RS: Drafting the manuscript. MR: Supervision. SM: Supervision. HP: Assisting in drafting the manuscript. KT: project administration. AR: project administration.

Corresponding author

Correspondence to Suresh Muthusamy.

Ethics declarations

Conflict of interest

The authors declare no potential conflicts of interest with respect to the research, authorship, and/or publication of this article. To the best of my knowledge and belief any actual, perceived or potential conflicts between my duties as an employee and my private and/or business interests have been fully disclosed in this form in accordance with the requirements of the journal.

Ethical Approval

This material is the authors' own original work, which has not been previously published elsewhere. The paper is not currently being considered for publication elsewhere. The paper reflects the authors' own research and analysis in a truthful and complete manner.

Consent to Participate

I have been informed of the risks and benefits involved, and all my questions have been answered to my satisfaction. Furthermore, I have been assured that any future questions I may have will also be answered by a member of the research team. I voluntarily agree to take part in this study.

Consent for Publication

Individuals may consent to participate in a study, but object to having their data published in a journal article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Batcha, B.B.C., Singaravelu, R., Ramachandran, M. et al. A Novel Security Algorithm RPBB31 for Securing the Social Media Analyzed Data using Machine Learning Algorithms. Wireless Pers Commun 131, 581–608 (2023). https://doi.org/10.1007/s11277-023-10446-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10446-9

Keywords

Navigation