Submit your paper : editorIJETjournal@gmail.com Paper Title : SECURING DATA WITH BLOCKCHAIN AND AI ISSN : 2395-1303 Year of Publication : 2022 10.5281/zenodo.7239124 MLA Style: -K. Shravya, M. Sathvika, K. Bhavani SECURING DATA WITH BLOCKCHAIN AND AI , Volume 8 - Issue 5 September - October 2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: -K. Shravya, M. Sathvika, K. Bhavani SECURING DATA WITH BLOCKCHAIN AND AI , Volume 8 - Issue 5 September - October 2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract Information is the contribution for different man-made brainpower (man-made intelligence) calculations to mine important highlights, yet information in Web is dissipated all over the place and constrained by various partners who can't have faith in one another, and use of the information in complex the internet is hard to approve or to approve. Subsequently, it is truly challenging to empower information partaking in the internet for the genuine huge information, as well as a genuinely strong computer based intelligence. In this paper, we propose the SecNet, an engineering that can empower secure information putting away, processing, and partaking in the huge scope Web climate, focusing on a safer the internet with genuine enormous information and subsequently upgraded computer based intelligence with a lot of information source, by coordinating three key parts: Blockchain-based information imparting to possession ensure, which empowers believed information partaking in the huge scope climate to frame huge information; artificial intelligence based secure figuring stage to create more wise security rules, which assists with building a more confided in the internet; Confided in esteem trade system for buying security administration, giving a way to members to acquire financial prizes while giving out their information or administration, which advances the information sharing and hence accomplishes better execution of simulated intelligence. Additionally, we talk about the commonplace use situation of SecNet as well as its possibly elective method for conveying, as well as investigate its adequacy from the part of organization security and financial income. Reference H. Yin, D. Guo, K. Wang, Z. Jiang, Y. Lyu and J. Xing, "Hyperconnected network: A decentralized trusted computing and networking paradigm", IEEE Netw., vol. 32, pp. 112- 117, Jan./Feb. 2018. K. Fan, W. Jiang, H. Li and Y. Yang, "Lightweight RFID protocol for medical privacy protection in IoT", IEEE Trans Ind. Informat., vol. 14, no. 4, pp. 1656-1665, Apr. 2018. T. Chajed, J. Gjengset, J. Van Den Hooff, M. F. Kaashoek, J. Mickens, R. Morris, etal., "Amber: Decoupling user data from Web applications", Proc.15th Workshop Hot Topics Oper. Syst. (HotOS XV), pp. 1-6, 2015. M. Lecuyer, R. Spahn, R. Geambasu, T.-K. Huang and S. Sen, "Enhancing selectivity in big data", IEEE Security Privacy, vol. 16, no. 1, pp. 34-42, Jan./Feb.2018. A. de Montjoye, E. Shmueli, S. S. Wang and A. S. Pentland, "openPDS: Protecting the privacy of metadata through SafeAnswers", PLoS ONE, vol. 9, no.7, 2014. Keywords — SECURING DATA WITH BLOCKCHAIN AND AI |