Published on: April 2026
DECENTRALIZED SOCIAL MEDIA PLATFORMS: ENHANCING PRIVACY, SECURITY AND USER CONTROL USING BLOCKCHAIN TECHNOLOGY
SHAIK SANA MOHAMMED MAJEED BUCHI PAVITHRA KANAKALA.SAIKUMAR N. SOUJANYA
V. SANDYA
Telangana India
Article Status
Available Documents
Abstract
KEYWORDS : Blockchain, Decentralized Social Media, Data Security, Privacy Protection, Smart Contracts, SHA-256, Proof of Work, Distributed Ledger, Ethereum, Solidity, dTweets, Secure Data Storage, Web3.
How to Cite this Paper
SANA, S., MAJEED, M., PAVITHRA, B., KANAKALA.SAIKUMAR, & SOUJANYA, N. (2026). Decentralized Social Media Platforms: Enhancing Privacy, Security and User Control Using Blockchain Technology. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.304
SANA, SHAIK, et al.. "Decentralized Social Media Platforms: Enhancing Privacy, Security and User Control Using Blockchain Technology." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.304.
SANA, SHAIK,MOHAMMED MAJEED,BUCHI PAVITHRA, KANAKALA.SAIKUMAR, and N. SOUJANYA. "Decentralized Social Media Platforms: Enhancing Privacy, Security and User Control Using Blockchain Technology." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.304.
References
- Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008. [Online].Available: https://bitcoin.org/bitcoin.pdf
- Buterin, "Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform," Ethereum White Paper, 2013.
- Luu, D. Chu, H. Olickel, P. Saxena, andHobor, "Making Smart Contracts Smarter," in Proc. ACM SIGSAC Conf. CCS, 2016, pp. 254-269.
- Li, Y. Wu, and L. Chen, "A Blockchain- Based Decentralized Social Media Platform with IPFS Storage," IEEE Access, vol. 8, pp. 71762-71773, 2020.
- Al-Shaer, "Deception in Cybersecurity: Techniques and Applications," Springer, 2016.
- Pawlick, E. Colbert, and Q. Zhu, "A game- theoretic taxonomy and survey of defensive deception for cybersecurity and privacy," ACM Computing Surveys, vol. 52, no. 4, pp. 1-30,2019.
- Shen, J. Wei, and Y. Liu, "Hypergame theory-based proactive defense for APTs in cyber systems," IEEE Access, vol. 9, pp. 11534- 11547, 2021.
- Huang, J. Wang, X. Li, and T. Zhang, "Modeling multi-stage APTs using dynamic Bayesian networks and game theory," Future Generation Computer Systems, vol. 107, pp. 544-555, 2020.
- Durkota, V. Lisy, B. Bosansky, and C. Kiekintveld, "Game-theoretic models for security analysis of networked systems," ACM TIST, vol. 8, no. 4, pp. 1-29, 2017.
- Zhu and T. Basar, "Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems," IEEE Control Systems Magazine, vol. 35, no. 1, pp. 46-65, 2013.
- Roy et al., "A survey of game theory as applied to network security," in Proc. 43rd Hawaii Int. Conf. System Sciences, 2010, pp. 1- 10.
- E. Carroll and D. Grosu, "A game theoretic investigation of deception in network security," Security and Communication Networks, vol. 4, no. 10, pp. 1162-1172, 2011.T. Alpcan and T. Basar, "Network security: A decision and game-theoretic approach," Cambridge University Press, 2010
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 13 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

