IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 04

Published on: April 2026

DECENTRALIZED SOCIAL MEDIA PLATFORMS: ENHANCING PRIVACY, SECURITY AND USER CONTROL USING BLOCKCHAIN TECHNOLOGY

SHAIK SANA MOHAMMED MAJEED BUCHI PAVITHRA KANAKALA.SAIKUMAR N. SOUJANYA

V. SANDYA

Dept of CSD CMR Technical Campus Hyderabad

Telangana India

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

In the current digital era, social media platforms have become pivotal for individuals to express their opinions, political views, and product reviews. However, the centralized nature of traditional social media systems poses significant risks related to data breaches, server crashes, and single points of failure. To address these challenges, this paper proposes a novel approach to migrate from centralized to decentralized social media platforms by leveraging Blockchain technology. Blockchain ensures data immutability, decentralized storage, and enhanced security by distributing data across multiple nodes. Any tampering with data is immediately detectable due to the cryptographic linkage of data blocks through unique SHA-256 hash codes. The proposed system, named dTweets, enables users to post and view tweets securely using smart contracts written in Solidity and deployed on the Ethereum network. This decentralization prevents fraudulent users from spreading misinformation or unauthorized advertisements. Experimental results demonstrate that the proposed system achieves strong data integrity, tamper resistance, and transparent operation while maintaining acceptable transaction latency. This implementation provides a robust foundation for a secure and tamper-proof social media ecosystem.

KEYWORDS : Blockchain, Decentralized Social Media, Data Security, Privacy Protection, Smart Contracts, SHA-256, Proof of Work, Distributed Ledger, Ethereum, Solidity, dTweets, Secure Data Storage, Web3.

How to Cite this Paper

SANA, S., MAJEED, M., PAVITHRA, B., KANAKALA.SAIKUMAR, & SOUJANYA, N. (2026). Decentralized Social Media Platforms: Enhancing Privacy, Security and User Control Using Blockchain Technology. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.304

SANA, SHAIK, et al.. "Decentralized Social Media Platforms: Enhancing Privacy, Security and User Control Using Blockchain Technology." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.304.

SANA, SHAIK,MOHAMMED MAJEED,BUCHI PAVITHRA, KANAKALA.SAIKUMAR, and N. SOUJANYA. "Decentralized Social Media Platforms: Enhancing Privacy, Security and User Control Using Blockchain Technology." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.304.

Search & Index

References


  1. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash  System,"  2008.  [Online].Available: https://bitcoin.org/bitcoin.pdf

  2. Buterin, "Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform," Ethereum White Paper, 2013.

  3. Luu, D. Chu, H. Olickel, P. Saxena, andHobor, "Making Smart Contracts Smarter," in Proc. ACM SIGSAC Conf. CCS, 2016, pp. 254-269.

  4. Li, Y. Wu, and L. Chen, "A Blockchain- Based Decentralized Social Media Platform with IPFS Storage," IEEE Access, vol. 8, pp. 71762-71773, 2020.

  5. Al-Shaer, "Deception in Cybersecurity: Techniques and Applications," Springer, 2016.

  6. Pawlick, E. Colbert, and Q. Zhu, "A game- theoretic taxonomy and survey of defensive deception for cybersecurity and privacy," ACM Computing Surveys, vol. 52, no. 4, pp. 1-30,2019.

  7. Shen, J. Wei, and Y. Liu, "Hypergame theory-based proactive defense for APTs in cyber systems," IEEE Access, vol. 9, pp. 11534- 11547, 2021.

  8. Huang, J. Wang, X. Li, and T. Zhang, "Modeling multi-stage APTs using dynamic Bayesian networks and game theory," Future Generation Computer Systems, vol. 107, pp. 544-555, 2020.

  9. Durkota, V. Lisy, B. Bosansky, and C. Kiekintveld, "Game-theoretic models for security analysis of networked systems," ACM TIST, vol. 8, no. 4, pp. 1-29, 2017.

  10. Zhu and T. Basar, "Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems," IEEE Control Systems Magazine, vol. 35, no. 1, pp. 46-65, 2013.

  11. Roy et al., "A survey of game theory as applied to network security," in Proc. 43rd Hawaii Int. Conf. System Sciences, 2010, pp. 1- 10.

  12. E. Carroll and D. Grosu, "A game theoretic investigation of deception in network security," Security and Communication Networks, vol. 4, no. 10, pp. 1162-1172, 2011.T. Alpcan and T. Basar, "Network security: A decision and game-theoretic approach," Cambridge University Press, 2010

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: Apr 13 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top