Fake News Detection Using Blockchain
Fake News Detection Using Blockchain
https://doi.org/10.22214/ijraset.2022.41132
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue III Mar 2022- Available at www.ijraset.com
Abstract: Due to fast growth in the data day by day it’s a very difficult task to find out original information from the
content. Social media helps us a lot to get information and deliver us on time. As people are more habituated towards social
media and find the news from different resources some times the fake news also impacts people a lot in their day-to- day life.
Blockchain technology helps people to get the proper information in various sectors like as food sector, fashion world, supply
chain, as well as banking sectors. The broadcast and transparent nature of blockchain can help in the above sector enhance
the technology as well as helps to detect the fact news in the current situation. In this paper, we gave a complete idea about the
blockchain technology methods and techniques used widely in fake news detection. We can acquire this technique by combining
and modifying the blockchain technique by applying the Text Mining (TM) algorithm. The above research paper talks about
a brief research method on blockchain technology, It’s an outcome of testing data that clearly defines and represents the
importance of the blockchain method in the implementation technique. Here the main goal of the paper is to find a security
system ledger.
Keywords: Component; fake news detection; text mining;blockchain; detection algorithms words;
I. INTRODUCTION
“Nowadays due to spread of false rumors or news that might cause insecurity among common general people and system which people
are following or security, Providing incorrect information tends to carry a sentence of imprisonment for some years.” Fighting
information crimes” Involvement of some common people in this illegal activities may arise and affect public order, may cause a
problem for them and also they may punish over a period of more and more years, and it can also put them in problem for them a
period to come out from the situation. These are the issues that challenge the researcher to get out the resultant solution to the
outcome and to provide proper information to the common people to avoid the crime and as well as to be aware of the proper
information. When digital content is shared, with the media and video or pictures of any event, it’s very difficult to find out the
authenticity and credibility of that particular news. It will mislead the people and forced them to involve in criminal activities.
Due to insufficient information, people can’t have faith in the news detection system. Day by day due to the fast growth of the digital
world making digital content and writing the report makes us very easy. Fake news creates wrong thoughts among the people and in
their minds too, to make it resolve we need to find the originality of the content and represent it to the people.
Whereas, putting an end to doing wrong things will affect people a lot concerning their career.
There are several processes to implement a special approach to handle the process of fake news by applying the algorithms
and different techniques. We need to approach different rules and regulations needs to adjust the functional and behavioral
approach of the model to enhance the trust among people.
In the above research problem, one major challenge is to upgrade the decentralization of social networks by minimizing the spread
of fake news and to verify the fake news detection properly.
After doing a general competitive study in this paper describe
1) It gives complete analysis and detection of the fake news on social networks.
2) Verify the source integrity of information and find out thereality of the following content.
3) Identify the rank from the content and analyze it as per thenode's importance.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2442
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue III Mar 2022- Available at www.ijraset.com
Apart from that propagation-based deception helps to explore the contents of propagation of the article and credibility-based
detection refers to using the article source to determine its authenticity. Blockchain technology is used to trace the source
regarding the fake news and then determine its accuracy to find out the fake news and identify the false contents before reaching to
the general people. It helps us to identify the fake news and identify the resources spreading the false news. As per the survey of
Wenqian Shang et. al. (2018), many systems can be used to detect the past for fake news and trace and detect false information
using blockchain. Proposes a blockchain-based system can be useful for finding source evaluation and it makes sure that the news
article has not been exposed to others. Also, there are different methods such as the multi- model approach, and different algorithms
are used to find out the fake news from different social media and internet resources. The current research work is based on the
following work of the implementation techniques and methods to identifythe problem statement and detection of fake news.
Figure 2 describes distributed and centralized architectures are given in above. The circles in the figure represent nodes, which
interconnected each other. The edges represent connections between one node to another in the above figure. The righthand side
of Figure 2 describes all nodes are interconnected to a centralized node, whereas another figure clearly describes all the nodes
connected in a decentralized architecture. It is essential to check that none of the components is directly connected with all other
components. System architecture describes all the nodes that are directly or indirectly somehow connected. The right-hand side of
the Figure describes the centralized architecture, where all the nodes are connected to a central system. The components are not
connected directly. They only have one direct connection to the central component. Information passing from one node to another
will differ from a distributed architecture to centralized architecture.
The distributed and centralized architectures both represent different nodes of the systems and each and every node connected
among each other to pass the information from one node to the other node. The advantage of the distributed system is if in case any
of the networks got disconnected also there may be a chance of passing the information from one node to the other node. But in the
case of centralized architecture if any one of the connections will be lost it tends to disconnect of all the nodes. These are the two
types of architectures that can be used to represent the data and pass the information throughout the process. Mostly in the
distributed architecture used here.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2443
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue III Mar 2022- Available at www.ijraset.com
A. Detection Method
Blockchain technology is a decentralized system that helps to find out the different nodes and relations among them. It distinguishes
each and every node starting from the master node. Master nodes can be reliable nodes such as social media, google, Facebook, and
Twitter, etc. Master nodes are the nodes based on the result of good or bad. Each and every node starts from the master node and is
followed by the sub-nodes. Each and every node contains the master nodes which is a highly secure process and we can not change
the nodes without permissions. Here the data security and privacy are very high and very difficult to threaten the data. Here the data
are collected together and will do indexing as per the indexing data’s are arranged together. As it’s very little chance of theft of data
from the hyper ledger. Our proposed method defines to identify the blocks from the content and the important nodes will be
filtered from the context. It will help to minimize the redundancy of the text. Due to this, we can reduce the redundant content of the
text. The main research method of the text to avoid fake news and to deliver important content to the common people.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2444
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue III Mar 2022- Available at www.ijraset.com
V. CONCLUSION
To avoid fake rumors in different social media here we are describing the concept of blockchain technology to avoid these kinds of
fake rumors and the main goal of the process is to Deliver correct information to the user. Here we are using different technologies
and algorithms to solve these techniques and mainly the BFS algorithm to find the important content from the text and analyze its
importance then it will create the content.
It can also detect redundant content which can be tested from various resources or from the existing news. The basic purpose of this
method is to enhance the content and identify the fault content from the text and deliver the original content from the text. This
method proposed a test methodology to identify the false news from the content and test the truth or false with respect to various test
cases.
The method started with identifying different algorithms and different search techniques to find out the fake news. Here we are
proposing various techniques to come out from the previous techniques and by adopting new techniques to enhance the research
method.
REFERENCES
[1] http://www.wordnet-online.com/anthropology.shtml.
[2] S. W. H. L. K. She, Understanding User Profiles on Social Media for Fake News Detection, Semantic-scholar, 2019.
[3] A. A. Monther Aldwairi, Detecting Fake News in Social Media Networks, Abu Dhabi: ScienceDirect, 2018.
[4] P. C. R. S. S.-S. a. J. T. Hamid Karimi, "Multi-Source Multi-Class Fake News Detection," in InternatonalInternational Conference on Computational Linguistics,
Michigan State, 2020.
[5] E. N. S. Mohamed Torky, "Proof of Credibility: A Blockchain Approach for Detecting and Blocking Fake News in Social Networks," International Journal of
Advanced Computer Science and Applications, vol. 10, 2019.
[6] J. J. T. Zonyin Shae, "AI Blockchain Platform for Trusting News," inIEEE 39th International Conference on Distributed Computing Systems (ICDCS), 2019
[7] J. I. J. S. S. H. S. S. A., K. D. S. Paul, " Fake News Detection in Social Media using Blockchain," in 7th International Conference on Smart Computing &
Communications (ICSCC), Sarawak, Malaysia, 2019.
[8] "NewsCop | Fake News Detector," Devkey, [Online]. Available: https://play.google.com/store/apps/details? id=com.surajgiri.newsage &hl =en_US. [Accessed
10th March2020].
[9] "ELISA - Fake News Detector," RoboMx, [Online]. Available: h t t p s : / / p l a y . g o o g l e . c o m / s t o r e / a p p s / d e t a i l s ? id=tech.robomx.elisa&hl=e n_
US.[Accessed 10th March 2020].
[10] S. Parikh and P. Atrey, "Media-Rich Fake News Detection: A Survey,"
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2445