A Novel Security Algorithm RPBB31 for Securing the Social Media Analyzed Data using Machine Learning Algorithms

The present world data is most important in public because without data cannot live in the world. This data is big data and that data daily increases through Social Media like “Twitter, Facebook, Youtube, WhatsApp, Instagram, LinkedIn”, etc.., because this media only share public opinion very fast through the net. From this media, more people used especially Twitter. Thus media are used to analyze the public opinion of the tweets and predict the future through Machine Learning Algorithm. This analyzed data should make it polarity score. This score data has very little security because, this score can change the score and affected the future, so apply the existing security algorithms is Salsa and ChaCha. The Salsa algorithm is diagonal values moved to the first row. The ChaCha algorithm is diagonal values moved to the first column. The existing algorithms do not have good security because they focused only on performance, not security. So, the novel security algorithm is RPBB31. This algorithm has seven stages. The 1st stage is to find the secret key N, n, and p values from the matrix. The 2nd stage is to apply the secret key in PN(n) operation. The 3rd stage operation of PN(n) up to n = 1. The 4th stage is all PN(n) operations make their single line. The 5th stage is to pair the values and swap the values in the matrix. The 6th stage is column operations in the matrix. The 7th stage is again Step 4 values used to swap but “0th" cell value start from reverse in the matrix. In world cricket is the most famous game. In all social media Millions of people are following in different manner, especially in indian cricketer are more famous in India and world. In some point of time it may lead to match fixing, betting. To overcome this kind of issue the four datasets chosen. The proposed algorithm has provide good security and performance while compare to existing algorithms.


Introduction
In the present world, daily increased the data is big data through social media such as Twitter, Facebook, etc.… Big data is a huge amount of data that are quickly moved to a lot of fields. Big data has 3 characteristics like Volume, Velocity, and variety. Volume: is the size of the data. Velocity: is processing the data. Variety: is data generated from different sources are shown in Fig. 1.
Twitter: Toady is one of the most popular media in public is Twitter. This media used to tweet anybody, anytime and anywhere in the world through the net. These tweets were used to analyze the three things such as positive and symbol is ' + ', negative and symbol is '−', and neutral. Table 1 shows the analysis of 1st tweet: "I am not interested to see this movie because very boring" ("Class: Negative"), "these words have two negative words and one positive word, so it is considered to be negative tweets". Table 2 shows the analysis of the 2nd tweet: "I like this movie to see both mobile and TV" ("Class: positive"), "these words have one positive word and no negative word, so it is positive tweets". Table 3 shows the analysis of 3rd tweet: "I not like this movie so not interested to see this movie". ("Class: Neutral"), "These words have two negative words and positive words, so it is neutral tweets".
These analyzed things are used to predict the future and make it polarity score in Table 4, through Machine Learning Algorithms.
From Fig. 2, the classification algorithm concept is yes or no. The random forest algorithm concept is Mean Square Error. The naive Bayes algorithm concept is the probability of class and condition. Support Vector Machine algorithm concept is classification and regression, but classification problems are only used more times. The decision tree concept is a representation of the tree. The artificial Neural Network concept is the backpropagation method.
In the present world, social media is very important and fastest share people's opinions in public. For example, Twitter, Facebook, Whatsapp, youtube, Instagram, Linkedin, etc.., are used by people to share information like sports, movies, politics, government jobs, etc.…      [1] This media, particularly choose Twitter, is used to analyze the opinion of the tweets and predict the future. These analyzed tweets are very important for prediction. This prediction data has less security because this data can change the future, so apply the existing security algorithm is Salsa and ChaCha. The Salsa algorithm is diagonal values moved to the first row. This algorithm is a quarter-round process and the performance of encryption running time is fast. The ChaCha algorithm is diagonal values moved to the first column. This algorithm also quarter round process and the performance of the encryption time is fast. The existing algorithms do not have good security because they focused only on performance, not security. So, the novel security algorithm is RajPrakash BagathBasha (RPBB) 31.

Literature Survey
The sentiment analysis with machine learning algorithms are compared the performance for more algorithms and showed the classification algorithm is very easy to understand [1]. The proposed algorithm CBB21 and compared the running time with Salsa [2] [3]. They discuss the tweets and security algorithm is CBB20. The CBB20 proposed algorithm is compared the encryption time with Salsa [4]. They studied the Twitter analysis and security algorithm. The proposed security algorithm is SRB21 and compared the running time for encryption with Salsa [5]. They mainly discuss the prediction of the future by twitter and security. The security algorithm is SRB18 is compared the encryption running time with Salsa [6]. They studied the cryptography algorithm is RBJ25 and compared the encryption performance with ChaCha [7] and AES [8]. The proposed security algorithm is RB20 and calculate the encryption running time is compared with the performance with Salsa and AES [9]. The CBB22 algorithm is proposed and provides the security of generalized data. This algorithm is compared the performance of both encryption and decryption time with Salsa and AES [10]. The SRB21 phase 1 algorithm is proposed for the security of Twitter data. This algorithm is compared both encryption and decryption running time with Salsa20/4 [11]. The main analyze the feedback of movies through sentiment analysis by classification and SVM algorithms [12]. The Proposed algorithm is RB21 and mainly used prime numbers for security and compared with AES and Salsa [13]. The RB29 algorithm is a property of commutative & associative and provides good security while compared with the Salsa algorithm [14]. The RB27 algorithm has two main processes are quadratic equation and perfect numbers, and security is good while compared with the ChaCha algorithm [15]. The RB23 algorithm is a prime number with quadratic equations and security is good while compared to ChaCha [16]. The "hybrid machine learning model is compared with other machine learning algorithms" [17]. They analysis the tweets through a machine learning algorithm and compared the predictions with World2vec [18]. They designed the stream of RCR-32 and RCR-64 with calculating of probability [19] and RBJ20 [20].

Research Methodology
Twitter has been used to analyze tweets and predict the future by machine learning algorithms [1]. This analyzed data used to apply the proposed methodology is RPBB31. This methodology has seven stages. The 1st stage is to find the secret key N, n, and p values from the matrix. The 2nd stage is to apply the secret key in P N (n) operation. The 3rd stage operation of P N (n) up to n = 1. The 4th stage is all P N (n) operations make their single line. The 5th stage is to pair the values and swap the values in the matrix. The 6th stage is column operations in the matrix. The 7th stage is again Step 4 values used to swap but "0th" cell value start from reverse in the matrix. For example, 3 × 3 matrix has 9 values like 0,1,2,3,4,5,6,7, and 8. Now, assign 8th cell value is 0th cell value, 7th cell value is 1st cell value, 6th cell value is 2nd cell value, 5th cell value is 3rd cell value, 4th cell value is 4th cell value, 3rd cell value is 5th cell value, 2nd cell value is 6th cell value, the 1st cell value is 7th cell value, 0th cell value is 8th cell value. Figure 3, shows the encryption process of the RPBB31 methodology. The RPBB31 methodology encryption process is a secret key, PN(n) operation, shift columns, and again PN(n) operation but the "0th" cell value starts from reverse in the matrix.
The pair 2 value is 0 and 3. The 0th place value is "2101/7" and 3rd place value is "2104/7" in the RBE matrix. To swap the value 2101/7 is to 3rd place in the RBE matrix and the value 2104/7 is to 0th place in the RBE matrix.
The pair 3 value is 0 and 2. The 0th place value is "2104/7" and 2nd place value is "2108/7" in the RBE matrix. To swap the value 2104/7 is to 2nd place in the RBE matrix and the value 2108/7 is to 0th place in the RBE matrix.

Pair 4: (0,5)
The pair 4 value is 0 and 5. The 0th place value is "2108/7" and 5th place value is "2106/7" in the RBE matrix. To swap the value 2108/7 is to 5th place in the RBE matrix and the value 2106/7 is to 0th place in the RBE matrix.
Pair 5: (8,0) The pair 5 value is 8 and 0. The 8th place value is "2109/7" and 0th place value is "2106/7" in the RBE matrix. To swap the value 2106/7 is to 8th place in the RBE matrix and the value 2109/7 is to 0th place in the RBE matrix.
The pair 6 value is 1 and 0. The 1st place value is "2102/7" and 0th place value is "2109/7" in the RBE matrix. To swap the value 2102/7 is to 0th place in the RBE matrix and the value 2109/7 is to 1st place in the RBE matrix.

Pair 7: (5,8)
The pair 7 value is 5 and 8. The 5th place value is "2108/7" and 8th place value is "2106/7" in the RBE matrix. To swap the value 2108/7 is to 8th place in the RBE matrix and the value 2106/7 is to 5th place in the RBE matrix.

Pair 8: (4,0)
The pair 8 value is 4 and 0. The 4th place value is "2105/7" and 0th place value is "2102/7" in the RBE matrix. To swap the value 2105/7 is to 0th place in the RBE matrix and the value 2102/7 is to 4th place in the RBE matrix.

Pair 9: (4,5)
The pair 9 value is 4 and 5. The 4th place value is "2102/7" and 5th place value is "2108/7" in the RBE matrix. To swap the value 2102/7 is to 5th place in the RBE matrix and the value 2108/7 is to 4th place in the RBE matrix.

Pair 10: (3,6)
The pair 10 value is 3 and 6. The 3rd place value is "2101/7" and 6th place value is "2107/7" in the RBE matrix. To swap the value 2101/7 is to 6th place in the RBE matrix and the value 2107/7 is to 3rd place in the RBE matrix.
The pair 11 value is 0 and 0. The both values are same place; so cannot swap the values in the RBE matrix.
The first column operations are changed in the RBE matrix like 1st column values will be swapped into 5th column places and 5th column values will be swapped into 1st column places in the matrix.
The second column operations are changed in the RBE matrix like 2nd column values will be swapped into 4th column places and 4th column values will be swapped into 2md column places in the matrix.
Encryption and Reverse Pair 1: (7,2) The pair 1 value is 7 and 2. The 7th place value is "2118/7" and 2nd place value is "2123/7" in the RBE matrix. To swap the value 2118/7 is to 2nd place in the RBE matrix and the value 2123/7 is to 7th place in the RBE matrix.
The pair 2 value is 0 and 3. The 0th place value is "2121/7" and 3rd place value is "2124/7" in the RBE matrix. To swap the value 2121/7 is to 3rd place in the RBE matrix and the value 2124/7 is to 0th place in the RBE matrix.

Pair 3: (0,2)
The pair 3 value is 0 and 2. The 0th place value is "2124/7" and 2nd place value is "2118/7" in the RBE matrix. To swap the value 2124/7 is to 2nd place in the RBE matrix and the value 2118/7 is to 0th place in the RBE matrix.

Pair 4: (0,5)
The pair 4 value is 0 and 5. The 0th place value is "2118/7" and 5th place value is "2116/7" in the RBE matrix. To swap the value 2118/7 is to 5th place in the RBE matrix and the value 2116/7 is to 0th place in the RBE matrix.

Pair 5: (8,0)
The pair 5 value is 8 and 0. The 8th place value is "2119/7" and 0th place value is "2116/7" in the RBE matrix. To swap the value 2119/7 is to 0th place in the RBE matrix and the value 2116/7 is to 8th place in the RBE matrix.
The pair 6 value is 1 and 0. The 1st place value is "2122/7" and 0th place value is "2119/7" in the RBE matrix. To swap the value 2122/7 is to 0th place in the RBE matrix and the value 2119/7 is to 1st place in the RBE matrix.

Pair 7: (5,8)
The pair 7 value is 5 and 8. The 5th place value is "2118/7" and 8th place value is "2116/7" in the RBE matrix. To swap the value 2118/7 is to 8th place in the RBE matrix and the value 2116/7 is to 5th place in the RBE matrix.

Pair 8: (4,0)
The pair 8 value is 4 and 0. The 4th place value is "2125/7" and 0th place value is "2122/7" in the RBE matrix. To swap the value 2125/7 is to 0th place in the RBE matrix and the value 2122/7 is to 4th place in the RBE matrix.

Pair 9: (4,5)
The pair 9 value is 4 and 5. The 4th place value is "2122/7" and 5th place value is "2116/7" in the RBE matrix. To swap the value 2122/7 is to 5th place in the RBE matrix and the value 2116/7 is to 4th place in the RBE matrix.

Pair 10: (3,6)
The pair 10 value is 3 and 6. The 3rd place value is "2121/7" and 6th place value is "2117/7" in the RBE matrix. To swap the value 2121/7 is to 6th place in the RBE matrix and the value 2117/7 is to 3rd place in the RBE matrix.

Pair 11: (0,0)
The pair 11 value is 0 and 0. The both values are same place; so cannot swap the values in the RBE matrix.

Working of Decryption Algorithm
• The secret keys are n = 4 and p = 7.
where RBD-R is Raj Bagath

Decryption and Reverse
The pair 1 value is 0 and 0. The both values are same place; so cannot swap the values in the RBD matrix.

RBD -R =
The pair 2 value is 6 and 3. The 6th place value is "2121/7" and 3rd place value is "2117/7" in the RBD matrix. To swap the value 2121/7 is to 3rd place in the RBD matrix and the value 2117/7 is to 6th place in the RBD matrix. The pair 3 value is 5 and 4. The 5th place value is "2122/7" and 4th place value is "2116/7" in the RBD matrix. To swap the value 2122/7 is to 4th place in the RBD matrix and the value 2116/7 is to 5th place in the RBD matrix.

Pair 4: (0,4)
The pair 4 value is 0 and 4. The 0th place value is "2125/7" and 4th place value is "2122/7" in the RBD matrix. To swap the value 2125/7 is to 4th place in the RBD matrix and the value 2122/7 is to 0th place in the RBD matrix.

Pair 5: (8,5)
The pair 5 value is 8 and 5. The 8th place value is "2118/7" and 5th place value is "2116/7" in the RBD matrix. To swap the value 2118/7 is to 5th place in the RBD matrix and the value 2116/7 is to 8th place in the RBD matrix.

Pair 6: (0,1)
The pair 6 value is 0 and 1. The 0th place value is "2122/7" and 1st place value is "2119/7" in the RBD matrix. To swap the value 2122/7 is to 1st place in the RBD matrix and the value 2119/7 is to 0th place in the RBD matrix.

Pair 7: (0,8)
The pair 7 value is 0 and 8. The 0th place value is "2119/7" and 8th place value is "2116/7" in the RBD matrix. To swap the value 2119/7 is to 8th place in the RBD matrix and the value 2116/7 is to 0th place in the RBD matrix.

Pair 8: (5,0)
The pair 8 value is 5 and 0. The 5th place value is "2118/7" and 0th place value is "2116/7" in the RBD matrix. To swap the value 2118/7 is to 0th place in the RBD matrix and the value 2116/7 is to 5th place in the RBD matrix.

Pair 9: (2,0)
The pair 9 value is 2 and 0. The 2nd place value is "2124/7" and 0th place value is "2118/7" in the RBD matrix. To swap the value 2124/7 is to 0th place in the RBD matrix and the value 2118/7 is to 2nd place in the RBD matrix.

Pair 10: (3,0)
The pair 10 value is 3 and 0. The 3rd place value is "2121/7" and 0th place value is "2124/7" in the RBD matrix. To swap the value 2121/7 is to 0th place in the RBD matrix and the value 2124/7 is to 3rd place in the RBD matrix.
Pair 11: (2,7) The pair 11 value is 2 and 7. The 2nd place value is "2118/7" and 7th place value is "2123/7" in the RBD matrix. To swap the value 2118/7 is to 7th place in the RBD matrix and the value 2123/7 is to 2nd place in the RBD matrix.
The first column operations are changed in the RBE matrix like 1st column values will be swapped into 5th column places and 5th column values will be swapped into 1st column places in the matrix.
The second column operations are changed in the RBE matrix like 2nd column values will be swapped into 4th column places and 4th column values will be swapped into 2md column places in the matrix.
where RBD-R is Raj Bagath

Decryption and Reverse
The pair 1 value is 0 and 0. The both values are same place; so cannot swap the values in the RBD matrix.

Pair 2: (6,3)
The pair 2 value is 6 and 3. The 6th place value is "2101/7" and 3rd place value is "2107/7" in the RBD matrix. To swap the value 2101/7 is to 3rd place in the RBD matrix and the value 2107/7 is to 6th place in the RBD matrix.

Pair 3: (5,4)
The pair 3 value is 5 and 4. The 5th place value is "2102/7" and 4th place value is "2108/7" in the RBD matrix. To swap the value 2102/7 is to 4th place in the RBD matrix and the value 2108/7 is to 5th place in the RBD matrix.

Pair 4: (0,4)
The pair 4 value is 0 and 4. The 0th place value is "2105/7" and 4th place value is "2102/7" in the RBD matrix. To swap the value 2105/7 is to 4th place in the RBD matrix and the value 2102/7 is to 0th place in the RBD matrix.

Pair 5: (8,5)
The pair 5 value is 8 and 5. The 8th place value is "2106/7" and 5th place value is "2108/7" in the RBD matrix. To swap the value 2106/7 is to 5th place in the RBD matrix and the value 2108/7 is to 8th place in the RBD matrix.
The pair 6 value is 0 and 1. The 0th place value is "2102/7" and 1st place value is "2109/7" in the RBD matrix. To swap the value 2102/7 is to 1st place in the RBD matrix and the value 2109/7 is to 0th place in the RBD matrix.

Pair 7: (0,8)
The pair 7 value is 0 and 8. The 0th place value is "2109/7" and 8th place value is "2108/7" in the RBD matrix. To swap the value 2109/7 is to 8th place in the RBD matrix and the value 2108/7 is to 0th place in the RBD matrix.

Pair 8: (5,0)
The pair 8 value is 5 and 0. The 5th place value is "2106/7" and 0th place value is "2108/7" in the RBD matrix. To swap the value 2106/7 is to 0th place in the RBD matrix and the value 2108/7 is to 5th place in the RBD matrix.

Pair 9: (2,0)
The pair 9 value is 2 and 0. The 2nd place value is "2104/7" and 0th place value is "2106/7" in the RBD matrix. To swap the value 2104/7 is to 0th place in the RBD matrix and the value 2106/7 is to 2nd place in the RBD matrix.
The pair 10 value is 3 and 0. The 3rd place value is "2101/7" and 0th place value is "2104/7" in the RBD matrix. To swap the value 2101/7 is to 0th place in the RBD matrix and the value 2104/7 is to 3rd place in the RBD matrix.

Pair 11: (2,7)
The pair 11 value is 2 and 7. The 2nd place value is "2106/7" and 7th place value is "2103/7" in the RBD matrix. To swap the value 2106/7 is to 7th place in the RBD matrix and the value 2103/7 is to 2nd place in the RBD matrix.

Result and Discussion
The "proposed algorithm RPBB31encryption performance compared with Salsal and Cha-Cha". Salsa concept is the "all diagonal values move to the 1st row and ChaCha concept is the all diagonal values move to the 1st column".
The "three by three matrix has 24 bytes of file size"; the "six by six matrix has 76 bytes of file size"; the "ten by ten matrix has 312 bytes of file size"; the "fifteen by fifteen matrix has 812 bytes of file size"; the "twenty by twenty matrix has 1531 bytes of file size", and the "forty by forty matrix has 6580 bytes of file size as shown in Tables 5 and 6". From Fig. 4, the RPBB31 method and "has compared the encryption speed in seconds". The "encryption performance of the speed 1.69 (s), 1.29 (s), 2.73 (s), 2.64 (s), 3.4 (s), and 2.27 (s) for the ChaCha", 3.4 (s), "2.2 (s), 2.3 (s), 3.9 (s), 9.1 (s) and 10.5 (s) for the Salsa" and 6 (s), 6.2 (s), 7.5 (s), 8.9 (s), 10.6 (s) and 14.5 (s) for the RPBB31. The RPBB31 "gives more protection of the data; when compared to existing techniques".

Conclusion
In today's world data is most important in public because without data cannot live in the world. This data is big data and that data daily increases through "Twitter". This media is used to analyze the public opinion of the tweets and predict the future through Machine Learning Algorithm and used to make it polarity score; and the score has very less security because, this score can change the score and affected the future, so apply the existing security algorithms is Salsa and ChaCha. These algorithms are not providing good security because they focused only on performance, not security. So, the proposed security algorithm is RPBB31. This algorithm has seven stages. The 1st stage is to find the secret key N, n, and p values from the matrix. The 2nd stage is to apply the secret key in P N (n) operation. The 3rd stage operation of P N (n) up to n = 1. The 4th stage is all P N (n) operations make their single line. The 5th stage is to pair the values and swap the values in the matrix. The 6th stage is column operations in the matrix. The 7th stage is again Step 4 values used to swap but "0th" cell value start from reverse in the matrix. The RPBB31 algorithm has  Funding There was no financial support received from any organization for carrying out this work.

Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.

Conflict of interest
The authors declare no potential conflicts of interest with respect to the research, authorship, and/or publication of this article. To the best of my knowledge and belief any actual, perceived or potential conflicts between my duties as an employee and my private and/or business interests have been fully disclosed in this form in accordance with the requirements of the journal.
Ethical Approval This material is the authors' own original work, which has not been previously published elsewhere. The paper is not currently being considered for publication elsewhere. The paper reflects the authors' own research and analysis in a truthful and complete manner.
Consent to Participate I have been informed of the risks and benefits involved, and all my questions have been answered to my satisfaction. Furthermore, I have been assured that any future questions I may have will also be answered by a member of the research team. I voluntarily agree to take part in this study.

Consent for Publication
Individuals may consent to participate in a study, but object to having their data published in a journal article.

Fig. 5 Decryption performance
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.