Residual LSTM to Execute Access Control Procedure in Blockchain and Data Integrity Through Proxy Re-Encryption Using Elliptical Curve Cryptography | IEEE Conference Publication | IEEE Xplore