SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 265
Whistle blower protection using block chain
Rahul Roy Munna Kalakanda1, Ramya Yadav Kavali2
1,2Bachelor of Engineering, University College of Engineering, Osmania University, Hyderabad
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract –This paper explains the concept of whistle blower
protection by using the principle of blockchain. It attempts to
highlight the role of the whistle blower application in shaping
the future of the society.
Key Words: blockchain, hyper ledger, proof of access, smart
contracts, whistle-blower.
1. INTRODUCTION
Whistleblowers are the people/persons who exposes or
reports the activities and people involved in the violation of
acts, laws, corrupt practices etc.Theactivitiesof wrongdoing
can be anything which violates the laws, fraud, corruption,
threat to public interests, etc. We need such people with
social responsibility in our society in order to maintain
harmony and raise voice against the misuse of power by
officials. This helps to maintain democracy in the country.
It’s the duty of the government to protect whistleblowers so
that that they can lead a life without the fear of threat from
officials. Now a days many whistleblowersinourcountry are
getting murdered. According to statistics in past few years,
more than 20 whistleblowers were murdered and nearly 70
people who filed a case of the uncertainty in various
departments were killed. Because of these incidents,there is
a rise in fear in the people to complain against the unlawful
things in government. Because of this, gradually democracy
will become dictatorship of people who have power.
In order to reduce scams, corruption and to uplift the
democracy in the country we need stringent laws to be
enacted. A whistle blower in our country needs to give his
details for successful filing of complaint. In manycasesthese
given details come out and this leads to death of that
whistleblower.
So in this paper we propose a way by which we can
indirectly protect the whistleblower. He can file a complaint
without the fear of getting identified by anyone. He can
maintain anonymity while filing case.
Blockchain is a virtual, distributed databasethatmaintainsa
shared list of records without the need of an intermediary.
Here the database is made up of blocks. In a blockchain the
records are connected to each other using a hash function
mostly sha265. This is one of the most secure hashing
algorithms. The structure of the block consists of the data of
the block, hash of that block and hash of the previous block.
Hence blockchain is a continuous growing list of records
which are resistant to any modifications.
Fig -1: Working of Blockchain
In this application, we record the complaints filed by the
whistleblowers and use the blockchain technology to store
the data and maintain anonymity of the users.
2. PROPOSED MODEL
The following are the components of the proposed model:
1. Website with aadhar API integration for verifyingtheuser
2. Sawtooth hyper ledger for maintaining the anonymity
3. Smart contracts for differentiating the spam and case.
4. Hierarchy model for blockchain to view the complaints.
Website with aadhar API integration for verifying the
user:
Aadhar data is available as an API service. In our application
we can use the Sub-AUA(Aadhar User Agency) approach to
leverage the Aadhar data for authentication purpose. Sub-
AUA Approach: There are few third party Aadhaar
authentication services which offer their platform as a
service. These organizations go through the process of
registration with the UID (Unique Identification)andhelp us
get a Sub-AUA license. Now a days platforms like Aadhar
Bridge, Aadhar API, ekyc online has a developer friendly
platform where one can leverage UID for Authenticationand
eKYC.
The website will be a user-friendly interface where we use a
third party aadhar API for authentication of the user. The
aadhar api sends an OTP to registered mobile when the user
enters his name and aadhar number or VID. The user needs
to go through this process every time he wishes to view the
complaints or file a complaint. After authentication user
enters in to next page where he can see two buttons “ file a
complaint” & “view exiting complaints”. Whenuserclicksthe
view the complaints button, he will be asked to select from
the two options valid complaints and invalid complaints
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 266
(spam). When he selects either of the options he will be
allowed to see all the complaints in that particular option in
the public ledger with proofs which are linked with hash
function of a userid. Against each valid complaint, the user
can see two buttons resolved and open. Against each invalid
complaint user can see an upvote button. When user clicks
on file a complaint button he moves to another page where
he needs to select state, district, department and under
which governmentdepartmentthecomplaincomesunderi.e
either central or state. Then he proceeds to next page where
he needs to select the authority and he needs to write a
complaint. The user is provided with an option to attach the
proofs like videos, documents, etc which are linked to his
complain.
Sawtooth hyper ledger for maintaining the anonymity:
Here we selected the use of Sawtooth hyper ledger for two
things,
a) Permissioned blockchain mechanism: In this
permissioned blockchain mechanism the authentication of
transaction is given to an authorityinanarea toauthenticate
the transaction i.e the complaint filed by a person. He has to
even authenticate the complaintasresolvedandcloseitonce
the resolution is obtained. In order to avoid the human
errors in it, we propose an algorithm i.e. proof of access
which works instead of proof of work.
In order to avoid human interference or human error we
propose an algorithm instead of proof of work in blockchain
in smart contract.
Proof of access (POA): This algorithm makes sure that the
person who authenticates the transaction needs to
categorize the transaction as a valid or invalid within 48
hours or any time period. Either a new complaint will be
moved into of the blockchain i.e valid complaints or invalid
complaints (spam). Depending on the authentication given
by him as valid or invalid respectively. If he does notgivethe
authentication within 48 hours or any time period then the
new complaint will be automatically considered as validand
goes into valid complaint blockchain. By using proof of
access we can reduce the manipulations by humans. There
are different cases involved in authenticating a transaction
or complaint as valid or spam. The variouspossiblecasesare
explained as follows.
Case (1): We have the appointed person who needs to
authenticate the complaint. There may be a case where he
wantedly ignores to authenticate the complain. In this case
we fix a time period in the proof of access algorithm, such
that the action needs to be taken on the complaint within
that time span. Otherwise the complaint is marked as valid
after completion of time period.
Case (2): There may be a case where the person may
categorize the transaction as an invalid transaction for the
benefit of the party on whom the complaint is raised. In
order to avoid this every block in spam folder is added with
upvote button. By this if specified number of people upvote
for it to be valid complain, the content in the blockchain will
be copied to the valid complaint chain nothing but
duplicating it. The specific time intervals and different IP’s
are considered in order to avoid the malpractice using bots.
By this only one vote from an IP address is accepted ata time
interval.
Case (3): Similar to upvote button there will be a resolved
button in the valid transaction blockchain. By using this
button, the complaint can be closed after a resolution is
obtained. There may be a case where the complain has been
intentionally closed as resolved by the official appointed to
authenticate the complaints. In such case the users can
upvote for a closed complaint and reopen it. Thus it will be
moved to the valid block chain of open complaints.
b) Parallel transactions: This feature of sawtooth hyper
ledger enables us to do transactions independent of others
which means at a time multiple users can perform
transactions. So it enables multiple users to perform
transactions at a time. We createdifferent blockchainsbased
on area and department. By this we maintain different types
of blockchains and any one can view the transactions by
authenticating himself with Aadhar API and by selecting the
department and area.
Smart contracts:
Smart contracts is a computer protocol, which is intend to
perform certain operations. In order to reduce the third
parties in the applications, we use smart contracts to
perform various protocols.
i. To authenticate the user and allow him by the use of
aadhar api
ii. To authenticate transactions if ittakesmorethan48hours
iii. To perform parallel transactions
iv. To copy the same data in spam to complaintsblockchainif
condition is valid
v. To copy or print any of the transactions in the public
ledger.
vi. Not to add some restricted department complaints in
public ledger and add it to private blockchainwhichcanonly
be seen by CBI, ACB
vii. To open the closed complaint by the people who feel it is
not closed and still need to be addressed
Hierarchical model for blockchain to view the
complaints:
The higher officials of a region will be able to view the
complains of that region. In order to view the complaint and
the status of the complaint filed at different regions, we
interconnect each block chain of each department using a
specified hierarchy model. In this model, the blockchain of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 267
state is connected to genesis block of district blockchain in
which each block of district is connected to genesis block of
region blockchain andsoon.Inregion blockchain complaints
are added as blocks. This complaints are authenticated by
regional person who are incharge of it. These complaintsare
viewed by higher officials upto state level. By this hierarchy
model the higher officials constantly see the status of
complaints.
Fig -2: Proposed hierarchical Model of Blockchain
3. POSSIBLE IMPLICATIONS
1. With this application the performance of governance can
be measured
2. The people participation in making decisions increases
3. Fear of being known will be reduced in the society
4. Government would be more focused on people centric
developments.
5. It will reduce the corruption, red tapism and scams in the
government
6. Wastage of public money will be reduced
7. Democracy will be prevailed.
4. CONCLUSION
Government should alter laws in order to accept the digital
complaints filed by this website. Government organizations
like CBI, ACB can maintain an officer to regularly watch the
complaints in this website and also perform background
enquiry. The proofs submitted by any usersneedtobecheck
ed for validity and then armedofficerscaneasilytakeactions
on it. Cases should be divided based on the jurisdiction or
area. As the users can view the compliants filed, there is an
increase in transparency.
REFERENCES
1) S. Nakamoto. (2008). Bitcoin: A Peer-to-Peer Electronic
Cash System. [Online]. Available:
https://bitcoin.org/bitcoin.pdf
2) https://beta.vu.nl/nl/Images/werkstuk bruyn_tcm235-
862258.pdf
3) https://aadhaarapi.com/authentication/

More Related Content

What's hot

Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerPalash Mehar
 
Australia postdigital id integrationissofamousnow,but how
Australia postdigital id integrationissofamousnow,but howAustralia postdigital id integrationissofamousnow,but how
Australia postdigital id integrationissofamousnow,but howAnupJoshi35
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Digital signature
Digital signatureDigital signature
Digital signatureRenu Verma
 
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4DigiLocker
 
IRJET- Bank Management System
IRJET- Bank Management SystemIRJET- Bank Management System
IRJET- Bank Management SystemIRJET Journal
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyIJTET Journal
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5DigiLocker
 
Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019Abhishek Ranjan
 
Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0DigiLocker
 
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...Suma Kamadod
 
Experiment
ExperimentExperiment
Experimentjbashask
 
oauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-accessoauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-accessidsecconf
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscapekantarainitiative
 
Dollar_iSignthis brochures
Dollar_iSignthis brochuresDollar_iSignthis brochures
Dollar_iSignthis brochuresJohn Karantzis
 
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAPayer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAFirst Atlantic Commerce
 

What's hot (20)

Hashtag Banking
Hashtag BankingHashtag Banking
Hashtag Banking
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
 
Australia postdigital id integrationissofamousnow,but how
Australia postdigital id integrationissofamousnow,but howAustralia postdigital id integrationissofamousnow,but how
Australia postdigital id integrationissofamousnow,but how
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Automating trust with new technologies
Automating trust with new technologiesAutomating trust with new technologies
Automating trust with new technologies
 
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
 
IRJET- Bank Management System
IRJET- Bank Management SystemIRJET- Bank Management System
IRJET- Bank Management System
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5
 
Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019
 
Gresham Publication
Gresham PublicationGresham Publication
Gresham Publication
 
Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0
 
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
 
Isms - cyber law
Isms  - cyber lawIsms  - cyber law
Isms - cyber law
 
Experiment
ExperimentExperiment
Experiment
 
oauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-accessoauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-access
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 
Dollar_iSignthis brochures
Dollar_iSignthis brochuresDollar_iSignthis brochures
Dollar_iSignthis brochures
 
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAPayer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
 

Similar to IRJET- Whistle Blower Protection using Block Chain

IRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for TransactionIRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for TransactionIRJET Journal
 
Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)IRJET Journal
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger TechnologyIRJET Journal
 
Donation Tracking System using Blockchain
Donation Tracking System using BlockchainDonation Tracking System using Blockchain
Donation Tracking System using BlockchainIRJET Journal
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINIRJET Journal
 
Blockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management SystemBlockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management SystemIRJET Journal
 
Tradesbay-Online cashless trading system
Tradesbay-Online cashless trading systemTradesbay-Online cashless trading system
Tradesbay-Online cashless trading systemIRJET Journal
 
IRJET- Food Supply Chain Management using Blockchain
IRJET- Food Supply Chain Management using BlockchainIRJET- Food Supply Chain Management using Blockchain
IRJET- Food Supply Chain Management using BlockchainIRJET Journal
 
Blockchain Based E-Voting System
Blockchain Based E-Voting SystemBlockchain Based E-Voting System
Blockchain Based E-Voting SystemIRJET Journal
 
IRJET- Customized CRM Mobile Application for Retail Industry
IRJET-  	  Customized CRM Mobile Application for Retail IndustryIRJET-  	  Customized CRM Mobile Application for Retail Industry
IRJET- Customized CRM Mobile Application for Retail IndustryIRJET Journal
 
Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting SystemIRJET Journal
 
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET Journal
 
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET Journal
 
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyFake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyIRJET Journal
 
blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universitygugan7097
 
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...IJNSA Journal
 
IRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public SectorsIRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public SectorsIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 

Similar to IRJET- Whistle Blower Protection using Block Chain (20)

IRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for TransactionIRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for Transaction
 
Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
 
75
7575
75
 
Donation Tracking System using Blockchain
Donation Tracking System using BlockchainDonation Tracking System using Blockchain
Donation Tracking System using Blockchain
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
Blockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management SystemBlockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management System
 
Tradesbay-Online cashless trading system
Tradesbay-Online cashless trading systemTradesbay-Online cashless trading system
Tradesbay-Online cashless trading system
 
IRJET- Food Supply Chain Management using Blockchain
IRJET- Food Supply Chain Management using BlockchainIRJET- Food Supply Chain Management using Blockchain
IRJET- Food Supply Chain Management using Blockchain
 
Blockchain Based E-Voting System
Blockchain Based E-Voting SystemBlockchain Based E-Voting System
Blockchain Based E-Voting System
 
IRJET- Customized CRM Mobile Application for Retail Industry
IRJET-  	  Customized CRM Mobile Application for Retail IndustryIRJET-  	  Customized CRM Mobile Application for Retail Industry
IRJET- Customized CRM Mobile Application for Retail Industry
 
Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting System
 
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
 
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
 
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyFake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain Technology
 
blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the university
 
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
 
IRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public SectorsIRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public Sectors
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 

IRJET- Whistle Blower Protection using Block Chain

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 265 Whistle blower protection using block chain Rahul Roy Munna Kalakanda1, Ramya Yadav Kavali2 1,2Bachelor of Engineering, University College of Engineering, Osmania University, Hyderabad ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract –This paper explains the concept of whistle blower protection by using the principle of blockchain. It attempts to highlight the role of the whistle blower application in shaping the future of the society. Key Words: blockchain, hyper ledger, proof of access, smart contracts, whistle-blower. 1. INTRODUCTION Whistleblowers are the people/persons who exposes or reports the activities and people involved in the violation of acts, laws, corrupt practices etc.Theactivitiesof wrongdoing can be anything which violates the laws, fraud, corruption, threat to public interests, etc. We need such people with social responsibility in our society in order to maintain harmony and raise voice against the misuse of power by officials. This helps to maintain democracy in the country. It’s the duty of the government to protect whistleblowers so that that they can lead a life without the fear of threat from officials. Now a days many whistleblowersinourcountry are getting murdered. According to statistics in past few years, more than 20 whistleblowers were murdered and nearly 70 people who filed a case of the uncertainty in various departments were killed. Because of these incidents,there is a rise in fear in the people to complain against the unlawful things in government. Because of this, gradually democracy will become dictatorship of people who have power. In order to reduce scams, corruption and to uplift the democracy in the country we need stringent laws to be enacted. A whistle blower in our country needs to give his details for successful filing of complaint. In manycasesthese given details come out and this leads to death of that whistleblower. So in this paper we propose a way by which we can indirectly protect the whistleblower. He can file a complaint without the fear of getting identified by anyone. He can maintain anonymity while filing case. Blockchain is a virtual, distributed databasethatmaintainsa shared list of records without the need of an intermediary. Here the database is made up of blocks. In a blockchain the records are connected to each other using a hash function mostly sha265. This is one of the most secure hashing algorithms. The structure of the block consists of the data of the block, hash of that block and hash of the previous block. Hence blockchain is a continuous growing list of records which are resistant to any modifications. Fig -1: Working of Blockchain In this application, we record the complaints filed by the whistleblowers and use the blockchain technology to store the data and maintain anonymity of the users. 2. PROPOSED MODEL The following are the components of the proposed model: 1. Website with aadhar API integration for verifyingtheuser 2. Sawtooth hyper ledger for maintaining the anonymity 3. Smart contracts for differentiating the spam and case. 4. Hierarchy model for blockchain to view the complaints. Website with aadhar API integration for verifying the user: Aadhar data is available as an API service. In our application we can use the Sub-AUA(Aadhar User Agency) approach to leverage the Aadhar data for authentication purpose. Sub- AUA Approach: There are few third party Aadhaar authentication services which offer their platform as a service. These organizations go through the process of registration with the UID (Unique Identification)andhelp us get a Sub-AUA license. Now a days platforms like Aadhar Bridge, Aadhar API, ekyc online has a developer friendly platform where one can leverage UID for Authenticationand eKYC. The website will be a user-friendly interface where we use a third party aadhar API for authentication of the user. The aadhar api sends an OTP to registered mobile when the user enters his name and aadhar number or VID. The user needs to go through this process every time he wishes to view the complaints or file a complaint. After authentication user enters in to next page where he can see two buttons “ file a complaint” & “view exiting complaints”. Whenuserclicksthe view the complaints button, he will be asked to select from the two options valid complaints and invalid complaints
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 266 (spam). When he selects either of the options he will be allowed to see all the complaints in that particular option in the public ledger with proofs which are linked with hash function of a userid. Against each valid complaint, the user can see two buttons resolved and open. Against each invalid complaint user can see an upvote button. When user clicks on file a complaint button he moves to another page where he needs to select state, district, department and under which governmentdepartmentthecomplaincomesunderi.e either central or state. Then he proceeds to next page where he needs to select the authority and he needs to write a complaint. The user is provided with an option to attach the proofs like videos, documents, etc which are linked to his complain. Sawtooth hyper ledger for maintaining the anonymity: Here we selected the use of Sawtooth hyper ledger for two things, a) Permissioned blockchain mechanism: In this permissioned blockchain mechanism the authentication of transaction is given to an authorityinanarea toauthenticate the transaction i.e the complaint filed by a person. He has to even authenticate the complaintasresolvedandcloseitonce the resolution is obtained. In order to avoid the human errors in it, we propose an algorithm i.e. proof of access which works instead of proof of work. In order to avoid human interference or human error we propose an algorithm instead of proof of work in blockchain in smart contract. Proof of access (POA): This algorithm makes sure that the person who authenticates the transaction needs to categorize the transaction as a valid or invalid within 48 hours or any time period. Either a new complaint will be moved into of the blockchain i.e valid complaints or invalid complaints (spam). Depending on the authentication given by him as valid or invalid respectively. If he does notgivethe authentication within 48 hours or any time period then the new complaint will be automatically considered as validand goes into valid complaint blockchain. By using proof of access we can reduce the manipulations by humans. There are different cases involved in authenticating a transaction or complaint as valid or spam. The variouspossiblecasesare explained as follows. Case (1): We have the appointed person who needs to authenticate the complaint. There may be a case where he wantedly ignores to authenticate the complain. In this case we fix a time period in the proof of access algorithm, such that the action needs to be taken on the complaint within that time span. Otherwise the complaint is marked as valid after completion of time period. Case (2): There may be a case where the person may categorize the transaction as an invalid transaction for the benefit of the party on whom the complaint is raised. In order to avoid this every block in spam folder is added with upvote button. By this if specified number of people upvote for it to be valid complain, the content in the blockchain will be copied to the valid complaint chain nothing but duplicating it. The specific time intervals and different IP’s are considered in order to avoid the malpractice using bots. By this only one vote from an IP address is accepted ata time interval. Case (3): Similar to upvote button there will be a resolved button in the valid transaction blockchain. By using this button, the complaint can be closed after a resolution is obtained. There may be a case where the complain has been intentionally closed as resolved by the official appointed to authenticate the complaints. In such case the users can upvote for a closed complaint and reopen it. Thus it will be moved to the valid block chain of open complaints. b) Parallel transactions: This feature of sawtooth hyper ledger enables us to do transactions independent of others which means at a time multiple users can perform transactions. So it enables multiple users to perform transactions at a time. We createdifferent blockchainsbased on area and department. By this we maintain different types of blockchains and any one can view the transactions by authenticating himself with Aadhar API and by selecting the department and area. Smart contracts: Smart contracts is a computer protocol, which is intend to perform certain operations. In order to reduce the third parties in the applications, we use smart contracts to perform various protocols. i. To authenticate the user and allow him by the use of aadhar api ii. To authenticate transactions if ittakesmorethan48hours iii. To perform parallel transactions iv. To copy the same data in spam to complaintsblockchainif condition is valid v. To copy or print any of the transactions in the public ledger. vi. Not to add some restricted department complaints in public ledger and add it to private blockchainwhichcanonly be seen by CBI, ACB vii. To open the closed complaint by the people who feel it is not closed and still need to be addressed Hierarchical model for blockchain to view the complaints: The higher officials of a region will be able to view the complains of that region. In order to view the complaint and the status of the complaint filed at different regions, we interconnect each block chain of each department using a specified hierarchy model. In this model, the blockchain of
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 267 state is connected to genesis block of district blockchain in which each block of district is connected to genesis block of region blockchain andsoon.Inregion blockchain complaints are added as blocks. This complaints are authenticated by regional person who are incharge of it. These complaintsare viewed by higher officials upto state level. By this hierarchy model the higher officials constantly see the status of complaints. Fig -2: Proposed hierarchical Model of Blockchain 3. POSSIBLE IMPLICATIONS 1. With this application the performance of governance can be measured 2. The people participation in making decisions increases 3. Fear of being known will be reduced in the society 4. Government would be more focused on people centric developments. 5. It will reduce the corruption, red tapism and scams in the government 6. Wastage of public money will be reduced 7. Democracy will be prevailed. 4. CONCLUSION Government should alter laws in order to accept the digital complaints filed by this website. Government organizations like CBI, ACB can maintain an officer to regularly watch the complaints in this website and also perform background enquiry. The proofs submitted by any usersneedtobecheck ed for validity and then armedofficerscaneasilytakeactions on it. Cases should be divided based on the jurisdiction or area. As the users can view the compliants filed, there is an increase in transparency. REFERENCES 1) S. Nakamoto. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. [Online]. Available: https://bitcoin.org/bitcoin.pdf 2) https://beta.vu.nl/nl/Images/werkstuk bruyn_tcm235- 862258.pdf 3) https://aadhaarapi.com/authentication/