Submit Search
Upload
IRJET- Whistle Blower Protection using Block Chain
•
0 likes
•
20 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i10/IRJET-V5I1050.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
Bv4201481484
Bv4201481484
IJERA Editor
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET Journal
Paper id 71201959
Paper id 71201959
IJRAT
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Pankaj Rane
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
RAHUL KUMAR
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET Journal
Protection on cyber fraud
Protection on cyber fraud
BUSINESS SOFTWARES & SOLUTIONS
article
article
chaudharyharis3
Recommended
Bv4201481484
Bv4201481484
IJERA Editor
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET Journal
Paper id 71201959
Paper id 71201959
IJRAT
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Pankaj Rane
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
RAHUL KUMAR
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET Journal
Protection on cyber fraud
Protection on cyber fraud
BUSINESS SOFTWARES & SOLUTIONS
article
article
chaudharyharis3
Hashtag Banking
Hashtag Banking
IRJET Journal
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
Palash Mehar
Australia postdigital id integrationissofamousnow,but how
Australia postdigital id integrationissofamousnow,but how
AnupJoshi35
Chapter 06 Information Technology Act 2000
Chapter 06 Information Technology Act 2000
Robin Kapoor
Digital signature
Digital signature
Renu Verma
Automating trust with new technologies
Automating trust with new technologies
Strategy&, a member of the PwC network
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
DigiLocker
IRJET- Bank Management System
IRJET- Bank Management System
IRJET Journal
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
IJTET Journal
eSign Brochure1.5
eSign Brochure1.5
DigiLocker
Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019
Abhishek Ranjan
Gresham Publication
Gresham Publication
Gresham Jnr Muradzikwa
Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0
DigiLocker
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
Suma Kamadod
Isms - cyber law
Isms - cyber law
jayashri1991
Experiment
Experiment
jbashask
oauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-access
idsecconf
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
kantarainitiative
Dollar_iSignthis brochures
Dollar_iSignthis brochures
John Karantzis
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
First Atlantic Commerce
IRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for Transaction
IRJET Journal
Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)
IRJET Journal
More Related Content
What's hot
Hashtag Banking
Hashtag Banking
IRJET Journal
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
Palash Mehar
Australia postdigital id integrationissofamousnow,but how
Australia postdigital id integrationissofamousnow,but how
AnupJoshi35
Chapter 06 Information Technology Act 2000
Chapter 06 Information Technology Act 2000
Robin Kapoor
Digital signature
Digital signature
Renu Verma
Automating trust with new technologies
Automating trust with new technologies
Strategy&, a member of the PwC network
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
DigiLocker
IRJET- Bank Management System
IRJET- Bank Management System
IRJET Journal
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
IJTET Journal
eSign Brochure1.5
eSign Brochure1.5
DigiLocker
Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019
Abhishek Ranjan
Gresham Publication
Gresham Publication
Gresham Jnr Muradzikwa
Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0
DigiLocker
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
Suma Kamadod
Isms - cyber law
Isms - cyber law
jayashri1991
Experiment
Experiment
jbashask
oauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-access
idsecconf
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
kantarainitiative
Dollar_iSignthis brochures
Dollar_iSignthis brochures
John Karantzis
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
First Atlantic Commerce
What's hot
(20)
Hashtag Banking
Hashtag Banking
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
Australia postdigital id integrationissofamousnow,but how
Australia postdigital id integrationissofamousnow,but how
Chapter 06 Information Technology Act 2000
Chapter 06 Information Technology Act 2000
Digital signature
Digital signature
Automating trust with new technologies
Automating trust with new technologies
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
IRJET- Bank Management System
IRJET- Bank Management System
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
eSign Brochure1.5
eSign Brochure1.5
Rural Inclusivity of Digital ID @Seamless Asia 2019
Rural Inclusivity of Digital ID @Seamless Asia 2019
Gresham Publication
Gresham Publication
Digital Locker Requester Api Specification v1 0
Digital Locker Requester Api Specification v1 0
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
Isms - cyber law
Isms - cyber law
Experiment
Experiment
oauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-access
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
Dollar_iSignthis brochures
Dollar_iSignthis brochures
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
Similar to IRJET- Whistle Blower Protection using Block Chain
IRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for Transaction
IRJET Journal
Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)
IRJET Journal
IRJET- Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
IRJET Journal
75
75
Sid Mehta
Donation Tracking System using Blockchain
Donation Tracking System using Blockchain
IRJET Journal
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
IRJET Journal
Blockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management System
IRJET Journal
Tradesbay-Online cashless trading system
Tradesbay-Online cashless trading system
IRJET Journal
IRJET- Food Supply Chain Management using Blockchain
IRJET- Food Supply Chain Management using Blockchain
IRJET Journal
Blockchain Based E-Voting System
Blockchain Based E-Voting System
IRJET Journal
IRJET- Customized CRM Mobile Application for Retail Industry
IRJET- Customized CRM Mobile Application for Retail Industry
IRJET Journal
Blockchain Based Online Voting System
Blockchain Based Online Voting System
IRJET Journal
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET Journal
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET Journal
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain Technology
IRJET Journal
blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the university
gugan7097
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
IJNSA Journal
IRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET Journal
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET Journal
Similar to IRJET- Whistle Blower Protection using Block Chain
(20)
IRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for Transaction
Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)
IRJET- Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
75
75
Donation Tracking System using Blockchain
Donation Tracking System using Blockchain
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
Blockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management System
Tradesbay-Online cashless trading system
Tradesbay-Online cashless trading system
IRJET- Food Supply Chain Management using Blockchain
IRJET- Food Supply Chain Management using Blockchain
Blockchain Based E-Voting System
Blockchain Based E-Voting System
IRJET- Customized CRM Mobile Application for Retail Industry
IRJET- Customized CRM Mobile Application for Retail Industry
Blockchain Based Online Voting System
Blockchain Based Online Voting System
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain Technology
blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the university
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECH...
IRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
result management system report for college project
result management system report for college project
Tonystark477637
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Recently uploaded
(20)
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
result management system report for college project
result management system report for college project
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
IRJET- Whistle Blower Protection using Block Chain
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 265 Whistle blower protection using block chain Rahul Roy Munna Kalakanda1, Ramya Yadav Kavali2 1,2Bachelor of Engineering, University College of Engineering, Osmania University, Hyderabad ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract –This paper explains the concept of whistle blower protection by using the principle of blockchain. It attempts to highlight the role of the whistle blower application in shaping the future of the society. Key Words: blockchain, hyper ledger, proof of access, smart contracts, whistle-blower. 1. INTRODUCTION Whistleblowers are the people/persons who exposes or reports the activities and people involved in the violation of acts, laws, corrupt practices etc.Theactivitiesof wrongdoing can be anything which violates the laws, fraud, corruption, threat to public interests, etc. We need such people with social responsibility in our society in order to maintain harmony and raise voice against the misuse of power by officials. This helps to maintain democracy in the country. It’s the duty of the government to protect whistleblowers so that that they can lead a life without the fear of threat from officials. Now a days many whistleblowersinourcountry are getting murdered. According to statistics in past few years, more than 20 whistleblowers were murdered and nearly 70 people who filed a case of the uncertainty in various departments were killed. Because of these incidents,there is a rise in fear in the people to complain against the unlawful things in government. Because of this, gradually democracy will become dictatorship of people who have power. In order to reduce scams, corruption and to uplift the democracy in the country we need stringent laws to be enacted. A whistle blower in our country needs to give his details for successful filing of complaint. In manycasesthese given details come out and this leads to death of that whistleblower. So in this paper we propose a way by which we can indirectly protect the whistleblower. He can file a complaint without the fear of getting identified by anyone. He can maintain anonymity while filing case. Blockchain is a virtual, distributed databasethatmaintainsa shared list of records without the need of an intermediary. Here the database is made up of blocks. In a blockchain the records are connected to each other using a hash function mostly sha265. This is one of the most secure hashing algorithms. The structure of the block consists of the data of the block, hash of that block and hash of the previous block. Hence blockchain is a continuous growing list of records which are resistant to any modifications. Fig -1: Working of Blockchain In this application, we record the complaints filed by the whistleblowers and use the blockchain technology to store the data and maintain anonymity of the users. 2. PROPOSED MODEL The following are the components of the proposed model: 1. Website with aadhar API integration for verifyingtheuser 2. Sawtooth hyper ledger for maintaining the anonymity 3. Smart contracts for differentiating the spam and case. 4. Hierarchy model for blockchain to view the complaints. Website with aadhar API integration for verifying the user: Aadhar data is available as an API service. In our application we can use the Sub-AUA(Aadhar User Agency) approach to leverage the Aadhar data for authentication purpose. Sub- AUA Approach: There are few third party Aadhaar authentication services which offer their platform as a service. These organizations go through the process of registration with the UID (Unique Identification)andhelp us get a Sub-AUA license. Now a days platforms like Aadhar Bridge, Aadhar API, ekyc online has a developer friendly platform where one can leverage UID for Authenticationand eKYC. The website will be a user-friendly interface where we use a third party aadhar API for authentication of the user. The aadhar api sends an OTP to registered mobile when the user enters his name and aadhar number or VID. The user needs to go through this process every time he wishes to view the complaints or file a complaint. After authentication user enters in to next page where he can see two buttons “ file a complaint” & “view exiting complaints”. Whenuserclicksthe view the complaints button, he will be asked to select from the two options valid complaints and invalid complaints
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 266 (spam). When he selects either of the options he will be allowed to see all the complaints in that particular option in the public ledger with proofs which are linked with hash function of a userid. Against each valid complaint, the user can see two buttons resolved and open. Against each invalid complaint user can see an upvote button. When user clicks on file a complaint button he moves to another page where he needs to select state, district, department and under which governmentdepartmentthecomplaincomesunderi.e either central or state. Then he proceeds to next page where he needs to select the authority and he needs to write a complaint. The user is provided with an option to attach the proofs like videos, documents, etc which are linked to his complain. Sawtooth hyper ledger for maintaining the anonymity: Here we selected the use of Sawtooth hyper ledger for two things, a) Permissioned blockchain mechanism: In this permissioned blockchain mechanism the authentication of transaction is given to an authorityinanarea toauthenticate the transaction i.e the complaint filed by a person. He has to even authenticate the complaintasresolvedandcloseitonce the resolution is obtained. In order to avoid the human errors in it, we propose an algorithm i.e. proof of access which works instead of proof of work. In order to avoid human interference or human error we propose an algorithm instead of proof of work in blockchain in smart contract. Proof of access (POA): This algorithm makes sure that the person who authenticates the transaction needs to categorize the transaction as a valid or invalid within 48 hours or any time period. Either a new complaint will be moved into of the blockchain i.e valid complaints or invalid complaints (spam). Depending on the authentication given by him as valid or invalid respectively. If he does notgivethe authentication within 48 hours or any time period then the new complaint will be automatically considered as validand goes into valid complaint blockchain. By using proof of access we can reduce the manipulations by humans. There are different cases involved in authenticating a transaction or complaint as valid or spam. The variouspossiblecasesare explained as follows. Case (1): We have the appointed person who needs to authenticate the complaint. There may be a case where he wantedly ignores to authenticate the complain. In this case we fix a time period in the proof of access algorithm, such that the action needs to be taken on the complaint within that time span. Otherwise the complaint is marked as valid after completion of time period. Case (2): There may be a case where the person may categorize the transaction as an invalid transaction for the benefit of the party on whom the complaint is raised. In order to avoid this every block in spam folder is added with upvote button. By this if specified number of people upvote for it to be valid complain, the content in the blockchain will be copied to the valid complaint chain nothing but duplicating it. The specific time intervals and different IP’s are considered in order to avoid the malpractice using bots. By this only one vote from an IP address is accepted ata time interval. Case (3): Similar to upvote button there will be a resolved button in the valid transaction blockchain. By using this button, the complaint can be closed after a resolution is obtained. There may be a case where the complain has been intentionally closed as resolved by the official appointed to authenticate the complaints. In such case the users can upvote for a closed complaint and reopen it. Thus it will be moved to the valid block chain of open complaints. b) Parallel transactions: This feature of sawtooth hyper ledger enables us to do transactions independent of others which means at a time multiple users can perform transactions. So it enables multiple users to perform transactions at a time. We createdifferent blockchainsbased on area and department. By this we maintain different types of blockchains and any one can view the transactions by authenticating himself with Aadhar API and by selecting the department and area. Smart contracts: Smart contracts is a computer protocol, which is intend to perform certain operations. In order to reduce the third parties in the applications, we use smart contracts to perform various protocols. i. To authenticate the user and allow him by the use of aadhar api ii. To authenticate transactions if ittakesmorethan48hours iii. To perform parallel transactions iv. To copy the same data in spam to complaintsblockchainif condition is valid v. To copy or print any of the transactions in the public ledger. vi. Not to add some restricted department complaints in public ledger and add it to private blockchainwhichcanonly be seen by CBI, ACB vii. To open the closed complaint by the people who feel it is not closed and still need to be addressed Hierarchical model for blockchain to view the complaints: The higher officials of a region will be able to view the complains of that region. In order to view the complaint and the status of the complaint filed at different regions, we interconnect each block chain of each department using a specified hierarchy model. In this model, the blockchain of
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 267 state is connected to genesis block of district blockchain in which each block of district is connected to genesis block of region blockchain andsoon.Inregion blockchain complaints are added as blocks. This complaints are authenticated by regional person who are incharge of it. These complaintsare viewed by higher officials upto state level. By this hierarchy model the higher officials constantly see the status of complaints. Fig -2: Proposed hierarchical Model of Blockchain 3. POSSIBLE IMPLICATIONS 1. With this application the performance of governance can be measured 2. The people participation in making decisions increases 3. Fear of being known will be reduced in the society 4. Government would be more focused on people centric developments. 5. It will reduce the corruption, red tapism and scams in the government 6. Wastage of public money will be reduced 7. Democracy will be prevailed. 4. CONCLUSION Government should alter laws in order to accept the digital complaints filed by this website. Government organizations like CBI, ACB can maintain an officer to regularly watch the complaints in this website and also perform background enquiry. The proofs submitted by any usersneedtobecheck ed for validity and then armedofficerscaneasilytakeactions on it. Cases should be divided based on the jurisdiction or area. As the users can view the compliants filed, there is an increase in transparency. REFERENCES 1) S. Nakamoto. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. [Online]. Available: https://bitcoin.org/bitcoin.pdf 2) https://beta.vu.nl/nl/Images/werkstuk bruyn_tcm235- 862258.pdf 3) https://aadhaarapi.com/authentication/
Download now