SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1640
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING
BLOCK CHAIN”
1, 2, 3 Student of S. B. Patil College of Engineering, Indapur, Pune-413106, MH, India.
4 Assistant Professor, S. B. Patil College of Engineering, Indapur, Pune-413106, MH, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In current electronic world, more losses are
impacted by cybercrime. Digital world are totally open and
it is incredibly easy to focus to get to data or cash related
information from any individual, open and private
associations and so on, since, endlessly web are open, taking
data on the unstable mechanism of channel is outstandingly
straightforward. Thusly, guaranteeing bad behavior data
required advance layers of safety counter to the cybercrime.
Data confirmation is one of the first noteworthy systems to
staying away from data from digital guilty parties. In this
data confirmation procedure, cryptology has basic influence
against the cybercriminal on the unstable correspondence
channel. It gives data security, sort out security, sagacity
and character organization to get to the data approved
work force. Various open and private key systems are
proposed for getting data, regardless there are as yet a
piece of challenge exists in this substance. Most
unmistakable encryption methods, for example, RSA, Elliptic
curve, DES and AES are working. In this undertaking about
new cryptography method forestalling the cybercrime in
view of the block chain.
Key Words: Alert System, Crime Data, Cyber Crime,
Block Chain, Safe Area, Security, etc.
1. INTRODUCTION
In current computerized world, more casualties are
influenced by cybercrime. Cyber world are wide open and
it is exceptionally simple to target to get to information or
money related data from any person, open and private
organizations etc., since, web and web are open, it is
exceptionally simple to take information on the unsecured
medium of channel. In this manner, ensuring wrongdoing
information required advance layers of security counter to
the cybercrime. Information assurance is one of the
foremost noteworthy strategies to avoiding information
from cyber offenders. In this information assurance
strategy, cryptology plays imperative part against the
cybercriminal on the unsecured communication channel.
It gives information security, organize security, astuteness
and personality administration to get to the information
authorized personnel. Numerous open and private key
strategies are suggested for securing information, in any
case there are still a part of challenge exist in this
substance. Most recognizable encryption methods such as
RSA, Elliptic bend, DES and AES are working. In this
project about new cryptography technique preventing the
cybercrime based on the block chain.
1.1 Objective of the work
Now a day’s users don’t have an idea about crime in new
area human safety is most important factor in world. Also
the crime data access by hackers or attackers by hacking
activity so we will build system which provide security to
both data and human by using block chain smart contact.
Cybercrime is considered as PC correspondence catch
exercises which are either unlawful or thought of denied
by specific gatherings and which can be controlled over
furthermore, finished with complete organization
medium. Cybercrimes allude to criminal clamor in which
the organization or PC is an fundamental piece of the
crime to take over ownership of the gadget or
organization. Individual and organizations security is one
of the significant issues in the current computerized
climate. Securing individual information and government
data are confronting significant difficulties against
cybercrime. Network protection specialists are as yet
attempting to experience digital lawbreakers with the
assistance of different plans and strategies.
 To implement security system by using block
chain smart contract
 To encrypt data of crime data report
 To create safest area for new user
 To prevent crime report from hackers
1.2 Project Scope
 Registration and login system for new user
 Registration and login system for crime branch
 Centralized digital data available access by
multiple location.
 Data security based on smart contract to prevent
hackers activity.
 System will show area crime report to new user in
area.
Jadhav Hrushikesh M.1, Kudale Sameer V.2, Lakade Rohit A.3 , Prof. Sayyad G. G4
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1641
2. RELATED WORK
Satoshi Nakamoto first proposed the Block chain
innovation in 2008; it is a public exchange record of the
digital money bit coin. It is a chain of squares where each
square contains data like hash worth of past bock and
time-stamp. From the above technique honesty and
security of the square is guaranteed and we can recognize
the invalid square. The main utilization of this innovation
was Bit coin, which permits cash exchange utilizing web.
The creator gave a goal to the issue of twofold spending.
The framework utilizes the strategy for timestamp by
hashing the block into nonstop chain based of
confirmation of work component.
In this system we have used decentralized and distributed
network in order to store prisoner's data in form of blocks.
The blocks are interconnected with each other and are
creating the chain of prisoner records. In this system our
objective is to implement both hyperledger fabric as well
as Ethereum network because we are providing our
system not only for private use but also for public use. In
hyperledger fabric network the data is kept in private
mode, whereas in ethereum the data is kept for public use.
It is expected that the hyperledger exchange and recover
the data as per agreement. It must also permit the
utilization for plugin modules such that various
organizations advance the use for smart contract. In our
proposed system the block chain is only used for security
purpose we have created different levels of trusted
contacts and only if the higher authority allows the data to
get stored in blocks then only it will be in block chain
database.
There are 2 higher authorities which will provide green
signal to data which needs to be stored in blocks, once the
data gets stored it cannot be manipulated.
Block: The block is nothing but a bunch of some kind of
information. The block is mainly have a three section i.e.
previous block hash value, information in that block and
next block hash value. Whenever any new block of new
transaction is authenticated by the system, block is added
at the end of the block chain. This sequence of blocks is
always increasing, or ledger of transaction that the system
has authenticated. The primary block in a block chain is
named as the Genesis block. This primary block holds the
zero hash value for previous block because it is first block
in block chain and doesn't have any previous block. The
next block will have the hash value of the previous block
and this chain continues.
Block chain: When blocks are connected with previous
hash values and starts forming a chain then we declare it
as a block chain.
The officials of crypto police will confirm the report. The
principle undertaking of crypto police is to report
extortion in the digital currency market. In this paper, the
creator examines about the significance of block chain in
the clinical field. The touchy information in the clinical
field is getting controlled this cripple the honesty of
information.
3. REQUIREMENTS
3.1 Functional Requirements
1. Database Connection.
2. Database on MySQL .
3. Sending http requests.
4. Responding http requests.
5. User Interface.
3.2 Safety Requirements
1. Higher Level Authentication.
2. All Information Shared with Encryption.
3. Encryption with Advance Encryption Standard
(ADS).
4. Keeping all confidential data secret using Block
Chain technique.
3.3 Software Requirements
1. Android Studio
2. JDK 12
3. MySQL Database
4. Frontend- xml
5. Script-Java
4. PROPOSED SYSTEM
4.1 SYSTEM DESIGN
Fig-1: System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1642
In above (figure 1) System architecture consists of
mainly four components i.e. User/Client, Data Encryption,
Database and Block Chain. The User/Client has to firstly
login in that application for to find safest area. The Data
Encryption mainly use for the data encryption for securely
transfer the data from databases to the client side along
with read API only. The database stores the encrypted
data for security purpose. Finally, the blocks of the Block
Chain work on the database so that we can avoid attacks
from the hacker sides. If the hacker try to modify the data
or access the data from the database due to the block chain
he can’t access it.
4.2 Activity Diagram
Fig-2: Activity Diagram
In above (figure-2) from start where we have to start our
application and data is going to distribute in several types
i.e. Police admin login, user login so that each one of these
individuals can access or upload the data from their
perspective level along with their protocols. Furthermore,
the police administrator uploads the area wise crime
report. The user can login and search the particular area
whatever he want. Another one is the hash function,
which plays the major role in the application, it provide
the security to the data present in the database. Whenever
the hackers try to modify the data, the hash function will
change the hash value of that particular data.
5. SPECIFICATION
5.1 Advantages
1. Data Security: In this system, we store the data in
encrypted formats with hash function in the
database.
2. Zero Paper Work: In this system, we store
criminal data as well as crime area data digitally
so no paper work is boycott and make system
environment friendly.
3. Access Data from Anywhere Any Time: The
system provides data in decentralized so that
anyone can easily access these data at any
location.
4. Lower Administration Burden: The police
administrator has less paper work and can share
information securely and easily on system.
5.2 Applications
1. Cyber Crime Department.
2. Police Station Sector.
3. Business/Startup Sector.
4. Central Jail/Prison.
5. Socially Useful.
6. CONCLUSION
In this paper, we presented the things that are not
available for Today to revolutionize safest area and crime
sector and how to use the digital system efficiently to
overcome various issues in crime sector. We focused on
developing application through which we can save the
time and money in comparison with today's traditional
solution on safest area problems. Therefore, Alert system
is progressed and solid. This application will introduce a
high level, solid, modest and effective.
7. REFERENCES
1. "Information, information all over", The
Economist .(2010)
2. E. Bertino, "Enormous Data - Opportunities and
Challenges".(2013)
3. J. Manyika, M. Chui, J. Bughin, R. Dobbs, P. Bisson,
and A. Marrs. “Problematic Innovations: Advances
that will Change life, Business, and the Worldwide
Economy”.(2013)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1643
4. E. Bertino, S. Nepal, R. Ranjan, "Building Sensor-
Based Big Data Cyber Infrastructures", IEEE Cloud
Computing 2(5): 64-69 (2015).
5. Atzori, M. “Block Chain Governance and the Role
of Trust Service Providers”: The TrustedChain®
Network. (2017)
6. Baars, D. “Towards Self-sovereign Identity Using
Block chain Technology (Master's thesis)”.
University of Twenty, Enscheda, Netherlands. .
(2016).
7. Bandyopadhyay, P. The Origin of Block Chain from
Cypherpunks to Satoshi to IBM Medium”. (2018)
8. Higgins, S. “Factor Outlines Record-Keeping
Network that Utilizes Bit Coin’s Block Chain”.
(2014)
9. Cheng S., Duab M., Domeyer A., Lnudqvis M.:
“Using Block Chain to Improve Data Management
in the Public Sector”.
10. Anh, D.T.T., Zhang, M., Ooi, B.C., Chen, G.:
“Untangling Block Chain: A Data Processing View
of Block Chain Systems”. IEEE Trans. Knowl. Data
Eng. 30(7), 13661385 (2018).

More Related Content

Similar to “ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized SystemIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...IRJET Journal
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET Journal
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake newsBlockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake newsIRJET Journal
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”IRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 

Similar to “ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN” (20)

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized System
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of Technology
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake newsBlockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake news
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Recently uploaded (20)

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1640 “ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN” 1, 2, 3 Student of S. B. Patil College of Engineering, Indapur, Pune-413106, MH, India. 4 Assistant Professor, S. B. Patil College of Engineering, Indapur, Pune-413106, MH, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In current electronic world, more losses are impacted by cybercrime. Digital world are totally open and it is incredibly easy to focus to get to data or cash related information from any individual, open and private associations and so on, since, endlessly web are open, taking data on the unstable mechanism of channel is outstandingly straightforward. Thusly, guaranteeing bad behavior data required advance layers of safety counter to the cybercrime. Data confirmation is one of the first noteworthy systems to staying away from data from digital guilty parties. In this data confirmation procedure, cryptology has basic influence against the cybercriminal on the unstable correspondence channel. It gives data security, sort out security, sagacity and character organization to get to the data approved work force. Various open and private key systems are proposed for getting data, regardless there are as yet a piece of challenge exists in this substance. Most unmistakable encryption methods, for example, RSA, Elliptic curve, DES and AES are working. In this undertaking about new cryptography method forestalling the cybercrime in view of the block chain. Key Words: Alert System, Crime Data, Cyber Crime, Block Chain, Safe Area, Security, etc. 1. INTRODUCTION In current computerized world, more casualties are influenced by cybercrime. Cyber world are wide open and it is exceptionally simple to target to get to information or money related data from any person, open and private organizations etc., since, web and web are open, it is exceptionally simple to take information on the unsecured medium of channel. In this manner, ensuring wrongdoing information required advance layers of security counter to the cybercrime. Information assurance is one of the foremost noteworthy strategies to avoiding information from cyber offenders. In this information assurance strategy, cryptology plays imperative part against the cybercriminal on the unsecured communication channel. It gives information security, organize security, astuteness and personality administration to get to the information authorized personnel. Numerous open and private key strategies are suggested for securing information, in any case there are still a part of challenge exist in this substance. Most recognizable encryption methods such as RSA, Elliptic bend, DES and AES are working. In this project about new cryptography technique preventing the cybercrime based on the block chain. 1.1 Objective of the work Now a day’s users don’t have an idea about crime in new area human safety is most important factor in world. Also the crime data access by hackers or attackers by hacking activity so we will build system which provide security to both data and human by using block chain smart contact. Cybercrime is considered as PC correspondence catch exercises which are either unlawful or thought of denied by specific gatherings and which can be controlled over furthermore, finished with complete organization medium. Cybercrimes allude to criminal clamor in which the organization or PC is an fundamental piece of the crime to take over ownership of the gadget or organization. Individual and organizations security is one of the significant issues in the current computerized climate. Securing individual information and government data are confronting significant difficulties against cybercrime. Network protection specialists are as yet attempting to experience digital lawbreakers with the assistance of different plans and strategies.  To implement security system by using block chain smart contract  To encrypt data of crime data report  To create safest area for new user  To prevent crime report from hackers 1.2 Project Scope  Registration and login system for new user  Registration and login system for crime branch  Centralized digital data available access by multiple location.  Data security based on smart contract to prevent hackers activity.  System will show area crime report to new user in area. Jadhav Hrushikesh M.1, Kudale Sameer V.2, Lakade Rohit A.3 , Prof. Sayyad G. G4
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1641 2. RELATED WORK Satoshi Nakamoto first proposed the Block chain innovation in 2008; it is a public exchange record of the digital money bit coin. It is a chain of squares where each square contains data like hash worth of past bock and time-stamp. From the above technique honesty and security of the square is guaranteed and we can recognize the invalid square. The main utilization of this innovation was Bit coin, which permits cash exchange utilizing web. The creator gave a goal to the issue of twofold spending. The framework utilizes the strategy for timestamp by hashing the block into nonstop chain based of confirmation of work component. In this system we have used decentralized and distributed network in order to store prisoner's data in form of blocks. The blocks are interconnected with each other and are creating the chain of prisoner records. In this system our objective is to implement both hyperledger fabric as well as Ethereum network because we are providing our system not only for private use but also for public use. In hyperledger fabric network the data is kept in private mode, whereas in ethereum the data is kept for public use. It is expected that the hyperledger exchange and recover the data as per agreement. It must also permit the utilization for plugin modules such that various organizations advance the use for smart contract. In our proposed system the block chain is only used for security purpose we have created different levels of trusted contacts and only if the higher authority allows the data to get stored in blocks then only it will be in block chain database. There are 2 higher authorities which will provide green signal to data which needs to be stored in blocks, once the data gets stored it cannot be manipulated. Block: The block is nothing but a bunch of some kind of information. The block is mainly have a three section i.e. previous block hash value, information in that block and next block hash value. Whenever any new block of new transaction is authenticated by the system, block is added at the end of the block chain. This sequence of blocks is always increasing, or ledger of transaction that the system has authenticated. The primary block in a block chain is named as the Genesis block. This primary block holds the zero hash value for previous block because it is first block in block chain and doesn't have any previous block. The next block will have the hash value of the previous block and this chain continues. Block chain: When blocks are connected with previous hash values and starts forming a chain then we declare it as a block chain. The officials of crypto police will confirm the report. The principle undertaking of crypto police is to report extortion in the digital currency market. In this paper, the creator examines about the significance of block chain in the clinical field. The touchy information in the clinical field is getting controlled this cripple the honesty of information. 3. REQUIREMENTS 3.1 Functional Requirements 1. Database Connection. 2. Database on MySQL . 3. Sending http requests. 4. Responding http requests. 5. User Interface. 3.2 Safety Requirements 1. Higher Level Authentication. 2. All Information Shared with Encryption. 3. Encryption with Advance Encryption Standard (ADS). 4. Keeping all confidential data secret using Block Chain technique. 3.3 Software Requirements 1. Android Studio 2. JDK 12 3. MySQL Database 4. Frontend- xml 5. Script-Java 4. PROPOSED SYSTEM 4.1 SYSTEM DESIGN Fig-1: System Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1642 In above (figure 1) System architecture consists of mainly four components i.e. User/Client, Data Encryption, Database and Block Chain. The User/Client has to firstly login in that application for to find safest area. The Data Encryption mainly use for the data encryption for securely transfer the data from databases to the client side along with read API only. The database stores the encrypted data for security purpose. Finally, the blocks of the Block Chain work on the database so that we can avoid attacks from the hacker sides. If the hacker try to modify the data or access the data from the database due to the block chain he can’t access it. 4.2 Activity Diagram Fig-2: Activity Diagram In above (figure-2) from start where we have to start our application and data is going to distribute in several types i.e. Police admin login, user login so that each one of these individuals can access or upload the data from their perspective level along with their protocols. Furthermore, the police administrator uploads the area wise crime report. The user can login and search the particular area whatever he want. Another one is the hash function, which plays the major role in the application, it provide the security to the data present in the database. Whenever the hackers try to modify the data, the hash function will change the hash value of that particular data. 5. SPECIFICATION 5.1 Advantages 1. Data Security: In this system, we store the data in encrypted formats with hash function in the database. 2. Zero Paper Work: In this system, we store criminal data as well as crime area data digitally so no paper work is boycott and make system environment friendly. 3. Access Data from Anywhere Any Time: The system provides data in decentralized so that anyone can easily access these data at any location. 4. Lower Administration Burden: The police administrator has less paper work and can share information securely and easily on system. 5.2 Applications 1. Cyber Crime Department. 2. Police Station Sector. 3. Business/Startup Sector. 4. Central Jail/Prison. 5. Socially Useful. 6. CONCLUSION In this paper, we presented the things that are not available for Today to revolutionize safest area and crime sector and how to use the digital system efficiently to overcome various issues in crime sector. We focused on developing application through which we can save the time and money in comparison with today's traditional solution on safest area problems. Therefore, Alert system is progressed and solid. This application will introduce a high level, solid, modest and effective. 7. REFERENCES 1. "Information, information all over", The Economist .(2010) 2. E. Bertino, "Enormous Data - Opportunities and Challenges".(2013) 3. J. Manyika, M. Chui, J. Bughin, R. Dobbs, P. Bisson, and A. Marrs. “Problematic Innovations: Advances that will Change life, Business, and the Worldwide Economy”.(2013)
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1643 4. E. Bertino, S. Nepal, R. Ranjan, "Building Sensor- Based Big Data Cyber Infrastructures", IEEE Cloud Computing 2(5): 64-69 (2015). 5. Atzori, M. “Block Chain Governance and the Role of Trust Service Providers”: The TrustedChain® Network. (2017) 6. Baars, D. “Towards Self-sovereign Identity Using Block chain Technology (Master's thesis)”. University of Twenty, Enscheda, Netherlands. . (2016). 7. Bandyopadhyay, P. The Origin of Block Chain from Cypherpunks to Satoshi to IBM Medium”. (2018) 8. Higgins, S. “Factor Outlines Record-Keeping Network that Utilizes Bit Coin’s Block Chain”. (2014) 9. Cheng S., Duab M., Domeyer A., Lnudqvis M.: “Using Block Chain to Improve Data Management in the Public Sector”. 10. Anh, D.T.T., Zhang, M., Ooi, B.C., Chen, G.: “Untangling Block Chain: A Data Processing View of Block Chain Systems”. IEEE Trans. Knowl. Data Eng. 30(7), 13661385 (2018).