Submit Search
Upload
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
•
0 likes
•
4 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i5/IRJET-V9I5433.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
IRJET Journal
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
Recommended
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
IRJET Journal
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
Real-life Application of a Decentralized System
Real-life Application of a Decentralized System
IRJET Journal
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET Journal
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of Technology
IRJET Journal
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET Journal
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET Journal
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake news
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET Journal
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET Journal
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to “ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
Real-life Application of a Decentralized System
Real-life Application of a Decentralized System
IRJET Journal
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET Journal
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of Technology
IRJET Journal
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET Journal
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET Journal
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake news
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET Journal
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET Journal
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
Similar to “ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
(20)
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
Real-life Application of a Decentralized System
Real-life Application of a Decentralized System
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of Technology
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake news
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
result management system report for college project
result management system report for college project
Tonystark477637
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
rknatarajan
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Recently uploaded
(20)
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
result management system report for college project
result management system report for college project
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1640 “ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN” 1, 2, 3 Student of S. B. Patil College of Engineering, Indapur, Pune-413106, MH, India. 4 Assistant Professor, S. B. Patil College of Engineering, Indapur, Pune-413106, MH, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In current electronic world, more losses are impacted by cybercrime. Digital world are totally open and it is incredibly easy to focus to get to data or cash related information from any individual, open and private associations and so on, since, endlessly web are open, taking data on the unstable mechanism of channel is outstandingly straightforward. Thusly, guaranteeing bad behavior data required advance layers of safety counter to the cybercrime. Data confirmation is one of the first noteworthy systems to staying away from data from digital guilty parties. In this data confirmation procedure, cryptology has basic influence against the cybercriminal on the unstable correspondence channel. It gives data security, sort out security, sagacity and character organization to get to the data approved work force. Various open and private key systems are proposed for getting data, regardless there are as yet a piece of challenge exists in this substance. Most unmistakable encryption methods, for example, RSA, Elliptic curve, DES and AES are working. In this undertaking about new cryptography method forestalling the cybercrime in view of the block chain. Key Words: Alert System, Crime Data, Cyber Crime, Block Chain, Safe Area, Security, etc. 1. INTRODUCTION In current computerized world, more casualties are influenced by cybercrime. Cyber world are wide open and it is exceptionally simple to target to get to information or money related data from any person, open and private organizations etc., since, web and web are open, it is exceptionally simple to take information on the unsecured medium of channel. In this manner, ensuring wrongdoing information required advance layers of security counter to the cybercrime. Information assurance is one of the foremost noteworthy strategies to avoiding information from cyber offenders. In this information assurance strategy, cryptology plays imperative part against the cybercriminal on the unsecured communication channel. It gives information security, organize security, astuteness and personality administration to get to the information authorized personnel. Numerous open and private key strategies are suggested for securing information, in any case there are still a part of challenge exist in this substance. Most recognizable encryption methods such as RSA, Elliptic bend, DES and AES are working. In this project about new cryptography technique preventing the cybercrime based on the block chain. 1.1 Objective of the work Now a day’s users don’t have an idea about crime in new area human safety is most important factor in world. Also the crime data access by hackers or attackers by hacking activity so we will build system which provide security to both data and human by using block chain smart contact. Cybercrime is considered as PC correspondence catch exercises which are either unlawful or thought of denied by specific gatherings and which can be controlled over furthermore, finished with complete organization medium. Cybercrimes allude to criminal clamor in which the organization or PC is an fundamental piece of the crime to take over ownership of the gadget or organization. Individual and organizations security is one of the significant issues in the current computerized climate. Securing individual information and government data are confronting significant difficulties against cybercrime. Network protection specialists are as yet attempting to experience digital lawbreakers with the assistance of different plans and strategies. To implement security system by using block chain smart contract To encrypt data of crime data report To create safest area for new user To prevent crime report from hackers 1.2 Project Scope Registration and login system for new user Registration and login system for crime branch Centralized digital data available access by multiple location. Data security based on smart contract to prevent hackers activity. System will show area crime report to new user in area. Jadhav Hrushikesh M.1, Kudale Sameer V.2, Lakade Rohit A.3 , Prof. Sayyad G. G4
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1641 2. RELATED WORK Satoshi Nakamoto first proposed the Block chain innovation in 2008; it is a public exchange record of the digital money bit coin. It is a chain of squares where each square contains data like hash worth of past bock and time-stamp. From the above technique honesty and security of the square is guaranteed and we can recognize the invalid square. The main utilization of this innovation was Bit coin, which permits cash exchange utilizing web. The creator gave a goal to the issue of twofold spending. The framework utilizes the strategy for timestamp by hashing the block into nonstop chain based of confirmation of work component. In this system we have used decentralized and distributed network in order to store prisoner's data in form of blocks. The blocks are interconnected with each other and are creating the chain of prisoner records. In this system our objective is to implement both hyperledger fabric as well as Ethereum network because we are providing our system not only for private use but also for public use. In hyperledger fabric network the data is kept in private mode, whereas in ethereum the data is kept for public use. It is expected that the hyperledger exchange and recover the data as per agreement. It must also permit the utilization for plugin modules such that various organizations advance the use for smart contract. In our proposed system the block chain is only used for security purpose we have created different levels of trusted contacts and only if the higher authority allows the data to get stored in blocks then only it will be in block chain database. There are 2 higher authorities which will provide green signal to data which needs to be stored in blocks, once the data gets stored it cannot be manipulated. Block: The block is nothing but a bunch of some kind of information. The block is mainly have a three section i.e. previous block hash value, information in that block and next block hash value. Whenever any new block of new transaction is authenticated by the system, block is added at the end of the block chain. This sequence of blocks is always increasing, or ledger of transaction that the system has authenticated. The primary block in a block chain is named as the Genesis block. This primary block holds the zero hash value for previous block because it is first block in block chain and doesn't have any previous block. The next block will have the hash value of the previous block and this chain continues. Block chain: When blocks are connected with previous hash values and starts forming a chain then we declare it as a block chain. The officials of crypto police will confirm the report. The principle undertaking of crypto police is to report extortion in the digital currency market. In this paper, the creator examines about the significance of block chain in the clinical field. The touchy information in the clinical field is getting controlled this cripple the honesty of information. 3. REQUIREMENTS 3.1 Functional Requirements 1. Database Connection. 2. Database on MySQL . 3. Sending http requests. 4. Responding http requests. 5. User Interface. 3.2 Safety Requirements 1. Higher Level Authentication. 2. All Information Shared with Encryption. 3. Encryption with Advance Encryption Standard (ADS). 4. Keeping all confidential data secret using Block Chain technique. 3.3 Software Requirements 1. Android Studio 2. JDK 12 3. MySQL Database 4. Frontend- xml 5. Script-Java 4. PROPOSED SYSTEM 4.1 SYSTEM DESIGN Fig-1: System Architecture
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1642 In above (figure 1) System architecture consists of mainly four components i.e. User/Client, Data Encryption, Database and Block Chain. The User/Client has to firstly login in that application for to find safest area. The Data Encryption mainly use for the data encryption for securely transfer the data from databases to the client side along with read API only. The database stores the encrypted data for security purpose. Finally, the blocks of the Block Chain work on the database so that we can avoid attacks from the hacker sides. If the hacker try to modify the data or access the data from the database due to the block chain he can’t access it. 4.2 Activity Diagram Fig-2: Activity Diagram In above (figure-2) from start where we have to start our application and data is going to distribute in several types i.e. Police admin login, user login so that each one of these individuals can access or upload the data from their perspective level along with their protocols. Furthermore, the police administrator uploads the area wise crime report. The user can login and search the particular area whatever he want. Another one is the hash function, which plays the major role in the application, it provide the security to the data present in the database. Whenever the hackers try to modify the data, the hash function will change the hash value of that particular data. 5. SPECIFICATION 5.1 Advantages 1. Data Security: In this system, we store the data in encrypted formats with hash function in the database. 2. Zero Paper Work: In this system, we store criminal data as well as crime area data digitally so no paper work is boycott and make system environment friendly. 3. Access Data from Anywhere Any Time: The system provides data in decentralized so that anyone can easily access these data at any location. 4. Lower Administration Burden: The police administrator has less paper work and can share information securely and easily on system. 5.2 Applications 1. Cyber Crime Department. 2. Police Station Sector. 3. Business/Startup Sector. 4. Central Jail/Prison. 5. Socially Useful. 6. CONCLUSION In this paper, we presented the things that are not available for Today to revolutionize safest area and crime sector and how to use the digital system efficiently to overcome various issues in crime sector. We focused on developing application through which we can save the time and money in comparison with today's traditional solution on safest area problems. Therefore, Alert system is progressed and solid. This application will introduce a high level, solid, modest and effective. 7. REFERENCES 1. "Information, information all over", The Economist .(2010) 2. E. Bertino, "Enormous Data - Opportunities and Challenges".(2013) 3. J. Manyika, M. Chui, J. Bughin, R. Dobbs, P. Bisson, and A. Marrs. “Problematic Innovations: Advances that will Change life, Business, and the Worldwide Economy”.(2013)
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1643 4. E. Bertino, S. Nepal, R. Ranjan, "Building Sensor- Based Big Data Cyber Infrastructures", IEEE Cloud Computing 2(5): 64-69 (2015). 5. Atzori, M. “Block Chain Governance and the Role of Trust Service Providers”: The TrustedChain® Network. (2017) 6. Baars, D. “Towards Self-sovereign Identity Using Block chain Technology (Master's thesis)”. University of Twenty, Enscheda, Netherlands. . (2016). 7. Bandyopadhyay, P. The Origin of Block Chain from Cypherpunks to Satoshi to IBM Medium”. (2018) 8. Higgins, S. “Factor Outlines Record-Keeping Network that Utilizes Bit Coin’s Block Chain”. (2014) 9. Cheng S., Duab M., Domeyer A., Lnudqvis M.: “Using Block Chain to Improve Data Management in the Public Sector”. 10. Anh, D.T.T., Zhang, M., Ooi, B.C., Chen, G.: “Untangling Block Chain: A Data Processing View of Block Chain Systems”. IEEE Trans. Knowl. Data Eng. 30(7), 13661385 (2018).
Download now