SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5556
SECURING THE TRANSFER OF CONFIDENTIAL DATA IN FISCAL DEVICES
USING BLOCKCHAIN
BOBBY K SIMON, ANJANA P NAIR
1BOBBY K SIMON M.Tech Computer Science & Engineering. Sree Buddha College of Engineering,
Ayathil, Elavumthitta, Pathanamthitta , Kerala, India.
2 Ms. ANJANA P NAIR Assistant Professor Computer Science & Engineering. Sree Buddha College of Engineering,
Ayathil, Elavumthitta, Pathanamthitta, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract The data transfer in fiscal device terminals are utilized as inward or outside specializedGPRSgadgets, sendingcharge
related data from financial money registers and monetary printers to an expense organization server, so cyber security is of
fundamental significance. With a huge amount of personal data in big data era, fiscal devices are at high risks associated with
potential disclosure of privacy data. In this paper, a trustworthy method is proposed during transaction phase, which helps to
protect user’s data. The method proposed is AES 256 and it also helps to encrypt theuser’spersonaldatawith256bitkey. Sincethe
amount of data is very large the concept of block chain is used. It helps in reducing the storage space and also protects the stored
data with the help of SHA. For processing this bulk of data Hash function is being used. This paper also implements security of
stored data for each tax payer with the help of block chain.
Key Words: AES, SHA, MLP, IT, IOT, PT, BLOCKCHAIN
1. INTRODUCTION
Data security refers to the method ofprotectiveknowledgefromunauthorizedaccessandknowledgecorruptionthroughoutits
lifecycle. Data security includes encryption, tokenization, and key management practices that defend knowledge across all
applications and platforms. Organizations round the globe area unit finance heavily in info technology (IT) cyber defense
capabilities to shield their important assets. Whether associate degree enterprisehasto defenda complete,intellectual capital,
and customer information or provide controls for critical infrastructure, the means for incident detection and response to
protecting organizational interests have 3 common elements: individuals, processes, andtechnology.Software-basedsecurity
solutions inscribe the info to shield it from thieving. However, a worm or a hacker might corrupt the info so as to create it
irrecoverable, making the system unusable. Hardware-based security solutions will forestall browse and write access to
knowledge and thence provide terribly sturdy protection against change of stateandunauthorizedaccess. Data transferisthat
the method of exploitation computing techniques andtechnologiestotransmitortransfer electronicoranalogknowledgefrom
one laptop node to a different. Data is transferred within the type of bits and bytes over a digital or analog medium, and the
process enables digital or analog communications and its movement between devices. Fiscal memory devices area unit
electronic devices used for management of a country's tax revenues. Currently they're wide employed in several countries
round the world, as well as Russia, Bulgaria, Serbia, Romania, Republic of Macedonia, Albania, Poland, Moldova, etc.,
commercial enterprise memory itself may be a kind of memory that'scertifiedbyacceptablegovernmentbody. ThisEncrypted
module is usually in the form of an IC on the Electronic circuit. In the data transferring many threats are in the process, so we
use AES or Advanced Encryption Standard is a cipher, i.e., a method for encrypting and decrypting information. Wheneveryou
transmit files over secure file transfer protocols like HTTPS, FTPSor SFTP,there'sa goodchanceyourdata will be encryptedby
some flavour of AES - either AES 256, 192, or 128.1.1
1.1 Objective
This proposed framework has significantapplications in avariety of security methods. For instance, consider a huge amountof
confidential data transferring to online system for business purpose. The individual data transferring to online in a way that it
does not hack the data on that transformation for using AES 256 bit key but the bulk of data transfer are hacked of these
transaction, it wasaffected on banking sector.Inthiscasethebanksandothertaxdepartmentsaredetectingtheattackerandthe
data is getting safe due to the transactions using block-chain method. In Oder to do so, if first users are one of the taxpayer’s
personal data to get encrypted using AES 256 from that the huge confidential data of one branch of a bank to get transfer and
store using block-chain method (block models) Finally, from a big security perspective,weuseandblockchaintechnologyhelps
to make online data transmission secure by eliminating middlemen and singular control. Because the blockchain is completely
decentralized, there is no single source controlling it. Ifablockisaddedwhichattemptstocheatthesystem,itwilllook markedly
different from the others. Because the blockchain requires the consensus of all users, the malicious version of the blockchain is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5557
instantly disposed of. While many of us associate the blockchain concept with crypto currencies and data transferring this
emerging technology can be used to record virtually anything of tangible value. It’s not simply to attack the preserve of digital
finance, as many may have initially thought.
2. METHODOLOGY
The development of this project is done in Microsoft Visual Studio.Net, which is an integrated development environment (IDE)
from Microsoft.C# programs run on the .NET Framework, an integral component of Windows that includes a virtual execution
system called the common language runtime (CLR) and a unified set of class libraries.ASP.NET is a web development platform,
which provides aprogrammingmodel,acomprehensivesoftwareinfrastructureandvariousservicesrequiredtobuilduprobust
web applications for PC as well as mobile devices. The project is proposed to be developed in ASP.Net as front end and SQL
Server 2008 R2 as back end which develop to help powerful software. With the help of these tools and techniques, this project
can be implemented.
2.1 Existing System
GPRS terminals are used as internal or external communication devices, sending tax related information from fiscal cash
registers and fiscal printers to a tax administration server. Many IoT devices exchanged completely unencrypted information
with servers. Using AES 128 bit is used for processing the data transfer. The tax administration server communicates with the
existing fiscal device using plaintext (PT), i.e. non-encrypted data, passing through the existing GPRS terminal and
telecommunication operator’s nodes including the transaction (journal) memory, with the external optional computer device.
2.1.1 Disadvantages
 Existing method provides less security for data transfer.
 If the data transfer uses symmetric Algorithm and if the key is leaked to the users, then the data will be visible to third
party and the confidential data will be masquerade.
 The difficulties and costs of implementing encryption on technically limited IoT devices is well known problem.
 Large storage space is required for the huge data.
2.2 Proposed System
The main focus relays on securedata transfer during thetransaction.Thetaxpayer’suserdataaresecurelysavedusingAES-256
bit key. These data can be viewed only by tax payer and the authority. Also, the data will be saved in data server by encryption
Algorithm. Along with this, even if the respective authority wishes to see the taxpayer personal information, then they have to
decrypt the data with their authority ID and password. When the amount of data is as huge as Data warehouse, the respective
authority will transfer the data to their headquarters with the help of block-chain. This is mainly done for the security purpose
during the data transfer. Those data will also be stored and saved in this block-chaining as blocks of data. When an attacker
performs his job, the data will not be modified or deleted neither the tax person’s personal information will be gained, it will be
integrated. Along with this the tax payer will be noticed by an SMS and Email that their account is being hacked. This project is
also designed for user-friendly purpose.
3. SYSTEM ARCHITECTURE
 This software is being designed for the Tax Department to ensure about the tax payer citizen.
 It is also designed by 3 modules, which includes tax payer, Admin and Attacker.
 In tax payer each user can register with their Tax number, shop license, email Id, machine Id and mobile number. With
this and One-time password (OTP) will be generated. Then the tax payer can login with their Tax payer Id and
password.
 For the Tax payment, the accessed Tax payers can view 3 lists as Tax view, Tax payer list and Defaulters list.
 In Tax view, the authority will display the amount needed to be payed by the particular user and the period of time
(duration), it should be payed.
 To the settle the amount, the tax payer can pay the money throughonlinetransactionwiththeirrespectiveinformation.
In this the transaction is also secured using OTP during the money transfer. Then a POP can be generated to show that
our transaction was successful.
 These data will be automatically encrypted using AES-256 bit Algorithm. The data will be tightly secured in the data
server. Even the authority also cannot read or modify the data. These encrypted data will be in binary bit form.
 In Tax payer list the users can view, whether their payment is processed or not within the duration time.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5558
 Defaulters list is used to display those users who has not payed their Tax.
 In the second module, each Authority should register theirofficial details. The Admin is in chargeofpaymentapproval,
detail report of tax payer, payed user and not payed users can be viewed. The stored data and transferred can also be
viewed by them. They can also identify the attack performed by the attackers and the machine used to perform this
attack, along with their IP address.
Fig 3.1: System Architecture
 Payment Approval is used toensurethe payment list ofusersandtomentionamountneededtobepayedbyeachpayer.
 Tax payers list and Default list is to verify the payed user and non-pay users.
 The detailed report will be viewed by the authority, but to viewtheirpersonalinformationtheyhavetologinagainwith
their authority id and password for more security purpose.
 Then the encrypted binary data will be decrypted to a readable form and displayed to the respective authority.
 Data analysis is used to store data, and to check the accuracy of data along with Recall and precision. To convert this
data to ARFF form we use WEKA tool and apply MLP software, and precision, recall and accuracy of data will be
generated.
 Block chaining is used for data securing during confidential data transaction.Heretheauthoritycanchoosethemethod
needed to transfer their data for data security.
 In case of SHA-1 we use MD5 Algorithm to transfer the stored data. In case of SHA-2 we use SHA-256 Algorithm to
transfer the data, in case of SHA-3 we use SHA-384 Algorithm for transferring the data. In case of SHA-4 we use SHA-
512 Algorithm for processing data.
 To produce block chaining, we use previous Hash function and chosen SHA Algorithm for the block data and a java
script will be shown.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5559
 The Tax authority can view the number of transaction and the time used to process this data along with the storage
space required for the particular block data.
 Attacking log is used for the admin, to view and analyze the attack whether it is a transaction attack or machine attack
or if any data being modified.
 A graph is used to display the attack analysis and the number of times attack has occurred will be shown in a grid.
 If an attack is occurred in this software, we can analyze and track the attacker IP address. With this we can verify that
whether our data is being modified or deleted.
 In case of Attacker, he can perform attack during transaction. The attack can be performed throughamachineIdorcan
also perform attack in Tax payer personal data.
 To make this project more efficient for the users, the user will get notification through SMS or email if their account is
being hacked.
4. ALGORITHMS
4.1 AES-256 Encryption Algorithm
The algorithm is implemented as given below
Step 1: when users details are submitted to the admin, each individual users data are encrypted.
Step 2: Keys are encrypted by AESexample.cs (algorithm used in the software) i.e., the object used for data encryption.
“Sytem.security. cryptography framework” is used to encrypt the data.
Step 3: To encrypt, each users tax payer-Id are encrypted by using a session and details will be encrypted.
Step 4: During each transaction a random trans key will be generated and stored in table.
Step 5: With this 2 keys will be generated i.e., key 1- secret key, and key 2- initialization vector(IV) form transaction keys to
generate byte.
Step 6: Next using this byte each transaction details will be encrypted of each user.
Step 7: These encrypted data’s will be store as var-binary in database.
Step 8: During payment for further verification we ask users tax Id and password. For generating OTP, in algorithm we have
provided the number range of 10000 – 200000 and for each user a random number will be generated.
Step 9: And a pop message will be generated as a java script that means payment is successfully completed.
Similarly AES-256 decryption is also performed.
4.2 Block Chain Method
Originally a blockchain is a growing list of records called blocks, which are linked using cryptography. Each block contains a
cryptographic hash function with apreviouscontinuesblockofatimestampandthetransactiondata.Theblockchainisdesigned
as; a blockchain is non-resistant to modification of the data. It is "an open, distributed ledger that can record transactions
between two parties efficiently and in a verifiable and permanent way. Blockchain is considered a type of payment rail. Private
Blockchain has been proposedforbusinessuse.SourcessuchasComputerworldcalledthemarketingofsuchblockchainwithout
a proper security model "snake chain”. The method is implemented as given below.
Step 1: After the calculation of precision, recall and accuracy value, the online transferring data are then used for blockchain
method.
Step 2: In this database, when there are huge bulks of data for taxpayers, the details are Taxpayer ID, Tax amount, Date, Bank,
PIN, Account number, Card number, Machine ID.
Step 3: Incase if the stored details of any data’s are accessed by an attacker or if they track the AES key then the data can be
updated or changed. Then all the confidential data will be hacked.
Step 4: So, in this critic’s, the authority can create class name as block. In this block they assign an object. For that authority can
apply SHA method in the blockchain technology.
Step 5: Used for SHA method. In case of SHA-1 MD5 Algorithm is used tto stored data. In case of SHA-2, SHA-256 Algorithm is
used to securethe data, in case of SHA-3, SHA-384 Algorithm is used. In caseofSHA-4,SHA-512Algorithmisusedforprocessing
data.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5560
Step 6: If the blockchain is applied to the framework, but in this case the data is of live transaction information. The transaction
data will get encrypted for a secret password by using the hashing technique. This is used to make our data secure during
storage.
Step 7: The stored block chain details include the secret password (calculated using hash function) and first taxpayer online
transaction ID; these data will be secured in blockchain of each individual taxpayers.
Step 8: Similarly second transaction data will be secured. For securing the details of second transaction the result of first
transaction is taken or hash function of some values and along with that second transaction ID, later all the data are of second
online taxpayer.
Step 9: Then this process is continued, all the online transaction data can be secured in chain to chain or peer to peer process.
These secured data will be in a block and stored in database as a blockchain.
Step 10: The securely stored data, if any of the attacker try to hack the taxpayer detail it could not be accessed.
Step 11: The reason is that ifany of the attacker tries to updateor hack the data then all the taxpayerstransactiondetailswillbe
removed in the database. i.e.; the technology of blockchain is used.
Step 12: The blockchain technology can be applied in the database forthe highly confidential stored data, forthe attackernotto
access anyone’s data.
4.3 Secure Hash Algorithm (SHA)
The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and
Technology (NIST) as a U.S Federal Information Processing Standard (FIPS), including:
 SHA-1: A 160-bit hash function which resembles the earlierMD5 algorithm.ThiswasdesignedbytheNationalSecurity
Agency (NSA) to be part of the Digital Signature Algorithm. Cryptographic weaknesses were discovered in SHA-1, and
the standard was no longer approved for most cryptographic uses after 2010.
 SHA-2: A family of two similar hash functions, with differentblocksizes,knownasSHA-256andSHA-512.Theydifferin
the word size; SHA-256 uses32-bit words where SHA-512uses 64-bit words.Therearealsotruncatedversionsofeach
standard, known as SHA-224, SHA-384. These were also designed by the NSA.
 SHA-3: A hash function formerly called Keccak, chosen in 2012 after a public competition amongnon-NSAdesigners.It
supports the same hash lengths as SHA-2, and its internal structurediffers significantly from the restoftheSHAfamily.
For this we use hash function SHA-384.
 SHA-4: For this we use SHA-512 where 64-bit words. Hash functions with different block sizes, known as SHA-512.
There are also truncated versions of each standard, known as, SHA-512/224 and SHA-512/256. These were also
designed by the NSA.
5. RESULT AND ANALYSIS
The purpose of system testing is to identify and detect the attacks occurred in the system. Testing is an important element of
the software, quality and assurance represents the ultimate review of specification,designandcoding.Theincreasingvisibility
of the software as a system element and the costs associated with a software failure are motivated forces for well planned
testing. In this section, the calculated data analysis value is compared using MLP and accuracy, precision and recall values are
calculated. Later shows how secured our software is? And how secured our data’s will be? During blockchain technique
transaction count is also calculated and storage space and time required for storingthatparticulardata.Andforresultanalysis
graph representations are used to show the variations in the calculated values. Blockchain technique,inwhichduringthedata
storage process it shows how much space is required to store the required data. And it also calculates the time required to
process this technique. While this process gets preceded, the transaction of data is also countedalong withthis,i.e., blockchain
technology also calculate the number of times data are securely stored.
Fig 5.1: Graph Showing Effiecency ,Storage and No of Records
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5561
This diagram figure 5.1 Show the time taken during the records storage with all the SHA functions during the blockchain
process and it also shows the space used for transaction data during blockchain and its space used to store these data. Figure
5.2 shows the bar chart diagram for data storage and time required to store all the data’s. These different bar chart
representations are used to show our blockchain efficiency and secure transaction data’s can bestoredinourdatabase. Attack
analysis is used for the possibilities or chances in which attack can occur during our online transaction, or using any random
tax payerId, or with any machine Id’s. Therefore with this Therefore with this graph it can be analyzed, that the high risk
occurrence is in the online transaction details of the database system used for the tax payment.
Fig 5.2: Graph Showing Data Storage and Attack Analysis
6. CONCLUSION
The proposed method shows that the software is highly secured for tax payment and also for sharing personal details. This
software is developed for Tax department, and purpose include payment and to check the tax payment details and its validity.
This can be divided in three ways such as tax payer (common users), Admin (tax authority) and Attacker. To secure the data
transaction AES-256 bit encryption and decryption is performed. And huge confidential data’s are stored using Blockchain
technique with the help of hash functions such as SHA-1, SHA-2, SHA-3 and SHA-4. The attack phase is used to verify how well
organized the software is. Even when an attack occurs it can be tracked using the attacker IP address. This is user friendlyand
is efficient to be used by all the citizens and this software also be used in any secure data transaction fields. For future
enhancement, etheurium algorithm can be used for secure transactions.
REFERENCES
[1] D. Kornack and P. Rakic, “Cell Proliferation without NeurogenesisinAdultPrimateNeocortex,”Science,vol.294,Dec.2001,
pp. 2127-2130, doi:10.1126/science.1065467. [1]M.Prokin,D.Prokin,“Firstgenerationofturnovercontrol devices,”Proc.
19th Telecommunications forum (TELFOR), 2011, Belgrade, Serbia, pp. 888-891.
[2] M. Prokin, D. Prokin, “Improved fiscal devices without additional services,” Proc. 5th Mediterranean Conference on
Embedded Computing (MECO), 2016, Budva, Montenegro, pp. 273-276.
[3] “Common cyberattacks,” Cert-UK, Internet: https://www.ncsc.gov.uk/ content/files/
protected_files/guidance_files/common_cyber_attacks_2016.pdf, Dec. 1, 2015 [Feb. 16, 2018]
[4] “Fostering the advancement of the Internet of Things,” The Department of commerce, Internet policy task force & Digital
economy leadership team, Washington DC, USA, Jan. 2017.
[5] J.A. Eisenach, C. Barfield, J.K. Glassman, M. Loyola, S. Tews, “An American strategy for cyberspace – Advancing freedom,
security, and prosperity,” American Enterprise Institute, June 2016.
[6] “Threats report,” McAfee Labs, Intel Security, Aug. 2015.
[7] L. Constantin, “Armies of hacked IoT devices launch unprecedented DDoS attacks.”
Internet:https://www.pcworld.idg.com.au/article/607509/armies-hacked-iot-devices-launch-unprecedented-ddos-
attacks/, Sep. 27, 2016 [Feb. 16, 2018]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5562
[8] S. Ragan, “Here are the 61 passwords that powered the Mirao IoT botnet.” Internet:
https://www.csoonline.com/article/3126924/security/here-are-the-61-passwords-that powered-the-mirai-iot-
botnet.html, Oct. 3, 2016 [Feb. 16, 2018]
[9] D. Storm, “Code in the wild to infect millions of IoT devices for crippling DDoS attacks.” Internet:
https://www.computerworld.com/article/3126864/security/code-in-the-wild-to-infect-millions-of-iotdevices-for-
crippling-ddos-attacks.html, Oct. 3, 2016 [Feb. 16, 2018]
[10] E. Dresselhuys, “To predict the IoT future, it helps to look to the past.” Internet:
https://readwrite.com/2016/10/03/predict-iot-future-pl1/, Oct. 3, 2016 [Feb. 16, 2018]
[11] M. Ramsinghani, “How the ‘insecurity of things’ creates the next wave of security opportunities.” Internet:
https://techcrunch.com/2016/06/26/how-the-insecurity-of-things-creates-the-next-wave-of-securityopportunities/,Jun.
26, 2016 [Feb. 16, 2018]
[12] Y.M.Pa Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama,C.Rossow,“IoTPOT:Anovel honeypotforrevealingcurrentIoT
threats,” Journal of Information Processing, vol. 24, no. 3, May 2016, pp. 522- 533.
[13] D. Coldewey, “This security camera was infected by malware 98seconds after it was plugged in.” Internet:
https://techcrunch.com/2016/11/18/this-security-camera-was-infected-by-malware-in-98-secondsafter-it-was-plugged-
in/, Nov. 18, 2016 [Feb. 16, 2018]
[14] L. Tung, “Mozilla: The internet is unhealthy and urgently needs your help.” Internet:
http://www.zdnet.com/article/mozilla-the-internet-isunhealthy-and-urgently-needs-your help/, Jan.20,2016[Feb.16,
2018]
[15] M. Prokin, “Qualification form for GPRS terminal manufacturer registration.” Internet:
http://www.dmdm.rs/PDF/FUT/FUTKval Formular.pdf, Apr. 26, 2005 [Feb. 16, 2018]
[16] Beyond the hype: Blockchain in capital markets, http://www.mckinsey.com/industries /financial-
service/ourinsights/beyond-the-hype-blockchains-in-capital-markets
[17] Blockchain Adoption Moving Rapidly in BankingandFinancial Markets:Some65PercentofSurveyedBanksexpecttobein
Production in Three Years, https://www03.ibm.com /press/us/en/press release/50617.wss
BIOGRAPHIES
BOBBY K SIMON, received the Bachelor’sDegreeinComputerScienceandEngineeringfromKarpagamUniversity,TamilNadu,
India in 2017. He is currently pursing Master’s Degree in Computer Science and Engineering in Sree Buddha College of
Engineering, Kerala, India. His research area of interest includes the field of internet security, data mining and technologiesin
Department of Computer Science and Engineering.
ANJANA P NAIR, received the bachelor’s degree in LBSInstituteofTechnologyfor Women,Kerala,India.Andmaster’sdegree
in Computer Science and Engineering from Sree Buddha College of Engineering, Kerala, India in 2013. She is a lecturer in the
Department of Computer Science and Engineering, Sree Buddha College of Engineering. Her main area of interest is Core
Computers and has published more than 10 referred papers.

More Related Content

What's hot

IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
IRJET Journal
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
IJERA Editor
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET Journal
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET Journal
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
IJMER
 
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET Journal
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
Mukesh Chinta
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IJERA Editor
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET Journal
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
IJERA Editor
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
AM Publications,India
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
IRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
gr9293
 

What's hot (20)

IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 

Similar to IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blockchain

IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
IRJET Journal
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET Journal
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
IRJET Journal
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
IRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
 

Similar to IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blockchain (20)

IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 

IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blockchain

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5556 SECURING THE TRANSFER OF CONFIDENTIAL DATA IN FISCAL DEVICES USING BLOCKCHAIN BOBBY K SIMON, ANJANA P NAIR 1BOBBY K SIMON M.Tech Computer Science & Engineering. Sree Buddha College of Engineering, Ayathil, Elavumthitta, Pathanamthitta , Kerala, India. 2 Ms. ANJANA P NAIR Assistant Professor Computer Science & Engineering. Sree Buddha College of Engineering, Ayathil, Elavumthitta, Pathanamthitta, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract The data transfer in fiscal device terminals are utilized as inward or outside specializedGPRSgadgets, sendingcharge related data from financial money registers and monetary printers to an expense organization server, so cyber security is of fundamental significance. With a huge amount of personal data in big data era, fiscal devices are at high risks associated with potential disclosure of privacy data. In this paper, a trustworthy method is proposed during transaction phase, which helps to protect user’s data. The method proposed is AES 256 and it also helps to encrypt theuser’spersonaldatawith256bitkey. Sincethe amount of data is very large the concept of block chain is used. It helps in reducing the storage space and also protects the stored data with the help of SHA. For processing this bulk of data Hash function is being used. This paper also implements security of stored data for each tax payer with the help of block chain. Key Words: AES, SHA, MLP, IT, IOT, PT, BLOCKCHAIN 1. INTRODUCTION Data security refers to the method ofprotectiveknowledgefromunauthorizedaccessandknowledgecorruptionthroughoutits lifecycle. Data security includes encryption, tokenization, and key management practices that defend knowledge across all applications and platforms. Organizations round the globe area unit finance heavily in info technology (IT) cyber defense capabilities to shield their important assets. Whether associate degree enterprisehasto defenda complete,intellectual capital, and customer information or provide controls for critical infrastructure, the means for incident detection and response to protecting organizational interests have 3 common elements: individuals, processes, andtechnology.Software-basedsecurity solutions inscribe the info to shield it from thieving. However, a worm or a hacker might corrupt the info so as to create it irrecoverable, making the system unusable. Hardware-based security solutions will forestall browse and write access to knowledge and thence provide terribly sturdy protection against change of stateandunauthorizedaccess. Data transferisthat the method of exploitation computing techniques andtechnologiestotransmitortransfer electronicoranalogknowledgefrom one laptop node to a different. Data is transferred within the type of bits and bytes over a digital or analog medium, and the process enables digital or analog communications and its movement between devices. Fiscal memory devices area unit electronic devices used for management of a country's tax revenues. Currently they're wide employed in several countries round the world, as well as Russia, Bulgaria, Serbia, Romania, Republic of Macedonia, Albania, Poland, Moldova, etc., commercial enterprise memory itself may be a kind of memory that'scertifiedbyacceptablegovernmentbody. ThisEncrypted module is usually in the form of an IC on the Electronic circuit. In the data transferring many threats are in the process, so we use AES or Advanced Encryption Standard is a cipher, i.e., a method for encrypting and decrypting information. Wheneveryou transmit files over secure file transfer protocols like HTTPS, FTPSor SFTP,there'sa goodchanceyourdata will be encryptedby some flavour of AES - either AES 256, 192, or 128.1.1 1.1 Objective This proposed framework has significantapplications in avariety of security methods. For instance, consider a huge amountof confidential data transferring to online system for business purpose. The individual data transferring to online in a way that it does not hack the data on that transformation for using AES 256 bit key but the bulk of data transfer are hacked of these transaction, it wasaffected on banking sector.Inthiscasethebanksandothertaxdepartmentsaredetectingtheattackerandthe data is getting safe due to the transactions using block-chain method. In Oder to do so, if first users are one of the taxpayer’s personal data to get encrypted using AES 256 from that the huge confidential data of one branch of a bank to get transfer and store using block-chain method (block models) Finally, from a big security perspective,weuseandblockchaintechnologyhelps to make online data transmission secure by eliminating middlemen and singular control. Because the blockchain is completely decentralized, there is no single source controlling it. Ifablockisaddedwhichattemptstocheatthesystem,itwilllook markedly different from the others. Because the blockchain requires the consensus of all users, the malicious version of the blockchain is
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5557 instantly disposed of. While many of us associate the blockchain concept with crypto currencies and data transferring this emerging technology can be used to record virtually anything of tangible value. It’s not simply to attack the preserve of digital finance, as many may have initially thought. 2. METHODOLOGY The development of this project is done in Microsoft Visual Studio.Net, which is an integrated development environment (IDE) from Microsoft.C# programs run on the .NET Framework, an integral component of Windows that includes a virtual execution system called the common language runtime (CLR) and a unified set of class libraries.ASP.NET is a web development platform, which provides aprogrammingmodel,acomprehensivesoftwareinfrastructureandvariousservicesrequiredtobuilduprobust web applications for PC as well as mobile devices. The project is proposed to be developed in ASP.Net as front end and SQL Server 2008 R2 as back end which develop to help powerful software. With the help of these tools and techniques, this project can be implemented. 2.1 Existing System GPRS terminals are used as internal or external communication devices, sending tax related information from fiscal cash registers and fiscal printers to a tax administration server. Many IoT devices exchanged completely unencrypted information with servers. Using AES 128 bit is used for processing the data transfer. The tax administration server communicates with the existing fiscal device using plaintext (PT), i.e. non-encrypted data, passing through the existing GPRS terminal and telecommunication operator’s nodes including the transaction (journal) memory, with the external optional computer device. 2.1.1 Disadvantages  Existing method provides less security for data transfer.  If the data transfer uses symmetric Algorithm and if the key is leaked to the users, then the data will be visible to third party and the confidential data will be masquerade.  The difficulties and costs of implementing encryption on technically limited IoT devices is well known problem.  Large storage space is required for the huge data. 2.2 Proposed System The main focus relays on securedata transfer during thetransaction.Thetaxpayer’suserdataaresecurelysavedusingAES-256 bit key. These data can be viewed only by tax payer and the authority. Also, the data will be saved in data server by encryption Algorithm. Along with this, even if the respective authority wishes to see the taxpayer personal information, then they have to decrypt the data with their authority ID and password. When the amount of data is as huge as Data warehouse, the respective authority will transfer the data to their headquarters with the help of block-chain. This is mainly done for the security purpose during the data transfer. Those data will also be stored and saved in this block-chaining as blocks of data. When an attacker performs his job, the data will not be modified or deleted neither the tax person’s personal information will be gained, it will be integrated. Along with this the tax payer will be noticed by an SMS and Email that their account is being hacked. This project is also designed for user-friendly purpose. 3. SYSTEM ARCHITECTURE  This software is being designed for the Tax Department to ensure about the tax payer citizen.  It is also designed by 3 modules, which includes tax payer, Admin and Attacker.  In tax payer each user can register with their Tax number, shop license, email Id, machine Id and mobile number. With this and One-time password (OTP) will be generated. Then the tax payer can login with their Tax payer Id and password.  For the Tax payment, the accessed Tax payers can view 3 lists as Tax view, Tax payer list and Defaulters list.  In Tax view, the authority will display the amount needed to be payed by the particular user and the period of time (duration), it should be payed.  To the settle the amount, the tax payer can pay the money throughonlinetransactionwiththeirrespectiveinformation. In this the transaction is also secured using OTP during the money transfer. Then a POP can be generated to show that our transaction was successful.  These data will be automatically encrypted using AES-256 bit Algorithm. The data will be tightly secured in the data server. Even the authority also cannot read or modify the data. These encrypted data will be in binary bit form.  In Tax payer list the users can view, whether their payment is processed or not within the duration time.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5558  Defaulters list is used to display those users who has not payed their Tax.  In the second module, each Authority should register theirofficial details. The Admin is in chargeofpaymentapproval, detail report of tax payer, payed user and not payed users can be viewed. The stored data and transferred can also be viewed by them. They can also identify the attack performed by the attackers and the machine used to perform this attack, along with their IP address. Fig 3.1: System Architecture  Payment Approval is used toensurethe payment list ofusersandtomentionamountneededtobepayedbyeachpayer.  Tax payers list and Default list is to verify the payed user and non-pay users.  The detailed report will be viewed by the authority, but to viewtheirpersonalinformationtheyhavetologinagainwith their authority id and password for more security purpose.  Then the encrypted binary data will be decrypted to a readable form and displayed to the respective authority.  Data analysis is used to store data, and to check the accuracy of data along with Recall and precision. To convert this data to ARFF form we use WEKA tool and apply MLP software, and precision, recall and accuracy of data will be generated.  Block chaining is used for data securing during confidential data transaction.Heretheauthoritycanchoosethemethod needed to transfer their data for data security.  In case of SHA-1 we use MD5 Algorithm to transfer the stored data. In case of SHA-2 we use SHA-256 Algorithm to transfer the data, in case of SHA-3 we use SHA-384 Algorithm for transferring the data. In case of SHA-4 we use SHA- 512 Algorithm for processing data.  To produce block chaining, we use previous Hash function and chosen SHA Algorithm for the block data and a java script will be shown.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5559  The Tax authority can view the number of transaction and the time used to process this data along with the storage space required for the particular block data.  Attacking log is used for the admin, to view and analyze the attack whether it is a transaction attack or machine attack or if any data being modified.  A graph is used to display the attack analysis and the number of times attack has occurred will be shown in a grid.  If an attack is occurred in this software, we can analyze and track the attacker IP address. With this we can verify that whether our data is being modified or deleted.  In case of Attacker, he can perform attack during transaction. The attack can be performed throughamachineIdorcan also perform attack in Tax payer personal data.  To make this project more efficient for the users, the user will get notification through SMS or email if their account is being hacked. 4. ALGORITHMS 4.1 AES-256 Encryption Algorithm The algorithm is implemented as given below Step 1: when users details are submitted to the admin, each individual users data are encrypted. Step 2: Keys are encrypted by AESexample.cs (algorithm used in the software) i.e., the object used for data encryption. “Sytem.security. cryptography framework” is used to encrypt the data. Step 3: To encrypt, each users tax payer-Id are encrypted by using a session and details will be encrypted. Step 4: During each transaction a random trans key will be generated and stored in table. Step 5: With this 2 keys will be generated i.e., key 1- secret key, and key 2- initialization vector(IV) form transaction keys to generate byte. Step 6: Next using this byte each transaction details will be encrypted of each user. Step 7: These encrypted data’s will be store as var-binary in database. Step 8: During payment for further verification we ask users tax Id and password. For generating OTP, in algorithm we have provided the number range of 10000 – 200000 and for each user a random number will be generated. Step 9: And a pop message will be generated as a java script that means payment is successfully completed. Similarly AES-256 decryption is also performed. 4.2 Block Chain Method Originally a blockchain is a growing list of records called blocks, which are linked using cryptography. Each block contains a cryptographic hash function with apreviouscontinuesblockofatimestampandthetransactiondata.Theblockchainisdesigned as; a blockchain is non-resistant to modification of the data. It is "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way. Blockchain is considered a type of payment rail. Private Blockchain has been proposedforbusinessuse.SourcessuchasComputerworldcalledthemarketingofsuchblockchainwithout a proper security model "snake chain”. The method is implemented as given below. Step 1: After the calculation of precision, recall and accuracy value, the online transferring data are then used for blockchain method. Step 2: In this database, when there are huge bulks of data for taxpayers, the details are Taxpayer ID, Tax amount, Date, Bank, PIN, Account number, Card number, Machine ID. Step 3: Incase if the stored details of any data’s are accessed by an attacker or if they track the AES key then the data can be updated or changed. Then all the confidential data will be hacked. Step 4: So, in this critic’s, the authority can create class name as block. In this block they assign an object. For that authority can apply SHA method in the blockchain technology. Step 5: Used for SHA method. In case of SHA-1 MD5 Algorithm is used tto stored data. In case of SHA-2, SHA-256 Algorithm is used to securethe data, in case of SHA-3, SHA-384 Algorithm is used. In caseofSHA-4,SHA-512Algorithmisusedforprocessing data.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5560 Step 6: If the blockchain is applied to the framework, but in this case the data is of live transaction information. The transaction data will get encrypted for a secret password by using the hashing technique. This is used to make our data secure during storage. Step 7: The stored block chain details include the secret password (calculated using hash function) and first taxpayer online transaction ID; these data will be secured in blockchain of each individual taxpayers. Step 8: Similarly second transaction data will be secured. For securing the details of second transaction the result of first transaction is taken or hash function of some values and along with that second transaction ID, later all the data are of second online taxpayer. Step 9: Then this process is continued, all the online transaction data can be secured in chain to chain or peer to peer process. These secured data will be in a block and stored in database as a blockchain. Step 10: The securely stored data, if any of the attacker try to hack the taxpayer detail it could not be accessed. Step 11: The reason is that ifany of the attacker tries to updateor hack the data then all the taxpayerstransactiondetailswillbe removed in the database. i.e.; the technology of blockchain is used. Step 12: The blockchain technology can be applied in the database forthe highly confidential stored data, forthe attackernotto access anyone’s data. 4.3 Secure Hash Algorithm (SHA) The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S Federal Information Processing Standard (FIPS), including:  SHA-1: A 160-bit hash function which resembles the earlierMD5 algorithm.ThiswasdesignedbytheNationalSecurity Agency (NSA) to be part of the Digital Signature Algorithm. Cryptographic weaknesses were discovered in SHA-1, and the standard was no longer approved for most cryptographic uses after 2010.  SHA-2: A family of two similar hash functions, with differentblocksizes,knownasSHA-256andSHA-512.Theydifferin the word size; SHA-256 uses32-bit words where SHA-512uses 64-bit words.Therearealsotruncatedversionsofeach standard, known as SHA-224, SHA-384. These were also designed by the NSA.  SHA-3: A hash function formerly called Keccak, chosen in 2012 after a public competition amongnon-NSAdesigners.It supports the same hash lengths as SHA-2, and its internal structurediffers significantly from the restoftheSHAfamily. For this we use hash function SHA-384.  SHA-4: For this we use SHA-512 where 64-bit words. Hash functions with different block sizes, known as SHA-512. There are also truncated versions of each standard, known as, SHA-512/224 and SHA-512/256. These were also designed by the NSA. 5. RESULT AND ANALYSIS The purpose of system testing is to identify and detect the attacks occurred in the system. Testing is an important element of the software, quality and assurance represents the ultimate review of specification,designandcoding.Theincreasingvisibility of the software as a system element and the costs associated with a software failure are motivated forces for well planned testing. In this section, the calculated data analysis value is compared using MLP and accuracy, precision and recall values are calculated. Later shows how secured our software is? And how secured our data’s will be? During blockchain technique transaction count is also calculated and storage space and time required for storingthatparticulardata.Andforresultanalysis graph representations are used to show the variations in the calculated values. Blockchain technique,inwhichduringthedata storage process it shows how much space is required to store the required data. And it also calculates the time required to process this technique. While this process gets preceded, the transaction of data is also countedalong withthis,i.e., blockchain technology also calculate the number of times data are securely stored. Fig 5.1: Graph Showing Effiecency ,Storage and No of Records
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5561 This diagram figure 5.1 Show the time taken during the records storage with all the SHA functions during the blockchain process and it also shows the space used for transaction data during blockchain and its space used to store these data. Figure 5.2 shows the bar chart diagram for data storage and time required to store all the data’s. These different bar chart representations are used to show our blockchain efficiency and secure transaction data’s can bestoredinourdatabase. Attack analysis is used for the possibilities or chances in which attack can occur during our online transaction, or using any random tax payerId, or with any machine Id’s. Therefore with this Therefore with this graph it can be analyzed, that the high risk occurrence is in the online transaction details of the database system used for the tax payment. Fig 5.2: Graph Showing Data Storage and Attack Analysis 6. CONCLUSION The proposed method shows that the software is highly secured for tax payment and also for sharing personal details. This software is developed for Tax department, and purpose include payment and to check the tax payment details and its validity. This can be divided in three ways such as tax payer (common users), Admin (tax authority) and Attacker. To secure the data transaction AES-256 bit encryption and decryption is performed. And huge confidential data’s are stored using Blockchain technique with the help of hash functions such as SHA-1, SHA-2, SHA-3 and SHA-4. The attack phase is used to verify how well organized the software is. Even when an attack occurs it can be tracked using the attacker IP address. This is user friendlyand is efficient to be used by all the citizens and this software also be used in any secure data transaction fields. For future enhancement, etheurium algorithm can be used for secure transactions. REFERENCES [1] D. Kornack and P. Rakic, “Cell Proliferation without NeurogenesisinAdultPrimateNeocortex,”Science,vol.294,Dec.2001, pp. 2127-2130, doi:10.1126/science.1065467. [1]M.Prokin,D.Prokin,“Firstgenerationofturnovercontrol devices,”Proc. 19th Telecommunications forum (TELFOR), 2011, Belgrade, Serbia, pp. 888-891. [2] M. Prokin, D. Prokin, “Improved fiscal devices without additional services,” Proc. 5th Mediterranean Conference on Embedded Computing (MECO), 2016, Budva, Montenegro, pp. 273-276. [3] “Common cyberattacks,” Cert-UK, Internet: https://www.ncsc.gov.uk/ content/files/ protected_files/guidance_files/common_cyber_attacks_2016.pdf, Dec. 1, 2015 [Feb. 16, 2018] [4] “Fostering the advancement of the Internet of Things,” The Department of commerce, Internet policy task force & Digital economy leadership team, Washington DC, USA, Jan. 2017. [5] J.A. Eisenach, C. Barfield, J.K. Glassman, M. Loyola, S. Tews, “An American strategy for cyberspace – Advancing freedom, security, and prosperity,” American Enterprise Institute, June 2016. [6] “Threats report,” McAfee Labs, Intel Security, Aug. 2015. [7] L. Constantin, “Armies of hacked IoT devices launch unprecedented DDoS attacks.” Internet:https://www.pcworld.idg.com.au/article/607509/armies-hacked-iot-devices-launch-unprecedented-ddos- attacks/, Sep. 27, 2016 [Feb. 16, 2018]
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5562 [8] S. Ragan, “Here are the 61 passwords that powered the Mirao IoT botnet.” Internet: https://www.csoonline.com/article/3126924/security/here-are-the-61-passwords-that powered-the-mirai-iot- botnet.html, Oct. 3, 2016 [Feb. 16, 2018] [9] D. Storm, “Code in the wild to infect millions of IoT devices for crippling DDoS attacks.” Internet: https://www.computerworld.com/article/3126864/security/code-in-the-wild-to-infect-millions-of-iotdevices-for- crippling-ddos-attacks.html, Oct. 3, 2016 [Feb. 16, 2018] [10] E. Dresselhuys, “To predict the IoT future, it helps to look to the past.” Internet: https://readwrite.com/2016/10/03/predict-iot-future-pl1/, Oct. 3, 2016 [Feb. 16, 2018] [11] M. Ramsinghani, “How the ‘insecurity of things’ creates the next wave of security opportunities.” Internet: https://techcrunch.com/2016/06/26/how-the-insecurity-of-things-creates-the-next-wave-of-securityopportunities/,Jun. 26, 2016 [Feb. 16, 2018] [12] Y.M.Pa Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama,C.Rossow,“IoTPOT:Anovel honeypotforrevealingcurrentIoT threats,” Journal of Information Processing, vol. 24, no. 3, May 2016, pp. 522- 533. [13] D. Coldewey, “This security camera was infected by malware 98seconds after it was plugged in.” Internet: https://techcrunch.com/2016/11/18/this-security-camera-was-infected-by-malware-in-98-secondsafter-it-was-plugged- in/, Nov. 18, 2016 [Feb. 16, 2018] [14] L. Tung, “Mozilla: The internet is unhealthy and urgently needs your help.” Internet: http://www.zdnet.com/article/mozilla-the-internet-isunhealthy-and-urgently-needs-your help/, Jan.20,2016[Feb.16, 2018] [15] M. Prokin, “Qualification form for GPRS terminal manufacturer registration.” Internet: http://www.dmdm.rs/PDF/FUT/FUTKval Formular.pdf, Apr. 26, 2005 [Feb. 16, 2018] [16] Beyond the hype: Blockchain in capital markets, http://www.mckinsey.com/industries /financial- service/ourinsights/beyond-the-hype-blockchains-in-capital-markets [17] Blockchain Adoption Moving Rapidly in BankingandFinancial Markets:Some65PercentofSurveyedBanksexpecttobein Production in Three Years, https://www03.ibm.com /press/us/en/press release/50617.wss BIOGRAPHIES BOBBY K SIMON, received the Bachelor’sDegreeinComputerScienceandEngineeringfromKarpagamUniversity,TamilNadu, India in 2017. He is currently pursing Master’s Degree in Computer Science and Engineering in Sree Buddha College of Engineering, Kerala, India. His research area of interest includes the field of internet security, data mining and technologiesin Department of Computer Science and Engineering. ANJANA P NAIR, received the bachelor’s degree in LBSInstituteofTechnologyfor Women,Kerala,India.Andmaster’sdegree in Computer Science and Engineering from Sree Buddha College of Engineering, Kerala, India in 2013. She is a lecturer in the Department of Computer Science and Engineering, Sree Buddha College of Engineering. Her main area of interest is Core Computers and has published more than 10 referred papers.