SlideShare a Scribd company logo
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 914
TRANSACTION BASED BLOCK CHAIN CRYPTOCURRENCY
S. Aswin1, T. Barathwaj2, M. Mathiyazhagan3, R. Mohan babu4
1,2,3,4B.Tech, Dept of Information Technology, Valliammai Engineering College, Chennai, Tamil Nadu
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract- Blockchain technologies are gaining massive momentum in the last few years. Blockchains are distributed ledgers
that enable parties who do not fully trust each other to maintain a set of global states. The parties agree on the existence,
values, and histories of the states. While the current transaction is based on the centralized system. In which the miner uses
the mechanism to mine the data and do the verification, which initially costs a large amount for the transaction. Once the
node is breaking the data position is unknown. Even if the reversive transaction is enabled, we couldn't track the transaction.
We cannot find the nonce in which amount is or where it is. So, we propose the Transaction based Block chain cryptocurrency.
It is an initial PoC developed in Python. The main aim of this project is to build Transaction based Block chain architecture for
discovering cryptocurrencies. This overcomes the mining transaction, which is decentralized and with that it can be used to
have the nodes to store the ledger. So, the node to node transaction can be monitored. Basically, the transaction to going to
happen between the accounts, this will be sent through a secure cryptographical channel, which is implemented with
cryptographical algorithm. And wallet transaction will be verified and the traffic is captured and verification can be shown for
the security purposes. This is a PoC that runs only on local networks and provides proper security. The code should only be
used to get familiar with the building blocks for a cryptocurrency. Elliptical Curve Cryptographic / ECC public key
compression/decompression is used for security feature. The entire validation is performed based on self-created wallet,
crypto, validation, networking, mining etc. The entire project has been developed using python, Ethereum
Keywords—component; formatting; style; styling; in
I. INTRODUCTION
Blockchain technologies, due to the success of Bitcoin, are taking the world by storm, largely. A blockchain, also called
distributed ledger, which do not fully trust each other, is essentially an append-only data structure maintained by a set of
nodes. Nodes in the blockchain, each containing multiple transactions, agree on an ordered set of blocks, thus the
blockchain can be viewed as a log of ordered transactions. Blockchain can be viewed as a solution to distributed
transaction management, in the database context where nodes keep replicas of the data and agree on an execution order of
transactions. Blockchain systems in such environments are called private (or permissioned), as opposed to the early
systems operating in public environments (or permission less) where anyone can join and leave.
Applications such as security trading and settlement, asset and finance management, banking and insurance are being
built and evaluated. Oracle and MySQL, These applications are currently supported by enterprise-grade database systems
but blockchain has the potential to disrupt this status quo because it incurs lower infrastructure and human costs.
In particular, blockchain’s immutability and transparency help reduce human errors and the need for manual intervention
due to conflicting data. In the original design, Bitcoin’s blockchain stores coins as the system states Bitcoin nodes
implement a simple replicated state machine model, for this application, which moves coins from one address to another.
Since then, blockchain has grown beyond crypto-currencies to support user defined states and Turing complete state
machine models.
For example, Ethereum enables any decentralized, replicated applications known as smart contracts. Interest from the
industry has started to drive development of new blockchain platforms, settings, where participants are authenticated,
designed for private.
II. SCOPE OF THE PROJECT
This concept to developed to have the transaction of the amount without uninterrupted by maintaining the node level
transaction ledger. This project over comes the mining transaction, which is decentralized and that can be used to have the
nodes to store the ledger. So that the node to node transaction can be monitored. Basically, the transaction to going to
happen between the accounts, this will be sent through a secure cryptographical channel, which is implemented with
cryptographical algorithm. And wallet transaction will be verified and the traffic is captured and verification can be shown
for the security purposes.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 915
They have the transaction data that is to be transferred to the other account will be sent through a secured cryptographical
channel. Because these accounts will be having a private and a public key separately. And to avoid the Middle Man attack.
The data is sent through the secured channel. For that we are using Elliptical curve cryptographic system. Each node will
be created with the public and private keys uniquely for that having the address separately. So, the transaction will be
from one account to the other is done by transferring the amount. This sent as a encrypted hashed value through the
nodes. The miners verify the data with the mechanism and the data transaction proceeds. Even the miners fail, the process
is not disturbed, as the ledger is maintained the proceeds.
III. PROPOSED SYSTEM
This concept is developed to have the transaction of the amount without an interruption by maintaining the node level
transaction ledger. This project over comes the mining transaction, which is decentralized and that can be used to have the
nodes to store the ledger. So that the node to node transaction can be monitored. Basically, the transaction to going to
happen between the accounts, this will be sent through a secure cryptographical channel, which is implemented with
cryptographical algorithm. And wallet transaction will be verified and the traffic is captured and verification can be shown
for the security purposes.
The have the transaction data that is to be transferred to the other account will be sent through a secured cryptographical
channel. Because these accounts will be having a private and a public key separately. And to avoid the Middle Man attack.
The data is sent through the secured channel. For that we are using Elliptical curve cryptographic system. Each node will
be created with the public and private keys uniquely for that having the address separately. So, the transaction will be
from one account to the other is done by transferring the amount. This sent as a encrypted hashed value through the
nodes. The miners verify the data with the mechanism and the data transaction proceeds. Even the miners fail, the process
is not disturbed, as the ledger is maintained it proceeds. And wallet transaction will be verified and the traffic is captured
and verification can be shown for the security purposes.
This is a PoC that runs only on local networks and provides proper security. The code should only be used to get familiar
with the building blocks for a cryptocurrency. Elliptical Curve Cryptographic / ECC public key
compression/decompression is used for security feature. The entire validation is performed based on self-created wallet,
crypto, validation, networking, mining etc. The entire project has been developed using python, Ethereum.
IV. ARCHITECHTURE DIAGRAM
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 916
V. USE CASE DIAGRAM
VI. ACTIVITY DIAGRAM
VII. FLOW DIAGRAM
VIII. METHODOLOGY
The content of the ledger reflects historical and current states maintained by the blockchain. Being replicated, updates to
the ledger must be agreed on by all parties. In other words, multiple parties must come to a consensus. Note that this is not
the case in many real-world applications such as fiat currency, in which one entity (e.g., the bank or the government)
decides the updates. One key property of a blockchain system is that the nodes do not trust each other, meaning that some
may behave in Byzantine manners. The consensus protocol must therefore tolerate Byzantine failures. The research
literature on distributed consensus is vast, and there are many variants of previously proposed protocols being developed
for blockchains. They can be largely classified along a spectrum. One extreme consists of purely computation-based
protocols that use proof of computation to randomly select a node which single-handedly decides the next operation.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 917
Bitcoin’s proof-of-work (PoW) is an example. The other extreme is purely communication-based protocols in which nodes
have equal votes and go through multiple rounds of communication to reach consensus. These protocols, PBFT being the
prime example, are used in private settings because they assume authenticated nodes.
IX. MODULE DESCRIPTION
A. CRYPTOGRAPHIC MODULE
Cryptographic module is primarily used for securing the identity off the sender transaction. That it uses the ECC for the
cryptographical transaction. That makes sure that the everyone in the network will be having the copy of the data bring
transferred. The public distributed ledger id maintained. It can be viewed by everyone in the network. That is sent as an
encrypted value as a hashed value. The proof of work is done and maintained, and the mining is done by the miners.
B. ENCODING MODULE
Blockchain eliminates unauthorized access by using cryptographic algorithm to ensure the blocks are kept secure. Each
user in the blockchain will have their own keys. Private and public key. The sender sends the data, as the transaction. The
data will be hashed and the hashed value is passed through the algorithm. Now the transaction data and the public are
transmitted to the receiver. The transaction is passed through the hash function to get the hash value. And it is compared
with the hash value obtained of the transaction.
C. MINING
Proof of work is the method to validate the transaction in blockchain network by solving a complex mathematical
puzzle(mining). Finding the nonce value is the mathematical puzzle that users or miners need to solve in the network. The
puzzle is solved by determining a nonce that generates a hash value and gives an output lesser than an a given output.
miners verify transaction within the blockchain and adds the block to the blockchain when confirmed. With proof of work
the miners compete against each other to solve the mathematical puzzle. The miner who solves the puzzle is rewarded.
D. TRANSANCTION
The transaction module maintains the overall transactional data. That is each node in the blockchain is made to a separate
address and a unique key. These are made have been stored in the database on its itself. The node of the blockchain are made
to have the header and along with it the block verification number and the hashed value of the previous block. And the
nonce value is also kept in here. And the target value is set, that id is predefined.
E. WALLET MODULE
The wallet is created to have the amount for the transaction. That is each node in the blockchain will have the private key
and public key and the address associated with it. If the sender wants to send the amount. The amount will be deducted
from the wallet and the transactions made to view by everyone. And the data is made to send for authentication. Once
authenticated the data will be added to the ledger. And the receiver gets the amount credited.
X. REFERENCES
[1] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008, http://bitcoin.org/bitcoin.pdf, Last accessed: 2017.
[2] Q. Lin, P. Chang, G. Chen, B. C. Ooi, K. Tan, and Z. Wang, “Towards a non-2PC transaction management in distributed data-
base systems,” in Proc. ACM Int. Conf. Manag. Data, 2016, pp. 1659–1674.
[3] A. Thomson, T. Diamond, S. Weng, K. Ren, P. Shao, and D. J. Abadi, “Calvin: Fast distributed transactions for partitioned
data- base systems,” in Proc. ACM Int. Conf. Manag. Data, 2012, pp. 1–12.
[4] P. Bailis, A. Fekete, M. J. Franklin, A. Ghodsi, J. M. Hellerstein, and I. Stoica, “Coordination avoidance in database systems,”
Proc. VLDB Endowment, vol. 8, no. 3, pp. 185–196, 2014.
[5] Ethereum blockchain app platform. (2017). [Online]. Available: https://www.ethereum.org/
[6] Konstantinos Christidis, and Michael Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things” 2016
[7] Nir Kshetri, University of North Carolina at Greensboro, ”Can Blockchai Strengthen the Internet of Thing” 2017
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 918
[8] Keke Gai, Liehuang Zhu,” Block chain-Enabled Reengineering of Cloud Data enters” 2018
[9] Zhaofeng Ma, School of Cyberspace Security, “A master slave blockchain paradigm and Application in Digital rights
management” 2018
[10] Qingsu He, Yu Xu, Yong Yan,JunshegWang,QingzhiHan, and Lili Li, “A Consensus and Incentive Program for Charging
Piles Based on Consortium Blockchain” 2018

More Related Content

What's hot

IRJET- Blockchain Technology for Agriculture Development
IRJET- Blockchain Technology for Agriculture DevelopmentIRJET- Blockchain Technology for Agriculture Development
IRJET- Blockchain Technology for Agriculture Development
IRJET Journal
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
Altoros
 
Blockchain Scalability - Themes, Tools and Techniques
Blockchain Scalability - Themes, Tools and TechniquesBlockchain Scalability - Themes, Tools and Techniques
Blockchain Scalability - Themes, Tools and Techniques
Gokul Alex
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
Yao Yao
 
Brief Introduction to Blockchain Security
Brief Introduction to Blockchain SecurityBrief Introduction to Blockchain Security
Brief Introduction to Blockchain Security
Johnson, Chuan Zhang CISM CCSK OSCP
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed Intelligence
Nuri Cankaya
 
Privacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain TechnologyPrivacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain Technology
Gokul Alex
 
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public EthereumPrivacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Nagib Aouini
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET Journal
 
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET Journal
 
Blockchain On Azure
Blockchain On AzureBlockchain On Azure
Blockchain On Azure
Johan Zammit
 
Executive summary guild42 elca_blockchain.pptx_v1.0
Executive summary guild42 elca_blockchain.pptx_v1.0Executive summary guild42 elca_blockchain.pptx_v1.0
Executive summary guild42 elca_blockchain.pptx_v1.0
Nagib Aouini
 
Fairaccess
FairaccessFairaccess
Fairaccess
aafaf ouaddah
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
Altoros
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Hila Bar
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
 
CNCF Webinar: Simplifying Microservices Security with a Service Mesh
CNCF Webinar:   Simplifying Microservices Security with a Service MeshCNCF Webinar:   Simplifying Microservices Security with a Service Mesh
CNCF Webinar: Simplifying Microservices Security with a Service Mesh
Neeraj Poddar
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
Merlec Mpyana
 
An introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruAn introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ru
LennartF
 

What's hot (20)

IRJET- Blockchain Technology for Agriculture Development
IRJET- Blockchain Technology for Agriculture DevelopmentIRJET- Blockchain Technology for Agriculture Development
IRJET- Blockchain Technology for Agriculture Development
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
 
75
7575
75
 
Blockchain Scalability - Themes, Tools and Techniques
Blockchain Scalability - Themes, Tools and TechniquesBlockchain Scalability - Themes, Tools and Techniques
Blockchain Scalability - Themes, Tools and Techniques
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
 
Brief Introduction to Blockchain Security
Brief Introduction to Blockchain SecurityBrief Introduction to Blockchain Security
Brief Introduction to Blockchain Security
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed Intelligence
 
Privacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain TechnologyPrivacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain Technology
 
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public EthereumPrivacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public Ethereum
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its Countermeasures
 
Blockchain On Azure
Blockchain On AzureBlockchain On Azure
Blockchain On Azure
 
Executive summary guild42 elca_blockchain.pptx_v1.0
Executive summary guild42 elca_blockchain.pptx_v1.0Executive summary guild42 elca_blockchain.pptx_v1.0
Executive summary guild42 elca_blockchain.pptx_v1.0
 
Fairaccess
FairaccessFairaccess
Fairaccess
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
CNCF Webinar: Simplifying Microservices Security with a Service Mesh
CNCF Webinar:   Simplifying Microservices Security with a Service MeshCNCF Webinar:   Simplifying Microservices Security with a Service Mesh
CNCF Webinar: Simplifying Microservices Security with a Service Mesh
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
An introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ruAn introduction to blockchain and hyperledger v ru
An introduction to blockchain and hyperledger v ru
 

Similar to IRJET- Transaction based Block Chain Cryptocurrency

IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
IRJET Journal
 
IRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking Application
IRJET Journal
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing Application
IRJET Journal
 
Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using Blockchain
IRJET Journal
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain Technology
IRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
IRJET Journal
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
IRJET Journal
 
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithmFair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
TELKOMNIKA JOURNAL
 
IRJET- Blockchain Security Implementation for Financial Domains
IRJET- Blockchain Security Implementation for Financial DomainsIRJET- Blockchain Security Implementation for Financial Domains
IRJET- Blockchain Security Implementation for Financial Domains
IRJET Journal
 
IRJET- Different Blockchain Platforms and Algorithms
IRJET-  	  Different Blockchain Platforms and AlgorithmsIRJET-  	  Different Blockchain Platforms and Algorithms
IRJET- Different Blockchain Platforms and Algorithms
IRJET Journal
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
Ingo Weber
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalDavid Lee Kuo Chuen 李国权
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
Rohit Verma
 
Final paper blockchain
Final paper blockchain Final paper blockchain
Final paper blockchain VIMANYU SAHU
 
Blockchain Technology- A Conceptual Overview
Blockchain Technology- A Conceptual OverviewBlockchain Technology- A Conceptual Overview
Blockchain Technology- A Conceptual Overview
IRJET Journal
 
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET Journal
 
Blockchain
BlockchainBlockchain
Blockchain
Vivek Upadhyay
 
computerweekly.com 17-23 September 2019 16W hen people int.docx
computerweekly.com 17-23 September 2019 16W hen people int.docxcomputerweekly.com 17-23 September 2019 16W hen people int.docx
computerweekly.com 17-23 September 2019 16W hen people int.docx
mccormicknadine86
 

Similar to IRJET- Transaction based Block Chain Cryptocurrency (20)

IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
 
IRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking Application
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing Application
 
Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using Blockchain
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain Technology
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithmFair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
 
IRJET- Blockchain Security Implementation for Financial Domains
IRJET- Blockchain Security Implementation for Financial DomainsIRJET- Blockchain Security Implementation for Financial Domains
IRJET- Blockchain Security Implementation for Financial Domains
 
IRJET- Different Blockchain Platforms and Algorithms
IRJET-  	  Different Blockchain Platforms and AlgorithmsIRJET-  	  Different Blockchain Platforms and Algorithms
IRJET- Different Blockchain Platforms and Algorithms
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
 
Final paper blockchain
Final paper blockchain Final paper blockchain
Final paper blockchain
 
Blockchain Technology- A Conceptual Overview
Blockchain Technology- A Conceptual OverviewBlockchain Technology- A Conceptual Overview
Blockchain Technology- A Conceptual Overview
 
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
 
Blockchain
BlockchainBlockchain
Blockchain
 
computerweekly.com 17-23 September 2019 16W hen people int.docx
computerweekly.com 17-23 September 2019 16W hen people int.docxcomputerweekly.com 17-23 September 2019 16W hen people int.docx
computerweekly.com 17-23 September 2019 16W hen people int.docx
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 

Recently uploaded (20)

road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 

IRJET- Transaction based Block Chain Cryptocurrency

  • 1. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 914 TRANSACTION BASED BLOCK CHAIN CRYPTOCURRENCY S. Aswin1, T. Barathwaj2, M. Mathiyazhagan3, R. Mohan babu4 1,2,3,4B.Tech, Dept of Information Technology, Valliammai Engineering College, Chennai, Tamil Nadu ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract- Blockchain technologies are gaining massive momentum in the last few years. Blockchains are distributed ledgers that enable parties who do not fully trust each other to maintain a set of global states. The parties agree on the existence, values, and histories of the states. While the current transaction is based on the centralized system. In which the miner uses the mechanism to mine the data and do the verification, which initially costs a large amount for the transaction. Once the node is breaking the data position is unknown. Even if the reversive transaction is enabled, we couldn't track the transaction. We cannot find the nonce in which amount is or where it is. So, we propose the Transaction based Block chain cryptocurrency. It is an initial PoC developed in Python. The main aim of this project is to build Transaction based Block chain architecture for discovering cryptocurrencies. This overcomes the mining transaction, which is decentralized and with that it can be used to have the nodes to store the ledger. So, the node to node transaction can be monitored. Basically, the transaction to going to happen between the accounts, this will be sent through a secure cryptographical channel, which is implemented with cryptographical algorithm. And wallet transaction will be verified and the traffic is captured and verification can be shown for the security purposes. This is a PoC that runs only on local networks and provides proper security. The code should only be used to get familiar with the building blocks for a cryptocurrency. Elliptical Curve Cryptographic / ECC public key compression/decompression is used for security feature. The entire validation is performed based on self-created wallet, crypto, validation, networking, mining etc. The entire project has been developed using python, Ethereum Keywords—component; formatting; style; styling; in I. INTRODUCTION Blockchain technologies, due to the success of Bitcoin, are taking the world by storm, largely. A blockchain, also called distributed ledger, which do not fully trust each other, is essentially an append-only data structure maintained by a set of nodes. Nodes in the blockchain, each containing multiple transactions, agree on an ordered set of blocks, thus the blockchain can be viewed as a log of ordered transactions. Blockchain can be viewed as a solution to distributed transaction management, in the database context where nodes keep replicas of the data and agree on an execution order of transactions. Blockchain systems in such environments are called private (or permissioned), as opposed to the early systems operating in public environments (or permission less) where anyone can join and leave. Applications such as security trading and settlement, asset and finance management, banking and insurance are being built and evaluated. Oracle and MySQL, These applications are currently supported by enterprise-grade database systems but blockchain has the potential to disrupt this status quo because it incurs lower infrastructure and human costs. In particular, blockchain’s immutability and transparency help reduce human errors and the need for manual intervention due to conflicting data. In the original design, Bitcoin’s blockchain stores coins as the system states Bitcoin nodes implement a simple replicated state machine model, for this application, which moves coins from one address to another. Since then, blockchain has grown beyond crypto-currencies to support user defined states and Turing complete state machine models. For example, Ethereum enables any decentralized, replicated applications known as smart contracts. Interest from the industry has started to drive development of new blockchain platforms, settings, where participants are authenticated, designed for private. II. SCOPE OF THE PROJECT This concept to developed to have the transaction of the amount without uninterrupted by maintaining the node level transaction ledger. This project over comes the mining transaction, which is decentralized and that can be used to have the nodes to store the ledger. So that the node to node transaction can be monitored. Basically, the transaction to going to happen between the accounts, this will be sent through a secure cryptographical channel, which is implemented with cryptographical algorithm. And wallet transaction will be verified and the traffic is captured and verification can be shown for the security purposes.
  • 2. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 915 They have the transaction data that is to be transferred to the other account will be sent through a secured cryptographical channel. Because these accounts will be having a private and a public key separately. And to avoid the Middle Man attack. The data is sent through the secured channel. For that we are using Elliptical curve cryptographic system. Each node will be created with the public and private keys uniquely for that having the address separately. So, the transaction will be from one account to the other is done by transferring the amount. This sent as a encrypted hashed value through the nodes. The miners verify the data with the mechanism and the data transaction proceeds. Even the miners fail, the process is not disturbed, as the ledger is maintained the proceeds. III. PROPOSED SYSTEM This concept is developed to have the transaction of the amount without an interruption by maintaining the node level transaction ledger. This project over comes the mining transaction, which is decentralized and that can be used to have the nodes to store the ledger. So that the node to node transaction can be monitored. Basically, the transaction to going to happen between the accounts, this will be sent through a secure cryptographical channel, which is implemented with cryptographical algorithm. And wallet transaction will be verified and the traffic is captured and verification can be shown for the security purposes. The have the transaction data that is to be transferred to the other account will be sent through a secured cryptographical channel. Because these accounts will be having a private and a public key separately. And to avoid the Middle Man attack. The data is sent through the secured channel. For that we are using Elliptical curve cryptographic system. Each node will be created with the public and private keys uniquely for that having the address separately. So, the transaction will be from one account to the other is done by transferring the amount. This sent as a encrypted hashed value through the nodes. The miners verify the data with the mechanism and the data transaction proceeds. Even the miners fail, the process is not disturbed, as the ledger is maintained it proceeds. And wallet transaction will be verified and the traffic is captured and verification can be shown for the security purposes. This is a PoC that runs only on local networks and provides proper security. The code should only be used to get familiar with the building blocks for a cryptocurrency. Elliptical Curve Cryptographic / ECC public key compression/decompression is used for security feature. The entire validation is performed based on self-created wallet, crypto, validation, networking, mining etc. The entire project has been developed using python, Ethereum. IV. ARCHITECHTURE DIAGRAM
  • 3. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 916 V. USE CASE DIAGRAM VI. ACTIVITY DIAGRAM VII. FLOW DIAGRAM VIII. METHODOLOGY The content of the ledger reflects historical and current states maintained by the blockchain. Being replicated, updates to the ledger must be agreed on by all parties. In other words, multiple parties must come to a consensus. Note that this is not the case in many real-world applications such as fiat currency, in which one entity (e.g., the bank or the government) decides the updates. One key property of a blockchain system is that the nodes do not trust each other, meaning that some may behave in Byzantine manners. The consensus protocol must therefore tolerate Byzantine failures. The research literature on distributed consensus is vast, and there are many variants of previously proposed protocols being developed for blockchains. They can be largely classified along a spectrum. One extreme consists of purely computation-based protocols that use proof of computation to randomly select a node which single-handedly decides the next operation.
  • 4. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 917 Bitcoin’s proof-of-work (PoW) is an example. The other extreme is purely communication-based protocols in which nodes have equal votes and go through multiple rounds of communication to reach consensus. These protocols, PBFT being the prime example, are used in private settings because they assume authenticated nodes. IX. MODULE DESCRIPTION A. CRYPTOGRAPHIC MODULE Cryptographic module is primarily used for securing the identity off the sender transaction. That it uses the ECC for the cryptographical transaction. That makes sure that the everyone in the network will be having the copy of the data bring transferred. The public distributed ledger id maintained. It can be viewed by everyone in the network. That is sent as an encrypted value as a hashed value. The proof of work is done and maintained, and the mining is done by the miners. B. ENCODING MODULE Blockchain eliminates unauthorized access by using cryptographic algorithm to ensure the blocks are kept secure. Each user in the blockchain will have their own keys. Private and public key. The sender sends the data, as the transaction. The data will be hashed and the hashed value is passed through the algorithm. Now the transaction data and the public are transmitted to the receiver. The transaction is passed through the hash function to get the hash value. And it is compared with the hash value obtained of the transaction. C. MINING Proof of work is the method to validate the transaction in blockchain network by solving a complex mathematical puzzle(mining). Finding the nonce value is the mathematical puzzle that users or miners need to solve in the network. The puzzle is solved by determining a nonce that generates a hash value and gives an output lesser than an a given output. miners verify transaction within the blockchain and adds the block to the blockchain when confirmed. With proof of work the miners compete against each other to solve the mathematical puzzle. The miner who solves the puzzle is rewarded. D. TRANSANCTION The transaction module maintains the overall transactional data. That is each node in the blockchain is made to a separate address and a unique key. These are made have been stored in the database on its itself. The node of the blockchain are made to have the header and along with it the block verification number and the hashed value of the previous block. And the nonce value is also kept in here. And the target value is set, that id is predefined. E. WALLET MODULE The wallet is created to have the amount for the transaction. That is each node in the blockchain will have the private key and public key and the address associated with it. If the sender wants to send the amount. The amount will be deducted from the wallet and the transactions made to view by everyone. And the data is made to send for authentication. Once authenticated the data will be added to the ledger. And the receiver gets the amount credited. X. REFERENCES [1] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008, http://bitcoin.org/bitcoin.pdf, Last accessed: 2017. [2] Q. Lin, P. Chang, G. Chen, B. C. Ooi, K. Tan, and Z. Wang, “Towards a non-2PC transaction management in distributed data- base systems,” in Proc. ACM Int. Conf. Manag. Data, 2016, pp. 1659–1674. [3] A. Thomson, T. Diamond, S. Weng, K. Ren, P. Shao, and D. J. Abadi, “Calvin: Fast distributed transactions for partitioned data- base systems,” in Proc. ACM Int. Conf. Manag. Data, 2012, pp. 1–12. [4] P. Bailis, A. Fekete, M. J. Franklin, A. Ghodsi, J. M. Hellerstein, and I. Stoica, “Coordination avoidance in database systems,” Proc. VLDB Endowment, vol. 8, no. 3, pp. 185–196, 2014. [5] Ethereum blockchain app platform. (2017). [Online]. Available: https://www.ethereum.org/ [6] Konstantinos Christidis, and Michael Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things” 2016 [7] Nir Kshetri, University of North Carolina at Greensboro, ”Can Blockchai Strengthen the Internet of Thing” 2017
  • 5. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 918 [8] Keke Gai, Liehuang Zhu,” Block chain-Enabled Reengineering of Cloud Data enters” 2018 [9] Zhaofeng Ma, School of Cyberspace Security, “A master slave blockchain paradigm and Application in Digital rights management” 2018 [10] Qingsu He, Yu Xu, Yong Yan,JunshegWang,QingzhiHan, and Lili Li, “A Consensus and Incentive Program for Charging Piles Based on Consortium Blockchain” 2018