Loading

Network Based Adaptation of Block Chain Technology
Ch. Rupa1, D. Jaya Kumari2

1Ch. Rupa, Department of CSE, V. R. Siddhartha Engineering College  Sri Vasavi Engineering College (A) (Andhra Pradesh) India
2D. Jaya Kumari, Department of CSE, V. R. Siddhartha Engineering College (A), Sri Vasavi Engineering College (A) (Andhra Pradesh) India

Manuscript received on 30 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 1588-1591 | Volume-8 Issue-9, July 2019 | Retrieval Number: G6317058719/19©BEIESP | DOI: 10.35940/ijitee.G6317.078919
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Online transactions are growing up day by day due to globalization factors. Threat victims rate also increasing due to lack of privacy protection and identity theft. The number of technologies have been using for maintaining the communication data like Torrent Technology, Databases, etc. Even though threat agents seeking new trends to attack the data. So a technology is required to do a secure transaction in the enterprise society. Recent technology, which can be played a vital role in data security, is Block chain. Once created a block lack of alter function in the block chain will helps to reduce the information attacks/forgery. This paper addresses block chain technology concepts with internal architecture and its applications along with the data communication over a network with block chain objective. The main strength of this work is simulation results with and it’s analysis.
Keywords: Privacy protection, Identity theft, blockchain, security services, Database, Torrent

Scope of the Article: Advanced Computer Networking