Distributed Architecture for Secure, Attack-Resilient Crypto Currency Transactions for the Classified Temporal and Text Data
Challa Narasimham
Challa Narasimham, Department of Computer Science Engineering, Vignan’s Institute of Information Technology
Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 2503-2505 | Volume-8 Issue-10, August 2019 | Retrieval Number: J95510881019/2019©BEIESP | DOI: 10.35940/ijitee.J9551.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In the digital world, the crypto currency has to do with the use of tokens based on the distributed ledger technology in a secure manner. Crypto currency can be a resource on a block chain network or can be seen as a tool to perform the transactions ensuring the privacy and security. Data may be available in temporal or text format. This paper describes about the distributed architecture for secure and attack-resilient bit coin-based crypto currency transactions for classified temporal and text data. The temporal data may be voice, sound or graphical information basing on the time series. If the data available is temporal this work describes about how it can be classified into a processed form. In this context, this paper describes the process of converting temporal data into text data. Further, the paper describes about the process of ensuring the security. This paper describes about the methodologies of cryptography-based hashing, attack-resilient nonce generation and verifiable encryption techniques for the construction of resilient transactions against stealthy data-integrity attack.
Keywords: Classification, Crypto Currency, Hashing, Nonce, Temporal Data, Transactions, Verifiable Encryption.
Scope of the Article: Classification