International Journal of Engineering Trends and Applications (IJETA) Volume 8 Issue 4, Jul-Aug 2021 ISSN: 2393-9516 www.ijetajournal.org Page 7 ABSTRACT Block chain is a currently, highly emerging technology for data sharing and application. It can exchange de- centralized information in distributed systems without mutual trust by means of data encryption, timestamp and distributed consensus, so as to improve the efficiency of data sharing and application. This technology can be fully utilized in the large data remote sensing image system, and the multi-system shared node storage system can be managed efficiently and uniformly, so as to improve the economic efficiency of the system. This paper designs the shared architecture based on block chain technology, proposes key research technologies, and provides theoretical basis for non-engineering practice. Keyword: remote sensing, block chain, Sharing, image Cloud storage, Map Reduce technique, Hash code generation. An application to Detect Fake Images in social media Jhansi Priya V [1] , Dr. B.N Shankar Gowda [2] MTech student [1] , Associate Professor [2] , Department of Computer Science and Engineering Bangalore Institute of Technology, K.R. Road, V.V. Puram, Bangalore, Karnataka - India I. INTRODUCTION As rapid development of aerospace remote sensing platform and technology in our country, the remote sensing data generated is exponentially increasing. Data owner is a person who will store the secret image in block chain storage which in turn accessed by the authorized Data User. Data Owner will create Data User, Data Owner can able to add or delete the Data User. Data Owner is like a Head of the Department in the Military or detective agencies, who upload secret images into secure block chain storage. Whenever the secret image is uploaded it will be encrypted by the system using Data Owner Encryption Key, encrypted secret image is Block Body and the Block Header will be formed using Previous Block Hash Code, Current Block Root Hash, Time Stamp and Nonce. Once Block Body and Block Header are created and both are compressed to form a Block and store it in Block Chain Storage. Data User are the data access users, suppose Data Owner is a Head of the Department and Data Users are his team members. Suppose the Data User wants to download any secret image file, first he has to select the file from the list and press the download button. Based on the Secret Image selected, its block details are fetched from database and using block chain storage credentials particular block will be downloaded. A block chain, originally block chain, is a growing list of records, called blocks, which are linked using cryptography. II. LITERATURE SURVEY Jaynil Gaglani [1] Social media has become the importand of today's lifestyle. It has a spread effect on nearly every walk of life made difficult. One of the well-known social media applications Facebook Messenger is a free and platform text or image or images information on software that also provides services for sending and receiving multimedia messages. But at the same time in years, its easy accessibility has served a way for propagating fake and news articles, blogs and messages. Fake news and messages have way for Blackmailing, suicide cases Political polarization, ethnic tensions, unwanted panic and mass hysteria. Jamal AbdulNasir [2] The explosion of social media allowed individuals to spread information without cost, with little investigation and fewer filters than before. This field found the old problem of fake news, or image or video which became a major concern now a days due to the negative impact it brings to the communities. Matthew Bradbury[3] Providing location privacy for such an asset is tantamount to protecting the location of a source node from hacker who is attempting to locate it. Kyumin Lee [4] Natural disasters or crises, users on social media tend to easily believe contents of postings related to the events, and retweet the postings, hoping that the postings will be reached by many other users. Unfortunately, there are malicious users who understand the tendency and post misinformation such as spam and fake messages. RESEARCH ARTICLE OPEN ACCESS