International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249 – 8958, Volume-9 Issue-3, February, 2020
1127
Retrieval Number: B4574129219/2020©BEIESP
DOI: 10.35940/ijeat.B4574.029320
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Abstract: The Block-chain technology contain multiple blocks
are interconnected to each other with help of previous hash and
current hash. The Block-chain is technology which is used to
enable for moving some coin, data and assets from one user to
another user. Where using hash algorithm, cryptographic
algorithm and block-chain maintenance/updating. Block-chain
technology contain the previous hash of first block is always zero
that is called genesis block and current block will generate
according to the data. In block-chain technology after complete
the first block system automatically generated new block. Second
block contain the previous hash will be always current hash of
first block for interconnect the blocks and chain will formed
ahead. According to this chain automatically detect there some
transparency and this transparency says that block chain is very
secured technology. This block-chain technology with transaction
is very safe for companies, colleges and business. It is layered
framework technology. Where perception layer, transmission
layer, storage layer and application layer are present. In
block-chain technology transaction contain there need not any
third trusted party. Previous concept of block-chain with IOT that
is not secured where some disadvantages of limited storage
present and reduce that limitation we are using distributed ledger
of block-chain technology. Where system have occurred peer to
peer transaction. Further, block-chain contain well organized
their weaknesses, strengths, opportunities, and threats of
block-chain based transaction application. In block-chain contain
using with OTP this block-chain will be more secured and easily
transfer the money. Their future scope in business, education and
companies.
Keywords: Block-chain, Block-chain types, Block-chain
requirements & Block-chain security process.
I. INTRODUCTION
The block-chain based authentication technology refers
to the securing IOTs in distributed block-chain analysis,
requirements and open issues [1]. The block-chain is
technology that enables for moving data, assets and digital
coin from one end to another end. It is used in a crypto
currency. The block-chain contains the transfer crypto
currency without any third trusted party. It is immediately
transfer the money. It is discovered in 1991 but that time not
exposure this technology. Until 2008 Satoshi Nakamoto
launched bit-coin with help of block-chain
Revised Manuscript Received on February 10, 2020.
*Corresponding Author:
Pratiksha P. Gofane, Information Technology, Sipna COET, Amravati,
India. Email: pratiksha.gofane39@gmail.com
Dr. Vijay S. Gulhane, Information Technology, Sipna COET, Amravati,
India. Email: vijaygulhane27@gmail.com
Harshal N. Datir, Information Technology, Sipna COET Amravati,
India. Email: harshaldatir807@gmail.com
Technology. The block-chain technology contain we are used
distributed ledger. In this distributed ledger contain the peer
to peer transaction occurred. In block-chain technology with
transaction there are two principle is open ledger and
distributed ledger. Open ledger Fig.2 it is called centralized
ledger. Distributed ledger Fig.3 it is called decentralized
ledger. There is both principle of same value [2]. Suppose
open ledger contain the four peoples are present. That time
every people knows all details about every people because
this is open ledger and open ledger it is centralized ledger. In
block-chain contain distributed ledger of a peer to peer
transaction where only sender user and receiver user transmit
the data [3].
This block-chain are categorized in three section [4]. That
section is public block-chain, private block-chain and
consortium block-chain. In this block-chain we will use any
type of block-chain. But there are some rules and regulation
are present in block-chain. Where block-chain contain the
every section is trusted section. Some authority are present
there. Every user need to follow some instruction. Where
need to verify the each user. In Fig.1 block-chain technology
contain every block has data, previous hash and current hash
are present. In which data means some like transactional
record. Previous hash of first block is always zero that is
called genesis block and Current hash is generate according
to data. After complete the first block system automatically
generate the new block. This new block contain the previous
hash is always current hash of a previous block and current
hash is generate according to the data [5].
This block-chain technology is transparent technology
[6]. Suppose any hacker try to change the data that time
automatically detect there some tampering occurred. Because
it is transparent and every blocks are interconnected to each
other with help oh hashing and that block is shows different
to another block. That means it is very secured technology.
Any user use this technology for security and privacy purpose
in transaction [7]. Block-chain technology contain also use
the OTP for security. We know that OTP is most secured
password for verified the user. This OTP also increase the
complexity of security and privacy. This block-chain
connected to the mobile. Mostly the block-chain contain
distributed block-chain are used [8]. In this technology
contain used the hashing and cryptography algorithm [9].
Cryptography algorithm in which both types are present it is
symmetric and asymmetric algorithm. Where public and
private key are used and also encryption and decryption are
also used. Cryptography algorithm used there for achieve to
more confidentiality and enhanced the security. It is much
secured transaction process with help of block-chain
technology. It is trusted technology for transfer the data and
digital coin.
Block-Chain Based Authentication Technique
Pratiksha P. Gofane, Vijay S. Gulhane, Harshal N. Datir