International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-9 Issue-3, February, 2020 1127 Retrieval Number: B4574129219/2020©BEIESP DOI: 10.35940/ijeat.B4574.029320 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Abstract: The Block-chain technology contain multiple blocks are interconnected to each other with help of previous hash and current hash. The Block-chain is technology which is used to enable for moving some coin, data and assets from one user to another user. Where using hash algorithm, cryptographic algorithm and block-chain maintenance/updating. Block-chain technology contain the previous hash of first block is always zero that is called genesis block and current block will generate according to the data. In block-chain technology after complete the first block system automatically generated new block. Second block contain the previous hash will be always current hash of first block for interconnect the blocks and chain will formed ahead. According to this chain automatically detect there some transparency and this transparency says that block chain is very secured technology. This block-chain technology with transaction is very safe for companies, colleges and business. It is layered framework technology. Where perception layer, transmission layer, storage layer and application layer are present. In block-chain technology transaction contain there need not any third trusted party. Previous concept of block-chain with IOT that is not secured where some disadvantages of limited storage present and reduce that limitation we are using distributed ledger of block-chain technology. Where system have occurred peer to peer transaction. Further, block-chain contain well organized their weaknesses, strengths, opportunities, and threats of block-chain based transaction application. In block-chain contain using with OTP this block-chain will be more secured and easily transfer the money. Their future scope in business, education and companies. Keywords: Block-chain, Block-chain types, Block-chain requirements & Block-chain security process. I. INTRODUCTION The block-chain based authentication technology refers to the securing IOTs in distributed block-chain analysis, requirements and open issues [1]. The block-chain is technology that enables for moving data, assets and digital coin from one end to another end. It is used in a crypto currency. The block-chain contains the transfer crypto currency without any third trusted party. It is immediately transfer the money. It is discovered in 1991 but that time not exposure this technology. Until 2008 Satoshi Nakamoto launched bit-coin with help of block-chain Revised Manuscript Received on February 10, 2020. *Corresponding Author: Pratiksha P. Gofane, Information Technology, Sipna COET, Amravati, India. Email: pratiksha.gofane39@gmail.com Dr. Vijay S. Gulhane, Information Technology, Sipna COET, Amravati, India. Email: vijaygulhane27@gmail.com Harshal N. Datir, Information Technology, Sipna COET Amravati, India. Email: harshaldatir807@gmail.com Technology. The block-chain technology contain we are used distributed ledger. In this distributed ledger contain the peer to peer transaction occurred. In block-chain technology with transaction there are two principle is open ledger and distributed ledger. Open ledger Fig.2 it is called centralized ledger. Distributed ledger Fig.3 it is called decentralized ledger. There is both principle of same value [2]. Suppose open ledger contain the four peoples are present. That time every people knows all details about every people because this is open ledger and open ledger it is centralized ledger. In block-chain contain distributed ledger of a peer to peer transaction where only sender user and receiver user transmit the data [3]. This block-chain are categorized in three section [4]. That section is public block-chain, private block-chain and consortium block-chain. In this block-chain we will use any type of block-chain. But there are some rules and regulation are present in block-chain. Where block-chain contain the every section is trusted section. Some authority are present there. Every user need to follow some instruction. Where need to verify the each user. In Fig.1 block-chain technology contain every block has data, previous hash and current hash are present. In which data means some like transactional record. Previous hash of first block is always zero that is called genesis block and Current hash is generate according to data. After complete the first block system automatically generate the new block. This new block contain the previous hash is always current hash of a previous block and current hash is generate according to the data [5]. This block-chain technology is transparent technology [6]. Suppose any hacker try to change the data that time automatically detect there some tampering occurred. Because it is transparent and every blocks are interconnected to each other with help oh hashing and that block is shows different to another block. That means it is very secured technology. Any user use this technology for security and privacy purpose in transaction [7]. Block-chain technology contain also use the OTP for security. We know that OTP is most secured password for verified the user. This OTP also increase the complexity of security and privacy. This block-chain connected to the mobile. Mostly the block-chain contain distributed block-chain are used [8]. In this technology contain used the hashing and cryptography algorithm [9]. Cryptography algorithm in which both types are present it is symmetric and asymmetric algorithm. Where public and private key are used and also encryption and decryption are also used. Cryptography algorithm used there for achieve to more confidentiality and enhanced the security. It is much secured transaction process with help of block-chain technology. It is trusted technology for transfer the data and digital coin. Block-Chain Based Authentication Technique Pratiksha P. Gofane, Vijay S. Gulhane, Harshal N. Datir