Enhancing Security of Data Exchange through Block Chain Technology
Creators
- 1. Department of Computer Science and Engineering , Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, India.
- 2. Professor & HOD Department of Computer Science and Engineering , Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, India.
Contributors
- 1. Publisher
Description
Cyber security refers to a set of well-defined techniques used to protect the integrity of networks. It is used to protect vital data of customers and to restrict unauthorised access. In the era of E-Commerce, the demand for websites, web application increasing exponentially day by day. Web security is currently a significant issue for Internet enabled organization. Using websites, managing information through digital way. HTTP is a Hyper Text Transfer Protocol. It is used to transfer information over the internet. HTTP is most popular protocol widely used in web applications and allowed by internet firewalls, operating systems. HTTP is an unsecured information exchange protocol. Integrity is not there, so someone can easily alter with the content. In the internet data transferring over HTTP connection in plain text, this opening new loop hole to attackers to read every data sent over HTTP connection to web or webserver. Http is insecure as there is no encryption methods for it. So, it subjected towards the web attacks such as Man in the middle, cross site scripting, SQL Injection, click jacking, Broken authentication and session management attacks can occur. HTTP interaction with TCP is bad, causes the problems with performances and server scalability. In our proposed system, document which is used by more than one user and if there is in updation of the content user who is modifying the content of thier shared document must take their concern from other users. The process which is being used to authenticate the modifications of content of shared document is done with the help of shared key unless or until all users send the shared keys of each user the document will not be decrypted and hence further the changes in the document will not be possible.
Files
D6826049420.pdf
Files
(405.9 kB)
Name | Size | Download all |
---|---|---|
md5:361837cbc620427d18a1ee3993ec916c
|
405.9 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2249-8958 (ISSN)
Subjects
- ISSN
- 2249-8958
- Retrieval Number
- D6826049420/2020©BEIESP