Published April 30, 2020 | Version v1
Journal article Open

Enhancing Security of Data Exchange through Block Chain Technology

  • 1. Department of Computer Science and Engineering , Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, India.
  • 2. Professor & HOD Department of Computer Science and Engineering , Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, India.
  • 1. Publisher

Description

Cyber security refers to a set of well-defined techniques used to protect the integrity of networks. It is used to protect vital data of customers and to restrict unauthorised access. In the era of E-Commerce, the demand for websites, web application increasing exponentially day by day. Web security is currently a significant issue for Internet enabled organization. Using websites, managing information through digital way. HTTP is a Hyper Text Transfer Protocol. It is used to transfer information over the internet. HTTP is most popular protocol widely used in web applications and allowed by internet firewalls, operating systems. HTTP is an unsecured information exchange protocol. Integrity is not there, so someone can easily alter with the content. In the internet data transferring over HTTP connection in plain text, this opening new loop hole to attackers to read every data sent over HTTP connection to web or webserver. Http is insecure as there is no encryption methods for it. So, it subjected towards the web attacks such as Man in the middle, cross site scripting, SQL Injection, click jacking, Broken authentication and session management attacks can occur. HTTP interaction with TCP is bad, causes the problems with performances and server scalability. In our proposed system, document which is used by more than one user and if there is in updation of the content user who is modifying the content of thier shared document must take their concern from other users. The process which is being used to authenticate the modifications of content of shared document is done with the help of shared key unless or until all users send the shared keys of each user the document will not be decrypted and hence further the changes in the document will not be possible.

Files

D6826049420.pdf

Files (405.9 kB)

Name Size Download all
md5:361837cbc620427d18a1ee3993ec916c
405.9 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2249-8958 (ISSN)

Subjects

ISSN
2249-8958
Retrieval Number
D6826049420/2020©BEIESP