Loading

Block-Chain Based Authentication Technique
Pratiksha P. Gofane1, Vijay S. Gulhane2, Harshal N. Datir3

1Pratiksha P. Gofane, Information Technology, Sipna COET, Amravati, India.
2Dr. Vijay S. Gulhane, Information Technology, Sipna COET, Amravati, India.
3Harshal N. Datir, Information Technology, Sipna COET Amravati, India.

Manuscript received on February 06, 2020. | Revised Manuscript received on February 10, 2020. | Manuscript published on February 30, 2020. | PP: 1127-1133 | Volume-9 Issue-3, February, 2020. | Retrieval Number: B4574129219/2020©BEIESP | DOI: 10.35940/ijeat.B4574.129320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The Block-chain technology contain multiple blocks are interconnected to each other with help of previous hash and current hash. The Block-chain is technology which is used to enable for moving some coin, data and assets from one user to another user. Where using hash algorithm, cryptographic algorithm and block-chain maintenance/updating. Block-chain technology contain the previous hash of first block is always zero that is called genesis block and current block will generate according to the data. In block-chain technology after complete the first block system automatically generated new block. Second block contain the previous hash will be always current hash of first block for interconnect the blocks and chain will formed ahead. According to this chain automatically detect there some transparency and this transparency says that block chain is very secured technology. This block-chain technology with transaction is very safe for companies, colleges and business. It is layered framework technology. Where perception layer, transmission layer, storage layer and application layer are present. In block-chain technology transaction contain there need not any third trusted party. Previous concept of block-chain with IOT that is not secured where some disadvantages of limited storage present and reduce that limitation we are using distributed ledger of block-chain technology. Where system have occurred peer to peer transaction. Further, block-chain contain well organized their weaknesses, strengths, opportunities, and threats of block-chain based transaction application. In block-chain contain using with OTP this block-chain will be more secured and easily transfer the money. Their future scope in business, education and companies.
Keywords: Block-chain, Block-chain types, Block-chain requirements & Block-chain security process.