Loading

Enhancing Security of Data Exchange through Block Chain Technology
Jeevankumari Chevula1, Aruna Varanasi2

1Jeevankumari Chevula*, Department of Computer Science and Engineering , Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, India.
2Dr.Aruna Varanasi, Professor & HOD Department of Computer Science and Engineering , Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, India. 

Manuscript received on April 05, 2020. | Revised Manuscript received on April 17, 2020. | Manuscript published on April 30, 2020. | PP: 266-269 | Volume-9 Issue-4, April 2020. | Retrieval Number:  D6826049420/2020©BEIESP | DOI: 10.35940/ijeat.D6826.049420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cyber security refers to a set of well-defined techniques used to protect the integrity of networks. It is used to protect vital data of customers and to restrict unauthorised access. In the era of E-Commerce, the demand for websites, web application increasing exponentially day by day. Web security is currently a significant issue for Internet enabled organization. Using websites, managing information through digital way. HTTP is a Hyper Text Transfer Protocol. It is used to transfer information over the internet. HTTP is most popular protocol widely used in web applications and allowed by internet firewalls, operating systems. HTTP is an unsecured information exchange protocol. Integrity is not there, so someone can easily alter with the content. In the internet data transferring over HTTP connection in plain text, this opening new loop hole to attackers to read every data sent over HTTP connection to web or webserver. Http is insecure as there is no encryption methods for it. So, it subjected towards the web attacks such as Man in the middle, cross site scripting, SQL Injection, click jacking, Broken authentication and session management attacks can occur. HTTP interaction with TCP is bad, causes the problems with performances and server scalability. In our proposed system, document which is used by more than one user and if there is in updation of the content user who is modifying the content of thier shared document must take their concern from other users. The process which is being used to authenticate the modifications of content of shared document is done with the help of shared key unless or until all users send the shared keys of each user the document will not be decrypted and hence further the changes in the document will not be possible. 
Keywords: HTTP, Blockchain Technology, Security.