Data Authorization in Social Network using Block Chain

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In India most of the people are into social networks. Some people are taking advantage of this and spreading fake and irrelevant news in the society. Due to these major riots, culture oriented problems, fake medical messages are spreading over the people. Still there is no technology to identify these problems. Here we are introducing block chain to overcome all the above mentioned problems. Our method finds the solution for these major issues. Using the above mentioned explanation with SHA256 algorithms supports block chain a lot to implement. In case of any changes done in the mid node, using the hash function and SHA 256 algorithm, the man in the middle can be identified. The entire hash should be exactly match with the primary hash. So that data cannot be changed in the middle. In case of any changes occurred the data owner will be get notice.

Cite

CITATION STYLE

APA

G*, U. … Bharathi M, T. (2020). Data Authorization in Social Network using Block Chain. International Journal of Innovative Technology and Exploring Engineering, 9(7), 738–740. https://doi.org/10.35940/ijitee.g4987.059720

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free