z-logo
open-access-imgOpen Access
Data Authorization in Social Network using Block Chain
Author(s) -
Umamaheswari G*,
Swaraj Kumar B*,
P Shanjeev,
K. Vignesh,
Thangai Bharathi M
Publication year - 2020
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.g4987.059720
Subject(s) - hash function , notice , computer science , block (permutation group theory) , hash chain , node (physics) , authorization , computer security , function (biology) , chain (unit) , internet privacy , computer network , theoretical computer science , engineering , political science , mathematics , physics , geometry , structural engineering , astronomy , evolutionary biology , law , biology
In India most of the people are into social networks. Some people are taking advantage of this and spreading fake and irrelevant news in the society. Due to these major riots, culture oriented problems, fake medical messages are spreading over the people. Still there is no technology to identify these problems. Here we are introducing block chain to overcome all the above mentioned problems. Our method finds the solution for these major issues. Using the above mentioned explanation with SHA256 algorithms supports block chain a lot to implement. In case of any changes done in the mid node, using the hash function and SHA 256 algorithm, the man in the middle can be identified. The entire hash should be exactly match with the primary hash. So that data cannot be changed in the middle. In case of any changes occurred the data owner will be get notice.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here