SlideShare une entreprise Scribd logo
1  sur  3
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
BLOCK CHAIN TECHNOLOGY
ABSTRACT
A purelypeer-to-peerversionof electronic cash would allow online payments to be sent directly from
one party to anotherwithoutgoingthrougha financial institution.Digital signatures provide part of the
solution, but the main benefits are lost if a trusted third party is still required to prevent double -
spending. We propose a solution to the double-spending problem using a peer-to-peer network. The
networktimestampstransactionsbyhashingtheminto an ongoing chain of hash-based proof-of-work,
forming a record that cannot be changed without redoing the proof-of-work.
INTRODUCTION
Commerce onthe Internethascome to relyalmostexclusivelyon financial institutionsservingastrusted
thirdpartiesto processelectronicpayments.While the systemworkswellenoughformosttransactions,
it still suffers from the inherent weaknesses of the trust based model. Completely non-reversible
transactionsare not reallypossible,sincefinancial institutionscannotavoidmediatingdisputes.The cost
of mediationincreasestransactioncosts,limitingthe minimumpractical transaction size and cutting off
the possibilityforsmall casual transactions,andthere isabroadercost in the lossof abilitytomake non-
reversible payments for nonreversible services. With the possibility of reversal, the need for trust
spreads. Merchants must be wary of their customers, hassling them for more information than they
would otherwise need. A certain percentage of fraud is accepted as unavoidable. These costs and
paymentuncertaintiescanbe avoidedinpersonbyusingphysical currency,but no mechanism exists to
make payments over a communications channel without a trusted party.
PROPOSED SYSTEM
We propose aelectronic payment system based on cryptographic proof instead of trust, allowing any
two willing parties to transact directly with each other without the need for a trusted third party.
Transactions that are computationally impractical to reverse would protect sellers from fraud, and
routine escrowmechanismscouldeasilybe implementedtoprotectbuyers.In this paper, we propose a
solutiontothe double-spendingproblemusingapeer-to-peerdistributedtimestampserverto generate
computational proof of the chronological order of transactions. The system is secure as long as honest
nodes collectively control more CPU power than any cooperating group of attacker nodes
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
WORKING
Firstof all we needtorun the projectand openthe admin panel. There we can see four models chains,
blocks, peers and transactions. Whenever an individual needs to transfer the money from one end to
anotherend,everyindividual isconsideredasachain.Everyindividual possessesaunique idthatmeans
every chain is unique. Suppose one chain name as A123 and B123 are present who needs to transact
moneyamongstthemselves.Totransferthe moneyA123 will opentransactionmodel andwillfill details
of transaction form. Once the transaction is done for the bit coins then the number of bit coins is
converted into blocks and that block is assigned to the B123. A123 will be in the senders end and B123
will atthe receiver end. After that we will add blocks in the block model and fill in the details of block
form. Here a block will be assigned to B123 and A123. This is main concept behind the block chain
concept.
ADVANTAGES
 Transactionhistoriesare becomingmore transparentthroughthe use of blockchaintechnology.
Because blockchain is a type of distributed ledger, all network participants share the same
documentation as opposed to individual copies. That shared version can only be updated
through consensus, which means everyone must agree on it. To change a single transaction
record would require the alteration of all subsequent records and the collusion of the entire
network.Thus, data on a blockchain is more accurate, consistent and transparent than when it
is pushed through paper-heavy processes. It is also available to all participants who have
permissioned access. To change a single transaction record would require the alteration of all
subsequent records and the collusion of the entire network. Which can be, you know, a
headache.
 If your company deals with products that are traded through a complex supply chain, you’re
familiarwithhowharditcan be to trace an itembackto its origin.Whenexchangesof goodsare
recordedon a blockchain, you end up with an audit trail that shows where an asset came from
and every stop it made on its journey. This historical transaction data can help to verify the
authenticity of assets and prevent fraud.
 Whenyouuse traditional,paper-heavyprocesses,tradinganythingisatime-consuming process
that is prone to human error and often requires third-party mediation. By streamlining and
automating these processes with blockchain, transactions can be completed faster and more
efficiently.Since record-keepingisperformedusing a single digital ledger that is shared among
participants,youdon’thave toreconcile multiple ledgers and you end up with less clutter. And
when everyone has access to the same information, it becomes easier to trust each other
withoutthe need for numerous intermediaries. Thus, clearing and settlement can occur much
quicker.
 For mostbusinesses,reducingcostsisa priority.Withblockchain, you don’t need as many third
partiesor middlementomake guaranteesbecauseitdoesn’tmatterif youcantrust yourtrading
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
partner. Instead, you just have to trust the data on the blockchain. You also won’t have to
reviewsomuchdocumentationtocomplete a trade because everyone will have permissioned
access to a single, immutable version.
CONCLUSION
We have proposed a system for electronic transactions without relying on trust. We started with the
usual frameworkof coinsmade fromdigital signatures,whichprovidesstrongcontrol of ownership, but
is incomplete without a way to prevent double-spending. To solve this, we proposed a peer-to-peer
network using proof-of-work to record a public history of transactions that quickly becomes
computationallyimpractical foranattacker to change if honest nodes control a majority of CPU power.
The networkisrobustin itsunstructuredsimplicity.Nodesworkall atonce withlittle coordination.They
do notneedto be identified,since messagesare not routed to any particular place and only need to be
delivered on a best effort basis.

Contenu connexe

Plus de Venkat Projects

4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...Venkat Projects
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Venkat Projects
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...Venkat Projects
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docxVenkat Projects
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docxVenkat Projects
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docxVenkat Projects
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docxVenkat Projects
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects listVenkat Projects
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learniVenkat Projects
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...Venkat Projects
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning techniqueVenkat Projects
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal clusterVenkat Projects
 
4.detection of fake news through implementation of data science application
4.detection of fake news through implementation of data science application4.detection of fake news through implementation of data science application
4.detection of fake news through implementation of data science applicationVenkat Projects
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...Venkat Projects
 
benchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social mediabenchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social mediaVenkat Projects
 
trust based video management framework for social multimedia networks
trust based video management framework for social multimedia networkstrust based video management framework for social multimedia networks
trust based video management framework for social multimedia networksVenkat Projects
 
collaborative content delivery in software defined heterogeneous vehicular ne...
collaborative content delivery in software defined heterogeneous vehicular ne...collaborative content delivery in software defined heterogeneous vehicular ne...
collaborative content delivery in software defined heterogeneous vehicular ne...Venkat Projects
 
dynamic network slicing and resource allocation in mobile edge computing systems
dynamic network slicing and resource allocation in mobile edge computing systemsdynamic network slicing and resource allocation in mobile edge computing systems
dynamic network slicing and resource allocation in mobile edge computing systemsVenkat Projects
 
security enhanced content sharing in social io t a directed hypergraph based ...
security enhanced content sharing in social io t a directed hypergraph based ...security enhanced content sharing in social io t a directed hypergraph based ...
security enhanced content sharing in social io t a directed hypergraph based ...Venkat Projects
 

Plus de Venkat Projects (20)

4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docx
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects list
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
 
4.detection of fake news through implementation of data science application
4.detection of fake news through implementation of data science application4.detection of fake news through implementation of data science application
4.detection of fake news through implementation of data science application
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
 
benchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social mediabenchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social media
 
trust based video management framework for social multimedia networks
trust based video management framework for social multimedia networkstrust based video management framework for social multimedia networks
trust based video management framework for social multimedia networks
 
collaborative content delivery in software defined heterogeneous vehicular ne...
collaborative content delivery in software defined heterogeneous vehicular ne...collaborative content delivery in software defined heterogeneous vehicular ne...
collaborative content delivery in software defined heterogeneous vehicular ne...
 
dynamic network slicing and resource allocation in mobile edge computing systems
dynamic network slicing and resource allocation in mobile edge computing systemsdynamic network slicing and resource allocation in mobile edge computing systems
dynamic network slicing and resource allocation in mobile edge computing systems
 
security enhanced content sharing in social io t a directed hypergraph based ...
security enhanced content sharing in social io t a directed hypergraph based ...security enhanced content sharing in social io t a directed hypergraph based ...
security enhanced content sharing in social io t a directed hypergraph based ...
 

Dernier

Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 
Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingChandrakantDivate1
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Scouring of cotton and wool fabric with effective scouring method
Scouring of cotton and wool fabric with effective scouring methodScouring of cotton and wool fabric with effective scouring method
Scouring of cotton and wool fabric with effective scouring methodvimal412355
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationEmaan Sharma
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxProfASKolap
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2ChandrakantDivate1
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfthietkevietthinh
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
Degrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptxDegrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptxMostafa Mahmoud
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Christo Ananth
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 

Dernier (20)

Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C Programming
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Scouring of cotton and wool fabric with effective scouring method
Scouring of cotton and wool fabric with effective scouring methodScouring of cotton and wool fabric with effective scouring method
Scouring of cotton and wool fabric with effective scouring method
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptx
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdf
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Degrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptxDegrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptx
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 

block chain technology python project abstract

  • 1. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com BLOCK CHAIN TECHNOLOGY ABSTRACT A purelypeer-to-peerversionof electronic cash would allow online payments to be sent directly from one party to anotherwithoutgoingthrougha financial institution.Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double - spending. We propose a solution to the double-spending problem using a peer-to-peer network. The networktimestampstransactionsbyhashingtheminto an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. INTRODUCTION Commerce onthe Internethascome to relyalmostexclusivelyon financial institutionsservingastrusted thirdpartiesto processelectronicpayments.While the systemworkswellenoughformosttransactions, it still suffers from the inherent weaknesses of the trust based model. Completely non-reversible transactionsare not reallypossible,sincefinancial institutionscannotavoidmediatingdisputes.The cost of mediationincreasestransactioncosts,limitingthe minimumpractical transaction size and cutting off the possibilityforsmall casual transactions,andthere isabroadercost in the lossof abilitytomake non- reversible payments for nonreversible services. With the possibility of reversal, the need for trust spreads. Merchants must be wary of their customers, hassling them for more information than they would otherwise need. A certain percentage of fraud is accepted as unavoidable. These costs and paymentuncertaintiescanbe avoidedinpersonbyusingphysical currency,but no mechanism exists to make payments over a communications channel without a trusted party. PROPOSED SYSTEM We propose aelectronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party. Transactions that are computationally impractical to reverse would protect sellers from fraud, and routine escrowmechanismscouldeasilybe implementedtoprotectbuyers.In this paper, we propose a solutiontothe double-spendingproblemusingapeer-to-peerdistributedtimestampserverto generate computational proof of the chronological order of transactions. The system is secure as long as honest nodes collectively control more CPU power than any cooperating group of attacker nodes
  • 2. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com WORKING Firstof all we needtorun the projectand openthe admin panel. There we can see four models chains, blocks, peers and transactions. Whenever an individual needs to transfer the money from one end to anotherend,everyindividual isconsideredasachain.Everyindividual possessesaunique idthatmeans every chain is unique. Suppose one chain name as A123 and B123 are present who needs to transact moneyamongstthemselves.Totransferthe moneyA123 will opentransactionmodel andwillfill details of transaction form. Once the transaction is done for the bit coins then the number of bit coins is converted into blocks and that block is assigned to the B123. A123 will be in the senders end and B123 will atthe receiver end. After that we will add blocks in the block model and fill in the details of block form. Here a block will be assigned to B123 and A123. This is main concept behind the block chain concept. ADVANTAGES  Transactionhistoriesare becomingmore transparentthroughthe use of blockchaintechnology. Because blockchain is a type of distributed ledger, all network participants share the same documentation as opposed to individual copies. That shared version can only be updated through consensus, which means everyone must agree on it. To change a single transaction record would require the alteration of all subsequent records and the collusion of the entire network.Thus, data on a blockchain is more accurate, consistent and transparent than when it is pushed through paper-heavy processes. It is also available to all participants who have permissioned access. To change a single transaction record would require the alteration of all subsequent records and the collusion of the entire network. Which can be, you know, a headache.  If your company deals with products that are traded through a complex supply chain, you’re familiarwithhowharditcan be to trace an itembackto its origin.Whenexchangesof goodsare recordedon a blockchain, you end up with an audit trail that shows where an asset came from and every stop it made on its journey. This historical transaction data can help to verify the authenticity of assets and prevent fraud.  Whenyouuse traditional,paper-heavyprocesses,tradinganythingisatime-consuming process that is prone to human error and often requires third-party mediation. By streamlining and automating these processes with blockchain, transactions can be completed faster and more efficiently.Since record-keepingisperformedusing a single digital ledger that is shared among participants,youdon’thave toreconcile multiple ledgers and you end up with less clutter. And when everyone has access to the same information, it becomes easier to trust each other withoutthe need for numerous intermediaries. Thus, clearing and settlement can occur much quicker.  For mostbusinesses,reducingcostsisa priority.Withblockchain, you don’t need as many third partiesor middlementomake guaranteesbecauseitdoesn’tmatterif youcantrust yourtrading
  • 3. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com partner. Instead, you just have to trust the data on the blockchain. You also won’t have to reviewsomuchdocumentationtocomplete a trade because everyone will have permissioned access to a single, immutable version. CONCLUSION We have proposed a system for electronic transactions without relying on trust. We started with the usual frameworkof coinsmade fromdigital signatures,whichprovidesstrongcontrol of ownership, but is incomplete without a way to prevent double-spending. To solve this, we proposed a peer-to-peer network using proof-of-work to record a public history of transactions that quickly becomes computationallyimpractical foranattacker to change if honest nodes control a majority of CPU power. The networkisrobustin itsunstructuredsimplicity.Nodesworkall atonce withlittle coordination.They do notneedto be identified,since messagesare not routed to any particular place and only need to be delivered on a best effort basis.