Professional Documents
Culture Documents
ISSN No:-2456-2165
Abstract:- Bitcoin is the first decentralized digital trusted party, expect for the transactions with physical
encrypted currency and worldwide payment system. currencies. Cryptographic electronic payments are the major
The system works without a central bank or single alternative for trusted third party system. The main objective
administrator. It has a peer-to-peer network. The of work is, in the existing scenario bitcoins mechanism was
transactions take place between users directly, and no selective and equally distributed and the transactions were also
intermediary necessary. The verification of transactions equally distributed. But by using randomly distributed
takes place with the help of network nodes by means of artificial intelligence mechanism, the transactions are user
cryptography. Blockchain is the public distributed independent for the chosen coin frequency, as the procedure is
ledger used to read transactions. The smart coins with offline hackers cannot easily intrude into the transactions, or
associated non uniformed funds for smart transactions obtain the amount details. This is unstable and unstructured
are created. These transactions are with secured online flow. Transactions are limited in the existing scenario, which
OTP gateways with user friendly selection with volume is enhanced.
of transactions. Fully service oriented architecture has
II. RELATED WORK
to be online with asynchronous transactions facility and
automated with selective transactions with email
A. Social media networks Fraud
security gateway (OTP). This way transactions will
Everybody is tending to use the e-wallet in the current
carry on with fully non distributive model with a new
situation of currency demonetization. Among the e-wallets,
framework (in this work we created a new framework
simpler and useful for making money is the Bitcoin wallet. A
called CST). So transactions with funds framed from
trusted confirmation is required for bitcoin transactions. Anju
coin's funds is reduced and visually appears to the user.
et al [1] proposed a framework; bitcoin trading including the
social media which is new method was introduced. A trusted
Keywords:- Cryptocurrency, blockchain, gateway, OTP.
confirmation can be got from friends in a friend circle of a
social media. But still by using the information of real users
I. INTRODUCTION
some fraud identities can create fake news about bitcoin
trading. The system blocks the fake posts and reports about
Bitcoin is a digital currency system proposed by Satoshi
fake identities in such situations.
Nakamoto and then gained popularity due to its invisibility
and decentralized design characteristics. One core technique of
B. Use of digital signatures to prevent double spending
Bitcoin is called Blockchain, which is a peer-to-peer ledger
Online payments would be allowed to be sent directly
system keeping track of all bitcoin transactions and the order
from one party to another without going through a financial
of the transactions. The set of bitcoin transactions are recorded
institution by a purely peer-to-peer version of electronic cash.
in blocks. Owners of bitcoins can generate new transactions by
The main part of the solution can be digital signatures, but in
broadcasting blocks of the transactions to the Bitcoin network.
order to prevent double spending trusted third party is still
Then, a process called mining confirms the transactions and
required where its benefits are lost. Satoshi Nakamoto [2]
includes the transactions to the Blockchain. Essentially,
proposed a solution using a peer-to-peer network for the
mining is a randomized distributed agreement of component
double-spending problem. When forming a record that cannot
that confirms pending transactions by including them in the
be changed without redoing the proof-of-work, the
Blockchain.
transactions are time stamped by network by hashing them
into an ongoing chain of hash-based proof-of-work. The proof
To process electronic payments, the financial institutions of the sequence of events witnessed and the proof that it came
serve as trusted third parties, where the online commerce relies from the largest pool of CPU power is the longest chain.
on it. Even though the system works fine for most of the They'll generate the longest chain and outpace attackers as
transactions, trust based model is its major weakness. It is not long as a majority of CPU power is controlled by nodes that
possible to perform completely non-reversible transactions, are not cooperating to attack the network. A minimal structure
since financial institutions cannot give up on mediating
is required by the network. On a best effort basis messages are
disputes. The transaction costs are raised due to the raised broadcasted, and nodes can leave and rejoin the network,
median cost and also limiting the minimum practical accepting the longest proof-of-work chain as proof of what
transaction size and lowering the possibility for small casual happened while they were gone.
transactions, and there is a greater cost in the loss of ability to
make non-reversible payments for non-reversible services. As
C. Bloom Filter Implementation
the possibility of reversal is needed, the need for trust becomes Kota et al [3] have proposed a privacy-preserving Bloom
essential. Vendors must be careful about their customers, not filter design for Bitcoins’ SPV (Simplified Payment
giving out more information than they would otherwise need.
Verification) client based on ϒ-Deniability. Although it has
A certain percentage of fraud is accepted as unescapably.
been said that introducing Bloom filter improves the privacy
There is no existing mechanism to make payments without the
Step 3: GET is used to obtain the total money from the fetched
details of each user, Tm is a variable where the total money is
stored.
Tm = GET ( Fs (c1) )
V. IMPLEMENTATION
VI. RESULTS
REFERENCES