SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1640
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING
BLOCK CHAIN”
1, 2, 3 Student of S. B. Patil College of Engineering, Indapur, Pune-413106, MH, India.
4 Assistant Professor, S. B. Patil College of Engineering, Indapur, Pune-413106, MH, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In current electronic world, more losses are
impacted by cybercrime. Digital world are totally open and
it is incredibly easy to focus to get to data or cash related
information from any individual, open and private
associations and so on, since, endlessly web are open, taking
data on the unstable mechanism of channel is outstandingly
straightforward. Thusly, guaranteeing bad behavior data
required advance layers of safety counter to the cybercrime.
Data confirmation is one of the first noteworthy systems to
staying away from data from digital guilty parties. In this
data confirmation procedure, cryptology has basic influence
against the cybercriminal on the unstable correspondence
channel. It gives data security, sort out security, sagacity
and character organization to get to the data approved
work force. Various open and private key systems are
proposed for getting data, regardless there are as yet a
piece of challenge exists in this substance. Most
unmistakable encryption methods, for example, RSA, Elliptic
curve, DES and AES are working. In this undertaking about
new cryptography method forestalling the cybercrime in
view of the block chain.
Key Words: Alert System, Crime Data, Cyber Crime,
Block Chain, Safe Area, Security, etc.
1. INTRODUCTION
In current computerized world, more casualties are
influenced by cybercrime. Cyber world are wide open and
it is exceptionally simple to target to get to information or
money related data from any person, open and private
organizations etc., since, web and web are open, it is
exceptionally simple to take information on the unsecured
medium of channel. In this manner, ensuring wrongdoing
information required advance layers of security counter to
the cybercrime. Information assurance is one of the
foremost noteworthy strategies to avoiding information
from cyber offenders. In this information assurance
strategy, cryptology plays imperative part against the
cybercriminal on the unsecured communication channel.
It gives information security, organize security, astuteness
and personality administration to get to the information
authorized personnel. Numerous open and private key
strategies are suggested for securing information, in any
case there are still a part of challenge exist in this
substance. Most recognizable encryption methods such as
RSA, Elliptic bend, DES and AES are working. In this
project about new cryptography technique preventing the
cybercrime based on the block chain.
1.1 Objective of the work
Now a day’s users don’t have an idea about crime in new
area human safety is most important factor in world. Also
the crime data access by hackers or attackers by hacking
activity so we will build system which provide security to
both data and human by using block chain smart contact.
Cybercrime is considered as PC correspondence catch
exercises which are either unlawful or thought of denied
by specific gatherings and which can be controlled over
furthermore, finished with complete organization
medium. Cybercrimes allude to criminal clamor in which
the organization or PC is an fundamental piece of the
crime to take over ownership of the gadget or
organization. Individual and organizations security is one
of the significant issues in the current computerized
climate. Securing individual information and government
data are confronting significant difficulties against
cybercrime. Network protection specialists are as yet
attempting to experience digital lawbreakers with the
assistance of different plans and strategies.
 To implement security system by using block
chain smart contract
 To encrypt data of crime data report
 To create safest area for new user
 To prevent crime report from hackers
1.2 Project Scope
 Registration and login system for new user
 Registration and login system for crime branch
 Centralized digital data available access by
multiple location.
 Data security based on smart contract to prevent
hackers activity.
 System will show area crime report to new user in
area.
Jadhav Hrushikesh M.1, Kudale Sameer V.2, Lakade Rohit A.3 , Prof. Sayyad G. G4
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1641
2. RELATED WORK
Satoshi Nakamoto first proposed the Block chain
innovation in 2008; it is a public exchange record of the
digital money bit coin. It is a chain of squares where each
square contains data like hash worth of past bock and
time-stamp. From the above technique honesty and
security of the square is guaranteed and we can recognize
the invalid square. The main utilization of this innovation
was Bit coin, which permits cash exchange utilizing web.
The creator gave a goal to the issue of twofold spending.
The framework utilizes the strategy for timestamp by
hashing the block into nonstop chain based of
confirmation of work component.
In this system we have used decentralized and distributed
network in order to store prisoner's data in form of blocks.
The blocks are interconnected with each other and are
creating the chain of prisoner records. In this system our
objective is to implement both hyperledger fabric as well
as Ethereum network because we are providing our
system not only for private use but also for public use. In
hyperledger fabric network the data is kept in private
mode, whereas in ethereum the data is kept for public use.
It is expected that the hyperledger exchange and recover
the data as per agreement. It must also permit the
utilization for plugin modules such that various
organizations advance the use for smart contract. In our
proposed system the block chain is only used for security
purpose we have created different levels of trusted
contacts and only if the higher authority allows the data to
get stored in blocks then only it will be in block chain
database.
There are 2 higher authorities which will provide green
signal to data which needs to be stored in blocks, once the
data gets stored it cannot be manipulated.
Block: The block is nothing but a bunch of some kind of
information. The block is mainly have a three section i.e.
previous block hash value, information in that block and
next block hash value. Whenever any new block of new
transaction is authenticated by the system, block is added
at the end of the block chain. This sequence of blocks is
always increasing, or ledger of transaction that the system
has authenticated. The primary block in a block chain is
named as the Genesis block. This primary block holds the
zero hash value for previous block because it is first block
in block chain and doesn't have any previous block. The
next block will have the hash value of the previous block
and this chain continues.
Block chain: When blocks are connected with previous
hash values and starts forming a chain then we declare it
as a block chain.
The officials of crypto police will confirm the report. The
principle undertaking of crypto police is to report
extortion in the digital currency market. In this paper, the
creator examines about the significance of block chain in
the clinical field. The touchy information in the clinical
field is getting controlled this cripple the honesty of
information.
3. REQUIREMENTS
3.1 Functional Requirements
1. Database Connection.
2. Database on MySQL .
3. Sending http requests.
4. Responding http requests.
5. User Interface.
3.2 Safety Requirements
1. Higher Level Authentication.
2. All Information Shared with Encryption.
3. Encryption with Advance Encryption Standard
(ADS).
4. Keeping all confidential data secret using Block
Chain technique.
3.3 Software Requirements
1. Android Studio
2. JDK 12
3. MySQL Database
4. Frontend- xml
5. Script-Java
4. PROPOSED SYSTEM
4.1 SYSTEM DESIGN
Fig-1: System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1642
In above (figure 1) System architecture consists of
mainly four components i.e. User/Client, Data Encryption,
Database and Block Chain. The User/Client has to firstly
login in that application for to find safest area. The Data
Encryption mainly use for the data encryption for securely
transfer the data from databases to the client side along
with read API only. The database stores the encrypted
data for security purpose. Finally, the blocks of the Block
Chain work on the database so that we can avoid attacks
from the hacker sides. If the hacker try to modify the data
or access the data from the database due to the block chain
he can’t access it.
4.2 Activity Diagram
Fig-2: Activity Diagram
In above (figure-2) from start where we have to start our
application and data is going to distribute in several types
i.e. Police admin login, user login so that each one of these
individuals can access or upload the data from their
perspective level along with their protocols. Furthermore,
the police administrator uploads the area wise crime
report. The user can login and search the particular area
whatever he want. Another one is the hash function,
which plays the major role in the application, it provide
the security to the data present in the database. Whenever
the hackers try to modify the data, the hash function will
change the hash value of that particular data.
5. SPECIFICATION
5.1 Advantages
1. Data Security: In this system, we store the data in
encrypted formats with hash function in the
database.
2. Zero Paper Work: In this system, we store
criminal data as well as crime area data digitally
so no paper work is boycott and make system
environment friendly.
3. Access Data from Anywhere Any Time: The
system provides data in decentralized so that
anyone can easily access these data at any
location.
4. Lower Administration Burden: The police
administrator has less paper work and can share
information securely and easily on system.
5.2 Applications
1. Cyber Crime Department.
2. Police Station Sector.
3. Business/Startup Sector.
4. Central Jail/Prison.
5. Socially Useful.
6. CONCLUSION
In this paper, we presented the things that are not
available for Today to revolutionize safest area and crime
sector and how to use the digital system efficiently to
overcome various issues in crime sector. We focused on
developing application through which we can save the
time and money in comparison with today's traditional
solution on safest area problems. Therefore, Alert system
is progressed and solid. This application will introduce a
high level, solid, modest and effective.
7. REFERENCES
1. "Information, information all over", The
Economist .(2010)
2. E. Bertino, "Enormous Data - Opportunities and
Challenges".(2013)
3. J. Manyika, M. Chui, J. Bughin, R. Dobbs, P. Bisson,
and A. Marrs. “Problematic Innovations: Advances
that will Change life, Business, and the Worldwide
Economy”.(2013)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1643
4. E. Bertino, S. Nepal, R. Ranjan, "Building Sensor-
Based Big Data Cyber Infrastructures", IEEE Cloud
Computing 2(5): 64-69 (2015).
5. Atzori, M. “Block Chain Governance and the Role
of Trust Service Providers”: The TrustedChain®
Network. (2017)
6. Baars, D. “Towards Self-sovereign Identity Using
Block chain Technology (Master's thesis)”.
University of Twenty, Enscheda, Netherlands. .
(2016).
7. Bandyopadhyay, P. The Origin of Block Chain from
Cypherpunks to Satoshi to IBM Medium”. (2018)
8. Higgins, S. “Factor Outlines Record-Keeping
Network that Utilizes Bit Coin’s Block Chain”.
(2014)
9. Cheng S., Duab M., Domeyer A., Lnudqvis M.:
“Using Block Chain to Improve Data Management
in the Public Sector”.
10. Anh, D.T.T., Zhang, M., Ooi, B.C., Chen, G.:
“Untangling Block Chain: A Data Processing View
of Block Chain Systems”. IEEE Trans. Knowl. Data
Eng. 30(7), 13661385 (2018).

More Related Content

PDF
IRJET - Improving Password System using Blockchain
PDF
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
PDF
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
PDF
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
PDF
Detecting Password brute force attack and Protecting the cloud data with AES ...
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET - Improving Password System using Blockchain
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
Detecting Password brute force attack and Protecting the cloud data with AES ...
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection

Similar to “ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN” (20)

PDF
Deep Learning and Big Data technologies for IoT Security
PDF
Real-life Application of a Decentralized System
PDF
IRJET- Multimedia Content Security with Random Key Generation Approach in...
PDF
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
PDF
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
PDF
IRJET-Blockchain the New Era of Technology
PDF
AWS Cloud Based Encryption Decryption System
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PDF
IRJET- Securing Cloud Data Under Key Exposure
PDF
IRJET - Health Record Transaction in Hospital Management using Blockchain
PDF
IRJET- Blockchain based Data Sharing Framework
PDF
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
PDF
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
PDF
Blockchain based News Application to combat Fake news
PDF
Crypto Mechanism to Provide Secure to the IOT Data
PDF
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
PDF
Employment Feedback by Securing Data using Anonymous Authentication
PDF
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
PDF
Single sign on mechanism for distributed computing
PDF
IRJET- Two ways Verification for Securing Cloud Data
Deep Learning and Big Data technologies for IoT Security
Real-life Application of a Decentralized System
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET-Blockchain the New Era of Technology
AWS Cloud Based Encryption Decryption System
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET- Securing Cloud Data Under Key Exposure
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET- Blockchain based Data Sharing Framework
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
Blockchain based News Application to combat Fake news
Crypto Mechanism to Provide Secure to the IOT Data
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
Employment Feedback by Securing Data using Anonymous Authentication
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
Single sign on mechanism for distributed computing
IRJET- Two ways Verification for Securing Cloud Data

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
web development for engineering and engineering
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
PPT on Performance Review to get promotions
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
DOCX
573137875-Attendance-Management-System-original
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Sustainable Sites - Green Building Construction
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Current and future trends in Computer Vision.pptx
bas. eng. economics group 4 presentation 1.pptx
web development for engineering and engineering
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPT on Performance Review to get promotions
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Foundation to blockchain - A guide to Blockchain Tech
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
573137875-Attendance-Management-System-original
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Model Code of Practice - Construction Work - 21102022 .pdf
Lecture Notes Electrical Wiring System Components
Sustainable Sites - Green Building Construction
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Current and future trends in Computer Vision.pptx

“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1640 “ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN” 1, 2, 3 Student of S. B. Patil College of Engineering, Indapur, Pune-413106, MH, India. 4 Assistant Professor, S. B. Patil College of Engineering, Indapur, Pune-413106, MH, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In current electronic world, more losses are impacted by cybercrime. Digital world are totally open and it is incredibly easy to focus to get to data or cash related information from any individual, open and private associations and so on, since, endlessly web are open, taking data on the unstable mechanism of channel is outstandingly straightforward. Thusly, guaranteeing bad behavior data required advance layers of safety counter to the cybercrime. Data confirmation is one of the first noteworthy systems to staying away from data from digital guilty parties. In this data confirmation procedure, cryptology has basic influence against the cybercriminal on the unstable correspondence channel. It gives data security, sort out security, sagacity and character organization to get to the data approved work force. Various open and private key systems are proposed for getting data, regardless there are as yet a piece of challenge exists in this substance. Most unmistakable encryption methods, for example, RSA, Elliptic curve, DES and AES are working. In this undertaking about new cryptography method forestalling the cybercrime in view of the block chain. Key Words: Alert System, Crime Data, Cyber Crime, Block Chain, Safe Area, Security, etc. 1. INTRODUCTION In current computerized world, more casualties are influenced by cybercrime. Cyber world are wide open and it is exceptionally simple to target to get to information or money related data from any person, open and private organizations etc., since, web and web are open, it is exceptionally simple to take information on the unsecured medium of channel. In this manner, ensuring wrongdoing information required advance layers of security counter to the cybercrime. Information assurance is one of the foremost noteworthy strategies to avoiding information from cyber offenders. In this information assurance strategy, cryptology plays imperative part against the cybercriminal on the unsecured communication channel. It gives information security, organize security, astuteness and personality administration to get to the information authorized personnel. Numerous open and private key strategies are suggested for securing information, in any case there are still a part of challenge exist in this substance. Most recognizable encryption methods such as RSA, Elliptic bend, DES and AES are working. In this project about new cryptography technique preventing the cybercrime based on the block chain. 1.1 Objective of the work Now a day’s users don’t have an idea about crime in new area human safety is most important factor in world. Also the crime data access by hackers or attackers by hacking activity so we will build system which provide security to both data and human by using block chain smart contact. Cybercrime is considered as PC correspondence catch exercises which are either unlawful or thought of denied by specific gatherings and which can be controlled over furthermore, finished with complete organization medium. Cybercrimes allude to criminal clamor in which the organization or PC is an fundamental piece of the crime to take over ownership of the gadget or organization. Individual and organizations security is one of the significant issues in the current computerized climate. Securing individual information and government data are confronting significant difficulties against cybercrime. Network protection specialists are as yet attempting to experience digital lawbreakers with the assistance of different plans and strategies.  To implement security system by using block chain smart contract  To encrypt data of crime data report  To create safest area for new user  To prevent crime report from hackers 1.2 Project Scope  Registration and login system for new user  Registration and login system for crime branch  Centralized digital data available access by multiple location.  Data security based on smart contract to prevent hackers activity.  System will show area crime report to new user in area. Jadhav Hrushikesh M.1, Kudale Sameer V.2, Lakade Rohit A.3 , Prof. Sayyad G. G4
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1641 2. RELATED WORK Satoshi Nakamoto first proposed the Block chain innovation in 2008; it is a public exchange record of the digital money bit coin. It is a chain of squares where each square contains data like hash worth of past bock and time-stamp. From the above technique honesty and security of the square is guaranteed and we can recognize the invalid square. The main utilization of this innovation was Bit coin, which permits cash exchange utilizing web. The creator gave a goal to the issue of twofold spending. The framework utilizes the strategy for timestamp by hashing the block into nonstop chain based of confirmation of work component. In this system we have used decentralized and distributed network in order to store prisoner's data in form of blocks. The blocks are interconnected with each other and are creating the chain of prisoner records. In this system our objective is to implement both hyperledger fabric as well as Ethereum network because we are providing our system not only for private use but also for public use. In hyperledger fabric network the data is kept in private mode, whereas in ethereum the data is kept for public use. It is expected that the hyperledger exchange and recover the data as per agreement. It must also permit the utilization for plugin modules such that various organizations advance the use for smart contract. In our proposed system the block chain is only used for security purpose we have created different levels of trusted contacts and only if the higher authority allows the data to get stored in blocks then only it will be in block chain database. There are 2 higher authorities which will provide green signal to data which needs to be stored in blocks, once the data gets stored it cannot be manipulated. Block: The block is nothing but a bunch of some kind of information. The block is mainly have a three section i.e. previous block hash value, information in that block and next block hash value. Whenever any new block of new transaction is authenticated by the system, block is added at the end of the block chain. This sequence of blocks is always increasing, or ledger of transaction that the system has authenticated. The primary block in a block chain is named as the Genesis block. This primary block holds the zero hash value for previous block because it is first block in block chain and doesn't have any previous block. The next block will have the hash value of the previous block and this chain continues. Block chain: When blocks are connected with previous hash values and starts forming a chain then we declare it as a block chain. The officials of crypto police will confirm the report. The principle undertaking of crypto police is to report extortion in the digital currency market. In this paper, the creator examines about the significance of block chain in the clinical field. The touchy information in the clinical field is getting controlled this cripple the honesty of information. 3. REQUIREMENTS 3.1 Functional Requirements 1. Database Connection. 2. Database on MySQL . 3. Sending http requests. 4. Responding http requests. 5. User Interface. 3.2 Safety Requirements 1. Higher Level Authentication. 2. All Information Shared with Encryption. 3. Encryption with Advance Encryption Standard (ADS). 4. Keeping all confidential data secret using Block Chain technique. 3.3 Software Requirements 1. Android Studio 2. JDK 12 3. MySQL Database 4. Frontend- xml 5. Script-Java 4. PROPOSED SYSTEM 4.1 SYSTEM DESIGN Fig-1: System Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1642 In above (figure 1) System architecture consists of mainly four components i.e. User/Client, Data Encryption, Database and Block Chain. The User/Client has to firstly login in that application for to find safest area. The Data Encryption mainly use for the data encryption for securely transfer the data from databases to the client side along with read API only. The database stores the encrypted data for security purpose. Finally, the blocks of the Block Chain work on the database so that we can avoid attacks from the hacker sides. If the hacker try to modify the data or access the data from the database due to the block chain he can’t access it. 4.2 Activity Diagram Fig-2: Activity Diagram In above (figure-2) from start where we have to start our application and data is going to distribute in several types i.e. Police admin login, user login so that each one of these individuals can access or upload the data from their perspective level along with their protocols. Furthermore, the police administrator uploads the area wise crime report. The user can login and search the particular area whatever he want. Another one is the hash function, which plays the major role in the application, it provide the security to the data present in the database. Whenever the hackers try to modify the data, the hash function will change the hash value of that particular data. 5. SPECIFICATION 5.1 Advantages 1. Data Security: In this system, we store the data in encrypted formats with hash function in the database. 2. Zero Paper Work: In this system, we store criminal data as well as crime area data digitally so no paper work is boycott and make system environment friendly. 3. Access Data from Anywhere Any Time: The system provides data in decentralized so that anyone can easily access these data at any location. 4. Lower Administration Burden: The police administrator has less paper work and can share information securely and easily on system. 5.2 Applications 1. Cyber Crime Department. 2. Police Station Sector. 3. Business/Startup Sector. 4. Central Jail/Prison. 5. Socially Useful. 6. CONCLUSION In this paper, we presented the things that are not available for Today to revolutionize safest area and crime sector and how to use the digital system efficiently to overcome various issues in crime sector. We focused on developing application through which we can save the time and money in comparison with today's traditional solution on safest area problems. Therefore, Alert system is progressed and solid. This application will introduce a high level, solid, modest and effective. 7. REFERENCES 1. "Information, information all over", The Economist .(2010) 2. E. Bertino, "Enormous Data - Opportunities and Challenges".(2013) 3. J. Manyika, M. Chui, J. Bughin, R. Dobbs, P. Bisson, and A. Marrs. “Problematic Innovations: Advances that will Change life, Business, and the Worldwide Economy”.(2013)
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1643 4. E. Bertino, S. Nepal, R. Ranjan, "Building Sensor- Based Big Data Cyber Infrastructures", IEEE Cloud Computing 2(5): 64-69 (2015). 5. Atzori, M. “Block Chain Governance and the Role of Trust Service Providers”: The TrustedChain® Network. (2017) 6. Baars, D. “Towards Self-sovereign Identity Using Block chain Technology (Master's thesis)”. University of Twenty, Enscheda, Netherlands. . (2016). 7. Bandyopadhyay, P. The Origin of Block Chain from Cypherpunks to Satoshi to IBM Medium”. (2018) 8. Higgins, S. “Factor Outlines Record-Keeping Network that Utilizes Bit Coin’s Block Chain”. (2014) 9. Cheng S., Duab M., Domeyer A., Lnudqvis M.: “Using Block Chain to Improve Data Management in the Public Sector”. 10. Anh, D.T.T., Zhang, M., Ooi, B.C., Chen, G.: “Untangling Block Chain: A Data Processing View of Block Chain Systems”. IEEE Trans. Knowl. Data Eng. 30(7), 13661385 (2018).