Block Chain and Edge Computing Base Design Secured Framework for Tender

Main Article Content

Article Sidebar

Published Oct 8, 2021
Mayakannan Selvaraju Karthic R.M. S.RanjithKumar N.Nandhini P.L.Kaliappan

Abstract

Purpose: The objective of this paper is to create a secured website for government tender using block chain technology

Methodology: block chain is implemented for all login form, tenders information, agent’s information and users’ information and it will record all the information done by the user or agent so it is difficult to hack or cheat the system. The time stamp and block chain is implemented for all the histories

Findings: The Motive of the tender project is to provide a more secure framework for the government and avoid cor-ruption, security issues, and the main disadvantage is tender process is fully online, and the public does not have an idea about tender and what is happening inside the process. In order to avoid all those things we have created one new website and totally we are having five modules admin, agent, public, blockchain, cryp-tographic techniques. With the help of all these things, we will be implementing the government tender web-site with rules and regulations given by the government.

Originality/value: AES Algorithm: To generate ciphertext, the Rijndael program employs a SP internet with many rounds. The numerical of circular is determined by the clue measurements.  

How to Cite

Selvaraju, M., R.M., K., S.RanjithKumar, N.Nandhini, & P.L.Kaliappan. (2021). Block Chain and Edge Computing Base Design Secured Framework for Tender. SPAST Abstracts, 1(01). Retrieved from https://spast.org/techrep/article/view/1726
Abstract 155 |

Article Details

Keywords

Blockchain, Cryptography, AES Algorithm, Edge Computing, Government, Admin, Agent, Public

References
[1] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A survey on IOT security: Application are-as, security threats, and solution architectures,” IEEE Access, vol. 7, pp. 82 721–82 743, July 2019.
[2] A. Alketbi, Q. Nasir, and M. A. Talib, “Blockchain for government services—use cases, security benefits and challenges,” in 2018 15th Learning and Technology Conference (L&T). IEEE, 2018, pp. 112–119.
[3] Coindesk, “The Indian government is preparing a national framework to support the wider deployment of block-chain use cases.” https://www.coindesk.com/india-plans-to-issue-a-national-blockchain-framework, online; Nov. 27, 2019..
[4] H. Cho, “Correction to asic-resistance of multi-hash proof-of-work mechanisms for blockchain consensus proto-cols,” IEEE Access, vol. 7, pp. 25 086–25 086, 2019.
[5] V. Hassija, V. Chamola, S. Garg, N. G. K. Dara, G. Kaddoum, and D. N. K. Jayakody, “A blockchain-based framework for lightweight data sharing and energy trading in v2g network,” IEEE Transactions on Vehicular Tech-nology, 2020
[6] Jianli Pan and James McElhannon, "Future Edge Cloud and Edge Computing for Internet of Things Applica-tions," IEEE Internet of Things Journal, Special Issue on Fog Computing in IoT, Volume: 5, Issue: 1, pp:439-449, ISSN: 2327-4662, DOI: 10.1109/JIOT.2017.2767608, February 2018
[7] Kanaga Suba Raja, S, Bamila Virgin Louis, A. Optimal Resource Allocation in 5G system using Modified Lion Algorithm. IET Commun. 2021; 15: 126– 141. https://doi.org/10.1049/cmu2.12064.
[8] Shi, Weisong, et al. "Edge computing: Vision and challenges," IEEE Internet of Things Journal 3.5 (2016): 637-646.
[9] Mobile-Edge Computing Initiative, Eur. Telecommun. Stand. Inst., Sophia Antipolis, France, 2016. [Online]. Available: http://www.etsi.org/technologiesclusters/ technologies/mobile-edgecomputing
Section
GE3- Computers & Information Technology

Most read articles by the same author(s)

1 2 3 4 5 6 7 > >>