Data Authorization in Social Network using Block Chain
S.Uma Maheswari1, B.Sai Adharsh2, P.Shanjeev3, K Vignesh4, M.Thanigai Bharathi5

1Umamaheswari G, Assistant Prof., Department of Computer Science And Engineering, Sri Shakthi Institute of Engineering and Technology Coimbatore.
2Sai Adharsh B UG Student , Department of Computer Science And Engineering ,Sri Shakthi Institute of Engineering and Technology, Coimbatore.
3Shanjeev P, UG Student , Department Of Computer Science And Engineering ,Sri Shakthi Institute of Engineering and Technology, Coimbatore.
4Vignesh K UG Student , Department of Computer Science And Engineering ,Sri Shakthi Institute of Engineering and Technology, Coimbatore.
5Thangai Bharathi, M UG Student Department of Computer Science and Engineering Sri Shakthi Institute If Engineering And Technology, Coimbatore.
Manuscript received on April 20, 2020. | Revised Manuscript received on April 30, 2020. | Manuscript published on May 10, 2020. | PP: 738-740 | Volume-9 Issue-7, May 2020. | Retrieval Number: G4987059720/2020©BEIESP | DOI: 10.35940/ijitee.G4987.059720
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In India most of the people are into social networks. Some people are taking advantage of this and spreading fake and irrelevant news in the society. Due to these major riots, culture oriented problems, fake medical messages are spreading over the people. Still there is no technology to identify these problems. Here we are introducing block chain to overcome all the above mentioned problems. Our method finds the solution for these major issues. Using the above mentioned explanation with SHA256 algorithms supports block chain a lot to implement. In case of any changes done in the mid node, using the hash function and SHA 256 algorithm, the man in the middle can be identified. The entire hash should be exactly match with the primary hash. So that data cannot be changed in the middle. In case of any changes occurred the data owner will be get notice. 
Keywords: Bitcoin , Hashing ,Analysis.
Scope of the Article: Big Data Analytics for Social Networking using IoT