BLOCK CHAIN TECHNOLOGY FOR SECURE
LAND REGISTRATION
Name : K .Spandana
Roll.no : B19CS150
Counsellor Name : A .Praveen
Co-Ordinator : P .Sreenivas
WHAT IS BLOCKCHAIN TECHNOLOGY?
● Blockchain is the technology where data in the form block is connected to it’s
contiguous block and the connection goes on .
● Blockchain is highly secured technology.it uses the concept of DISTRIBUTED
LEDGER , DECENTRALIZATION & HASH VALUES
● Though blockchain technology uses the concept of distributed ledger , it provides
assurance for the user that his data will not be leaked at any cost by the usage of
HASHING concept.
PROBLEM STATEMENT:
● The present scenario adopted for land registrations is risky in terms of
maintenance of records .
● Many innocents loose their lands/properties due to corruption .
● Time taking process.
● The registration forms of the land can’t be stored for longer time.
● Blockchain technology would be the best solution to overcome the above
problem.
STRUCTURE OF THE BLOCK :
● Block number: every block will have it’s own unique
number.so that each block in the block chain can be identified BLOCK NUMBER
uniquely.
PREVIOUS HASH VALUE
● Each block in blockchain is dependent on it’s previous block . PRIVATE KEY
This dependency is developed due to storage of previous block’s
hash value in the present block. PUBLIC KEY
NONCE VALUE
● Public key and Private key are used for data encryption which
prevents any third party reading the data. MERCLE TREE
LAND ID
CENTS,PRICE
● The Nonce value is used to generate hash value of the block.
● Merkle tree is used to produce a single hash value for a block.
● Complete details about land get stored into the block .
● Some additional data like local terrestrial maps , images of the areas under transaction , details about funds provided by financial institutions and
banks.
● Digital signature is the combination of private key of the owner and the available data . While communicating with the receiver public key of the
receiver will be added and then data gets encrypted .
METHODOLOGY
2
Owner1 Owner2 Owner1
3 Public key Public key Public key
hash hash hash
Property Property Property
4 vector vector
vector
Owner 1’s Owner 2’s Owner 1’s
signature signature signature
5 After successful communication , transactions take place
ADDING A NEW BLOCK INTO BLOCKCHAIN
● Adding a new block directly into the chain isn’t possible.
● We have many consensus Algorithms which allow us to add a block into the chain. One
among them is “POW “ [Proof of Work]
● According to POW , when the exact nonce value is added to the block, then the block get
permitted to be added into the chain.
● Nonce value can be any number starting from 1 . Miners generally involve in finding nonce
value and adding block to the chain.
WHY ENCRYPTION IS NEEDED?
● Encryption provides high security and confidentiality .
● Encryption is obtained through public and private keys.
● Encryption doesn’t allow third party to view the data.
● As blockchain uses distributed ledger , user may feel inconvenient about the data because
their might be chances for changing the data.
● Blockchain avoids users illusion through HASHING concept . When user details are given as
an input to the hashing algorithms like SHA 256, SHA 512,MD5 an unique hash value geta
generated.
● We generally use Secure Hash Algorithm 256 [SHA 256] which produces a hash value of 256
bits .
● Any attempt to change the data would automatically bring change in hash value , and change
in hash value of the block will effect all the successive blocks in the chain . Hence we can detect
the node which made an attempt to change the data and punish them.
PROS:
● CONFIDENTIALITY
● HIGH SECURITY
● EASY MAINTANENCE
● INTEGRITY
CONS:
● 51% ATTACK
● NOT SCALABLE
● WASTAGE OF RESOURCES IN CASE OF POW
● HIGH COST
CONCLUSION:
● I would like to conclude that using blockchain technology which provides high
security , confidentiality and integrity is more preferable than the present
registration process.
REFERENCES:
[1] /storage/emulated/0/Documents/1-s2.0-S1877050920311649-main.pdf
[2] https://searchsecurity.techtarget.com/definition/encryption
[3] https://youtube.com/playlist?list=PLsyeobzWxl7oY6tZmnZ5S7yTDxyu4zDW-
[4] https://blockchaindemo.io/
THANK YOU