An Algorithm that Prevents SPAM Attacks using Blockchain
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 7
Abstract
There are many systems and methods for prevent-ing spam attacks. However, at present there is no specific tried-and-true method for preventing such attacks. In this paper, we propose an algorithm, “SAGA BC” to prevent spam attacks using a blockchain technique and demonstrate its effectiveness by a simulation experiment. A person who sends an email using the “SAGA BC” must pay the processing cost with cryptocurrency. If an e-mail sent using this algorithm is received normally at a destination e-mail account, this fee is refunded. However, a lot of spam e-mails are not received normally, because addresses of the spam e-mails are indiscriminate. If a spammer sends spam using the “SAGA BC ,” he/she will lose the cryptocurrency fee for each such message. Thus, if using the “SAGA BC” to send e-mail becomes a standard practice for the general public, receiving e-mail servers and/or mailers will be able to easily judge incom-ing messages without using the “SAGA BC,” because spammers cannot use the “SAGA BC” without losing their cryptocurrency.
Authors and Affiliations
Koichi Nakayama, Yutaka Moriyama, Chika Oshima
Integrating Android Devices into Network Management Systems based on SNMP
Mobile devices are becoming essential for today life. In developed countries, about half of the people have a smartphone, resulting in millions of these electronic devices. Android is the most popular operating system fo...
A Low Power Consuming Model of Parallel Programming for HPC System
For most of the past five decades, the growing computational power of supercomputers has come primarily from a doubling of clock frequency every 18 months. Over this time period, the clock rate increased by six orders of...
Motif Detection in Cellular Tumor p53 Antigen Protein Sequences by using Bioinformatics Big Data Analytical Techniques
Due to the rapid growth of data in the field of big data and bioinformatics, the analysis and management of the data is a very difficult task for the scientist and the researchers. Data exists in many formats like in the...
Software Architecture- Evolution and Evaluation
The growth of various software architectural frameworks and models provides a standard governing structure for different types of organizations. Selection of a suitable framework for a particular environment needs much m...
NMVSA Greedy Solution for Vertex Cover Problem
Minimum vertex cover (MVC) is a well-known NP-Complete optimization problem. The importance of MVC in theory and practical comes from the wide range of its applications. This paper describes a polynomial time greedy algo...