SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1421
Authentication system with Decentralized chat app
Sulakshana Malwade1, Om Shimpi2, Shardul Dandawate3, Lokesh Agrawal4
1Professor, Dept of Computer Engineering, MIT polytechnic, Maharashtra, India
23Diploma in Computer Engineering, Dept of Computer Engineering, MIT polytechnic, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -
Authentication is the process of determining
whether someone or something is,infact,whoorwhatitsays
it is. Authentication technology provides access control for
systems by checking to see if a user's credentials match the
credentials in a database of authorized users or in a data au-
thentication server. Chattingis the methodofusingtechnolo-
gy to bring people an idea together despite of the geograph-
ical barriers. The technology has been available for years but
the acceptance was quite recent. Our project is an exampleof
Decentralized Chat Application.Ourprojectismadeupoftwo
application – The client application,whichrunsonuser’sweb
browser and server application, runs on any hosting servers
on the network.
To start chatting client should get connected to server
where they can do private and group chat together. Security
measures taken during the last one.Our goal is to build a
strong design community foreveryoneouttherewhowantto
connectand chat with each other across the world whichcan
help people to get connected to each other and share there
ideas privately.
Key Words: visual studio code, Authentication system,
Chat App, Decentralized chat app, privacy and security.
1. INTRODUCTION
Decentralized applications are apps that run on a decentral-
ized network (of peers) via (preferably trust-less) peer-to-
peer (p2p) protocols. One of their biggest strengths is that
they avoid any single point of failure.Unliketraditional apps,
there is no single entity who can completely control their
operation. D-apps are a relatively new concept (so a stand-
ard definition is still a bit elusive), but the most prolificsetof
examples are operating as Smart Contracts on the Ethereum
blockchain. D-apps have become increasingly popular as
new decentralized technologiessuchasblockchainsandpro-
jects like the Interplanetary File System (IPFS) have gained
more attention and momentum.
1.1 Project Features
- Authentication system enablesuserstosecureauthenticate
to resource.
- After login user it has a platform that enables user to in-
stant message and connect with each otherthroughcomput-
ers.
- User can also create a chat room/group and add members
to chat with them.
- User can also share various types of files and folders in
group or personally.
About Security-
- As the name suggests, a decentralized application does not
have a centralized server. It is basically a peer-to-peer net-
work.
- Also, the data that is stored in block is almost impossible to
view as a very secure encryption and hashing functions
(256 bits) are used.
- Also is a someone tries to make changes to the information
in block then, he/she will have to make changes to all the
copies of that block on whole blockchain network and that
can be quite impossible.
1.2 Need of The Project
The need for decentralization is the key motivation behind
the blockchain technology, and decentralization is achieved
by distributing the computation tasks to all the nodes of the
blockchain network. Decentralization solves several prob-
lems of traditional systems; the single point of failure is one
such problem.
2. LITERATURE SURVEY
[1] Is a paper in which author has introducedall theuses and
possible ways the blockchain can be used along with decen-
tralization. Also, the author emphasizes on, what the future
blockchain applications will be. There is also a detailed re-
port on advantages it provides, different areas in which
blockchain can improve computing and how it is better and
the current traditional systems.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1422
Chart -1: Activity diagram
2.1 Authentication with decentralized chat appli-
cation – Detailed Workflow
3. CONCLUSIONS
In this project, we are developing an application that makes
use of blockchain in a very efficient way. Blockchain has
shown its potential for transforming traditional industry.
Also, by eliminating the centralized approach, wecanassure
the safety and availability of data and communication. De-
centralized applications tend to make the interaction be-
tween two people more efficient and simpler. The chatting
process nowadays have a mediating node, while our soft-
ware does not have any mediating device/node i.e., every
person is connected by peer-to-peer network.
3.1 Project objectives
• The main objective of authentication is to allow au-
thorized users to access the computer and to deny access to
the unauthorized users
• Broadcasting Chat Server Application is going to be
a text communication software, it will be able to communi-
cate between two computers using point to point communi-
cation.
• The limitation of Live Chat is it does not support
audio conversations. To overcome this limitation, we are
concurrently working on developing better technologies.
• Companies would like to have a communication
software wherein they can communicate instantly within
their organization.
• The fact that the software uses an internal network
setup within the organization makes itverysecurefromout-
side attacks.
3.2 Project Features
Authentication system enables users to secure authenticate
to resource.
- After login user it has a platform that enables user to in-
stant message and connect with each otherthroughcomput-
ers.
- User can also create a chat room/group and add members
to chat with them.
- User can also share various types of files and folders in
group or personally.
About Security-
- As the name suggests, a decentralized application does not
have a centralized server. It is basically a peer-to-peer net-
work.
- Also, the data that is stored in block is almost impossible to
view as a very secure encryption and hashing functions
(256 bits) are used.
- Also is a someone tries to make changes to the information
in block then, he/she will have to make changes to all the
copies of that block on whole blockchain network and that
can be quite impossible.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1423
REFERENCES
[1] Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen,
and Huaimin Wang, ―An Overview of Blockchain Technolo-
gy: Architecture, Consensus, and Future Trends‖,2017IEEE
6th International Congress on Big Data.
[2] S. Nakamoto, ―Bitcoin: A peer-to-peer electronic cash
system, ‖ 2008. [Online]. Available:
https://bitcoin.org/bitcoin.pdf
[3] G. W. Peters, E. Panayi, and A. Chapelle, ―Trends in cryp-
tocurrencies and blockchain technologies: Amonetarytheo-
ry and regulation perspective, ‖ 2015. [Online]. Available:
http://dx.doi.org/10.2139/ssrn. 2646618
[4] G. Foroglou and A.-L. Tsilidou, ―Further applications of
the blockchain,‖ 2015.
[5] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou,
―Hawk: The blockchain model of cryptography and priva-
cypreserving smart contracts,‖ in Proceedings of IEEE Sym-
posium on security and Privacy(SP),SanJose,CA,USA,2016,
pp. 839–858.
[6] B. W. Akins, J. L. Chapman, and J. M. Gordon, ―A whole
new world: Income tax considerations of the bitcoin econo-
my,‖
BIOGRAPHIES
Om Shimpi
Student of MIT College of
Engineering, Pune,
I am currently pursuing my third
year Bachelor of
Engineering in Computer
University of PUNE
Shardul Dandawate,
Student of MIT College of
Engineering, Pune,
I am currently pursuing my third
year Bachelor of
Engineering in Computer
University of PUNE
Lokesh Agrawal,
Student of MIT College of
Engineering, Pune,
I am currently pursuing my third
year Bachelor of
Engineering in Computer
University of PUNE
Prof. Sulakshana Malwade,
Professor at DVK’s school of
Polytechnic and skill development,
PUNE
Department of Computer
Engineering

Mais conteúdo relacionado

Semelhante a Authentication system with Decentralized chat app

Semelhante a Authentication system with Decentralized chat app (20)

IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
 
DECENTRALISED CHAT APPLICATION
DECENTRALISED CHAT APPLICATIONDECENTRALISED CHAT APPLICATION
DECENTRALISED CHAT APPLICATION
 
IRJET- In-House File Tracking System
IRJET-  	  In-House File Tracking SystemIRJET-  	  In-House File Tracking System
IRJET- In-House File Tracking System
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
The Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage applicationThe Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage application
 
ENFACT
ENFACTENFACT
ENFACT
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
A study on practical uses of common Network protocols
A study on practical uses of common Network protocolsA study on practical uses of common Network protocols
A study on practical uses of common Network protocols
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 

Mais de IRJET Journal

Mais de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

Authentication system with Decentralized chat app

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1421 Authentication system with Decentralized chat app Sulakshana Malwade1, Om Shimpi2, Shardul Dandawate3, Lokesh Agrawal4 1Professor, Dept of Computer Engineering, MIT polytechnic, Maharashtra, India 23Diploma in Computer Engineering, Dept of Computer Engineering, MIT polytechnic, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Authentication is the process of determining whether someone or something is,infact,whoorwhatitsays it is. Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data au- thentication server. Chattingis the methodofusingtechnolo- gy to bring people an idea together despite of the geograph- ical barriers. The technology has been available for years but the acceptance was quite recent. Our project is an exampleof Decentralized Chat Application.Ourprojectismadeupoftwo application – The client application,whichrunsonuser’sweb browser and server application, runs on any hosting servers on the network. To start chatting client should get connected to server where they can do private and group chat together. Security measures taken during the last one.Our goal is to build a strong design community foreveryoneouttherewhowantto connectand chat with each other across the world whichcan help people to get connected to each other and share there ideas privately. Key Words: visual studio code, Authentication system, Chat App, Decentralized chat app, privacy and security. 1. INTRODUCTION Decentralized applications are apps that run on a decentral- ized network (of peers) via (preferably trust-less) peer-to- peer (p2p) protocols. One of their biggest strengths is that they avoid any single point of failure.Unliketraditional apps, there is no single entity who can completely control their operation. D-apps are a relatively new concept (so a stand- ard definition is still a bit elusive), but the most prolificsetof examples are operating as Smart Contracts on the Ethereum blockchain. D-apps have become increasingly popular as new decentralized technologiessuchasblockchainsandpro- jects like the Interplanetary File System (IPFS) have gained more attention and momentum. 1.1 Project Features - Authentication system enablesuserstosecureauthenticate to resource. - After login user it has a platform that enables user to in- stant message and connect with each otherthroughcomput- ers. - User can also create a chat room/group and add members to chat with them. - User can also share various types of files and folders in group or personally. About Security- - As the name suggests, a decentralized application does not have a centralized server. It is basically a peer-to-peer net- work. - Also, the data that is stored in block is almost impossible to view as a very secure encryption and hashing functions (256 bits) are used. - Also is a someone tries to make changes to the information in block then, he/she will have to make changes to all the copies of that block on whole blockchain network and that can be quite impossible. 1.2 Need of The Project The need for decentralization is the key motivation behind the blockchain technology, and decentralization is achieved by distributing the computation tasks to all the nodes of the blockchain network. Decentralization solves several prob- lems of traditional systems; the single point of failure is one such problem. 2. LITERATURE SURVEY [1] Is a paper in which author has introducedall theuses and possible ways the blockchain can be used along with decen- tralization. Also, the author emphasizes on, what the future blockchain applications will be. There is also a detailed re- port on advantages it provides, different areas in which blockchain can improve computing and how it is better and the current traditional systems.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1422 Chart -1: Activity diagram 2.1 Authentication with decentralized chat appli- cation – Detailed Workflow 3. CONCLUSIONS In this project, we are developing an application that makes use of blockchain in a very efficient way. Blockchain has shown its potential for transforming traditional industry. Also, by eliminating the centralized approach, wecanassure the safety and availability of data and communication. De- centralized applications tend to make the interaction be- tween two people more efficient and simpler. The chatting process nowadays have a mediating node, while our soft- ware does not have any mediating device/node i.e., every person is connected by peer-to-peer network. 3.1 Project objectives • The main objective of authentication is to allow au- thorized users to access the computer and to deny access to the unauthorized users • Broadcasting Chat Server Application is going to be a text communication software, it will be able to communi- cate between two computers using point to point communi- cation. • The limitation of Live Chat is it does not support audio conversations. To overcome this limitation, we are concurrently working on developing better technologies. • Companies would like to have a communication software wherein they can communicate instantly within their organization. • The fact that the software uses an internal network setup within the organization makes itverysecurefromout- side attacks. 3.2 Project Features Authentication system enables users to secure authenticate to resource. - After login user it has a platform that enables user to in- stant message and connect with each otherthroughcomput- ers. - User can also create a chat room/group and add members to chat with them. - User can also share various types of files and folders in group or personally. About Security- - As the name suggests, a decentralized application does not have a centralized server. It is basically a peer-to-peer net- work. - Also, the data that is stored in block is almost impossible to view as a very secure encryption and hashing functions (256 bits) are used. - Also is a someone tries to make changes to the information in block then, he/she will have to make changes to all the copies of that block on whole blockchain network and that can be quite impossible.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1423 REFERENCES [1] Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang, ―An Overview of Blockchain Technolo- gy: Architecture, Consensus, and Future Trends‖,2017IEEE 6th International Congress on Big Data. [2] S. Nakamoto, ―Bitcoin: A peer-to-peer electronic cash system, ‖ 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf [3] G. W. Peters, E. Panayi, and A. Chapelle, ―Trends in cryp- tocurrencies and blockchain technologies: Amonetarytheo- ry and regulation perspective, ‖ 2015. [Online]. Available: http://dx.doi.org/10.2139/ssrn. 2646618 [4] G. Foroglou and A.-L. Tsilidou, ―Further applications of the blockchain,‖ 2015. [5] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, ―Hawk: The blockchain model of cryptography and priva- cypreserving smart contracts,‖ in Proceedings of IEEE Sym- posium on security and Privacy(SP),SanJose,CA,USA,2016, pp. 839–858. [6] B. W. Akins, J. L. Chapman, and J. M. Gordon, ―A whole new world: Income tax considerations of the bitcoin econo- my,‖ BIOGRAPHIES Om Shimpi Student of MIT College of Engineering, Pune, I am currently pursuing my third year Bachelor of Engineering in Computer University of PUNE Shardul Dandawate, Student of MIT College of Engineering, Pune, I am currently pursuing my third year Bachelor of Engineering in Computer University of PUNE Lokesh Agrawal, Student of MIT College of Engineering, Pune, I am currently pursuing my third year Bachelor of Engineering in Computer University of PUNE Prof. Sulakshana Malwade, Professor at DVK’s school of Polytechnic and skill development, PUNE Department of Computer Engineering