IRJET- A Survey on File Storage and Retrieval using Blockchain Technology

IRJET Journal
IRJET JournalFast Track Publications

https://www.irjet.net/archives/V5/i10/IRJET-V5I10142.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 763
A Survey on File Storage & Retrieval using Blockchain Technology
Yash Ranka1, Jainam Bagrecha2, Kavish Gandhi3, Bhargav Sarvaria4, Prof. P. M. Chawan5
1,2,3,4U. G. Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India
5Associate Professor, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Data drives business around the globe and is a
crucial aspect of the industry, which makes misuse of data
equally dangerous. Data needs to be stored and transferred
securely in order to maintain its confidentiality and
integrity. Ethereum platform and technologies like swarm
and whisper can make it possible to make a secured file
storage and retrieval Decentralized Application (DApp).
With the help of blockchain we propose an architecture
which is much safer and easier for human use and it also
solves the existing data storage and retrieval difficulties.
Key Words: Blockchain, Swarm, Whisper, Ethereum,
File Storage & Retrieval, P2P, IPFS, ENS
1. INTRODUCTION
A blockchain is a chain of blocks, where each block
contains a set of records (transactions) and the blocks are
linked using cryptography[1]. Blocks hold batches of valid
transactions. The transactions are hashed and encoded
together into a Merkle tree. Every block includes the
cryptographic hash of the previous block in the blockchain
which links and creates a chain of blocks. The linked
blocks form a chain. This iterative process confirms the
integrity of the previous block, all the way back to the
original genesis block.
There are many applications of blockchain viz.
Cryptocurrency, to secure Internet of Things, smart
Contracts based transactions. One promising application
of blockchain is File Transfer (Storage and Retrieval),
which can be implemented using Peer-to-Peer network,
Directed Acyclic Graph, Distributed Hash Table.
2. EXISTING TECHNOLOGIES
2.1 Distributed File System
Traditional file storage on a single computer can
be made more efficient using Distributed File System
(DFS) [2]. Data which is stored on a single
computer can be split and stored on multiple independent
computer (nodes). DFS makes file storage reliable by
allowing an user to retrieve data even when one or more
nodes of the network goes down, the data is replicated on
several nodes which increases availability of data, only
authenticated users can store and retrieve data from DFS
which makes it more secure and if the system runs out of
space we can add more nodes to the system which makes
DFS scalable.
Fig -1: DFS Architecture
A file is split into metadata and its content and
stored on the system while uploading. When a user wishes
to download the same file, he provides the Meta
information and the file is retrieved from multiple nodes
and provided to the user, this makes it appear as a single
coherent system for the user. Thus for a user it appears to
be stored as it were being stored on his own computer.
Thus DFS is reliable, scalable, secure and more available
but reduces the time of access for a file. DFS requires
algorithms for synchronization, locking and maintaining
data consistency.
2.2 InterPlanetary File System
The InterPlanetary File System (IPFS) [3] is a peer-to-
peer distributed file system that seeks to connect all
computing devices with the same system of files. The file is
divided into small blocks, the block is then hashed and
distributed across the IPFS network. The redundant
information is removed because the hashes are same for
similar files. IPFS provides a high throughput content-
addressed block storage model, with content-addressed
hyperlinks. A generalized Merkle DAG (Directed Acyclic
Graph), which can be used to build versioned file systems,
blockchain, etc. A distributed hash table, an incentivized
block exchange, and a self-certifying namespace is used by
IPFS. There is no point of failure in IPFS and it is not
necessary for the nodes to trust each other.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 764
Fig -2: Overview of IPFS
2.3 Secured File Storage and Retrieval using
Blockchain
One of the simplest way to store/retrieve files is
to upload the file directly in the blocks of a blockchain. The
complexity to verify a block is directly proportional to the
size of the block and hence, larger file size will lead to
bigger blocks which eventually makes the network
inefficient with high latency. Though the file remains
secured because of decentralized nature of blockchain, we
cannot use it practically.
2.4 Storing the hashes of files on Blockchain
One way to increase the efficiency of the file
storage/retrieval is to use the hash of the file on the
blockchain instead of using the blocks of file. It further
provides auditable accountability of exactly what content
has been authorized by whom for sharing and transfer
through the file transfer guard. Continuous updating the
ledger for every file transfer gives an immutable record of
the entire life cycle of file. [4]
Fig -3: Storing hashes on Blockchain
2.5 Filecoin
Filecoin [5] is a kind of cryptocurrency where
individual data providers are provided with incentives for
their storage resources for storage of data pieces in the
filecoin network. The incentives are given based on the
amount of resources shared by the individual. Large
number of such individuals form a global distributed
network that runs filecoin protocol for file storage. The
contributing users may opt out if they wish and yet the
availability of the data is maintained by the distributed
network.
Filecoin makes use of two kinds of nodes: Storage
nodes & Retrieval nodes. The file is first encrypted and
then segments of the file are distributed to storage nodes.
The retrieval nodes need to be near the storage nodes so
that the transfer of data is fast. Only the authorized person
can retrieve it using her private key.
2.6 Storj
A peer-to-peer (P2P) cloud storage network
which uses client-side encryption allows users to transfer
and share data without depending on a third party storage
provider. Data availability is a function of popularity,
rather than utility which makes the P2P networks
unfeasible for production storage systems. A solution in
the form of a challenge-response verification system
coupled with direct payments is used by Storj [6].
The file is encrypted and sharded. The shards are
then distributed over a decentralized network of storage
nodes which are known as “farmers”. The data owners are
responsible for everything from pre-processing shards to
collecting them, managing file encryption keys, etc.
2.7 Decentralized file transfer using Multichain
framework [7]
This is a file transfer system where the receiver
first sends a request message to the sender with body as
burn address and its public key via email or facebook. The
RSA 2048 algorithm is used to generate public-key
private- key pair. The file is encrypted using Advanced
Encryption Standard (AES) and the public key. Then the
encrypted file is sharded into fixed size blocks and then
encoded using Hex encoding algorithm. The encoded parts
and the RSA public key is then stored on a private
blockchain. At the receiver’s end, the different blocks of
file are decoded using hex decoding and merged together.
The merged file is decrypted using the private key (of the
respective public key) and AES to produce the desired file.
[8]
3. PROPOSED SYSTEM
Our primary aim lies in solving the problem of
decentralized data storage, restricted data access and
preventing data redundancy using peer-to-peer network
storage clubbed with blockchain technology. The proposed
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 765
tech stack for the same includes Ethereum[9] swarm[10]
for data storage, distribution and retrieval over the
network, Ethereum whisper[11] protocol for sharing
access rights by the file owner and various Asymmetric
cryptographic algorithms along with data compression
algorithms for maintaining data confidentiality and
efficient data storage. The process is as follows:
We take the file which user needs to upload and encrypt it
using a new public-key private-key pair which will be held
by the file owner. The Asymmetric encryption technique
can help ensure the read-write access privileges. The user
with just public key can have read access and the user
with private key can have write access. Symmetric
encryption algorithms can also be used as per the
requirements. Once the file is encrypted it is further
processed for data compression using a predefined data
compression algorithm for efficient file storage. The
compressed and encrypted file is then distributed over the
swarm network and a unique hash for the file is calculated
by the swarm protocol through which the file can later be
accessed.
Once the file is distributed over the swarm network, the
generated hash for the file is then added to the blockchain
as a transaction to preserve the file integrity. Thus we
record the hash of the file by uploading it on the
blockchain.
Once the hash of the file is recorded on the blockchain, the
file owner can then decide to grant access privilege to
various other users using a messaging protocol- Ethereum
Whisper. The owner needs to send the file hash along with
the public key of the encrypted file by which the other
user will be able to decrypt the encrypted file and hence
access it and the entire message is encrypted using the
receiver’s public key, making the message unintelligible
for others.
The receiver can then decrypt it using her private key.
Thus even if someone tries to access the encrypted file by
fetching the file hash from the public blockchain she won't
be able to decrypt the file without the key. Thus,
preserving the confidentiality.
The problem of data redundancy has been automatically
solved as we calculate a unique hash for each file. Thus, if
we have two exactly same files both files will effectively
produce the same hash thus solving the redundancy
conflicts.
To make the file system more human-readable we make
use of the Ethereum Name Server (ENS). ENS works the
same way as the Domain Name Server, it effectively stores
the mapping of file hashes with the human readable
filenames using distributed hash tables. Thus the hashes
can be uniquely named as per the user convenience. Along
with improving readability, ENS serves an important
purpose. Generally the files stored this way are immutable
and static in nature as a slight change in file content would
effectively produce a new hash which will again increase
the redundancy of the network. ENS solves this by efficient
mapping from old files to new files, thus adding up more
to the user convenience. ENS can also be used to maintain
version control (like git).
The above process considers file uploaded to be the one
with limited access where the file owner shares the access
permissions with the limited set of users. However, some
files could be made available to general public where we
do not need to specify the access permissions. Such files
can be directly compressed and stored over the network.
The users who wants the access of such public files can
directly access it on the blockchain via some blockchain
explorer that searches for file hashes on the blockchain. To
make it more convenient for users such files can be
explicitly marked as public with the help of ENS.
Fig -4: Proposed System Architecture
4. CONCLUSION
In this paper we proposed an enhanced mechanism for
data storage and transfer. The whole mechanism uses
cryptography, blockchain and ethereum technology to
carry out the task as opposed to older mechanisms. The
given mechanism will make the task more secure through
cryptography, maintain data integrity through hash codes
and data readily available with decentralized data storage
on multiple hosts.
REFERENCES
[1] Blockchain-Wikipedia
“https://en.wikipedia.org/wiki/Blockchain”
[2] Pavel Bžoch - “Distributed File Systems”,
“https://www.kiv.zcu.cz/site/documents/verejne/vy
zkum/publikace/technicke-zpravy/2012/tr-2012-
02.pdf”
[3] J. Benet, “IPFS - content addressed, versioned, P2P file
system, (2014)”,
“https://github.com/ipfs/ipfs/blob/master/papers/i
pfs-cap2pfs/ipfs-p2p-file-system.pdf”
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 766
[4] Securing your cross-domain file transfers with
blockchain,
“https://www.ibm.com/blogs/blockchain/2018/05/s
ecuring-your-cross-domain-file-transfers-with-
blockchain/”
[5] Filecoin: “A Cryptocurrency Operated File Storage
Network” , “https://filecoin.io/filecoin-jul-2014.pdf”
[6] Storj - A Peer-to-Peer Cloud Storage Network,
“https://storj.io/storj.pdf”
[7] Dr Gideon Greenspan, “MultiChain Private
Blockchain”,
“https://www.multichain.com/download/MultiChain-
White-Paper.pdf”
[8] SriBalaji, Vignesh Mohan, Soundarya, “Secure and
Decentralized File Transfer Application using
Blockchain” ,
“http://troindia.in/journal/ijcesr/vol4iss4/169-
175.pdf”
[9] Vitalik Buterin, “Ethereum” , “https://ethereum.org/”
[10] Ethereum Swarm, “https://swarm-
guide.readthedocs.io/en/latest/introduction.html”
[11] Ethereum whisper,
“https://github.com/ethereum/wiki/wiki/Whisper-
PoC-2-Protocol-Spec”

Recomendados

IRJET - Healthcare Data Storage using Blockchain por
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET Journal
53 visualizações5 slides
IRJET- Blockchain based Data Sharing Framework por
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
67 visualizações3 slides
A decentralized consensus application using blockchain ecosystem por
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem IJECEIAES
42 visualizações13 slides
P14 towards using blockchain technology for e health por
P14 towards using blockchain technology for e healthP14 towards using blockchain technology for e health
P14 towards using blockchain technology for e healthdevid8
43 visualizações4 slides
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) por
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
32 visualizações12 slides
Ieeepro techno solutions 2011 ieee java project -secure role based data por
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
174 visualizações6 slides

Mais conteúdo relacionado

Mais procurados

Dynamic and public auditing with fair arbitration for cloud data por
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataShakas Technologies
105 visualizações2 slides
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID por
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRIDINFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRIDIJNSA Journal
7 visualizações16 slides
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP... por
BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP...AIRCC Publishing Corporation
114 visualizações18 slides
Cloud Data Security and Secure Data Sharing Methods por
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsIJCSIS Research Publications
52 visualizações9 slides
Oruta project report por
Oruta project reportOruta project report
Oruta project reportManasa Chowdary
4.7K visualizações47 slides
Global Digital Sukuk (GDS) - A basic framework por
Global Digital Sukuk (GDS) - A basic frameworkGlobal Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic frameworkTariqullah Khan
1.4K visualizações45 slides

Mais procurados(18)

Dynamic and public auditing with fair arbitration for cloud data por Shakas Technologies
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud data
Shakas Technologies105 visualizações
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID por IJNSA Journal
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRIDINFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
IJNSA Journal7 visualizações
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP... por AIRCC Publishing Corporation
BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP...
AIRCC Publishing Corporation114 visualizações
Oruta project report por Manasa Chowdary
Oruta project reportOruta project report
Oruta project report
Manasa Chowdary4.7K visualizações
Global Digital Sukuk (GDS) - A basic framework por Tariqullah Khan
Global Digital Sukuk (GDS) - A basic frameworkGlobal Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic framework
Tariqullah Khan1.4K visualizações
A Novel privacy preserving public auditing for shared data in cloud por JAVVAJI VENKATA RAO
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO1.2K visualizações
Pistoia Alliance Blockchain Webinar 20 June 2017 por Pistoia Alliance
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance1.5K visualizações
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide por Galen Growth
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
Galen Growth2.9K visualizações
Aplicación de la tecnología blockchain en sistemas energéticos sostenibles por José Luis Casal
Aplicación de la tecnología blockchain en sistemas energéticos sosteniblesAplicación de la tecnología blockchain en sistemas energéticos sostenibles
Aplicación de la tecnología blockchain en sistemas energéticos sostenibles
José Luis Casal362 visualizações
International Journal of Engineering Research and Development por IJERD Editor
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor251 visualizações
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ... por Chad Lawler
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Chad Lawler4.3K visualizações
Secure Data Sharing In an Untrusted Cloud por IJERA Editor
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor294 visualizações
Keynote Session : Emerging Healthcare Tech & Future Security Impact por Priyanka Aash
Keynote Session : Emerging Healthcare Tech & Future Security ImpactKeynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Priyanka Aash857 visualizações
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou... por IOSR Journals
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals628 visualizações
Blockchain an introduction por Kaveen Rodrigo
Blockchain an introduction Blockchain an introduction
Blockchain an introduction
Kaveen Rodrigo39 visualizações
Top 10 Download Article in Computer Science & Information Technology: October... por AIRCC Publishing Corporation
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
AIRCC Publishing Corporation47 visualizações

Similar a IRJET- A Survey on File Storage and Retrieval using Blockchain Technology

WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch... por
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...CyberLab
36 visualizações5 slides
SECRY - Secure file storage on cloud using hybrid cryptography por
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
2.1K visualizações34 slides
IRJET- Distributed Decentralized Data Storage using IPFS por
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET Journal
33 visualizações4 slides
Paper id 712019116 por
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
26 visualizações4 slides
IRJET - A Secure Access Policies based on Data Deduplication System por
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
8 visualizações3 slides
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing por
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
359 visualizações7 slides

Similar a IRJET- A Survey on File Storage and Retrieval using Blockchain Technology(20)

WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch... por CyberLab
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
CyberLab36 visualizações
SECRY - Secure file storage on cloud using hybrid cryptography por ALIN BABU
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU2.1K visualizações
IRJET- Distributed Decentralized Data Storage using IPFS por IRJET Journal
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET Journal33 visualizações
Paper id 712019116 por IJRAT
Paper id 712019116Paper id 712019116
Paper id 712019116
IJRAT26 visualizações
IRJET - A Secure Access Policies based on Data Deduplication System por IRJET Journal
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal8 visualizações
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing por IJERA Editor
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor359 visualizações
IRJET- A Secure File Storage & Retrieval using Blockchain Technology por IRJET Journal
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET Journal23 visualizações
Secured Authorized Deduplication Based Hybrid Cloud por theijes
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
theijes539 visualizações
E031102034039 por theijes
E031102034039E031102034039
E031102034039
theijes304 visualizações
Providing Secure Cloud for College Campus por vivatechijri
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
vivatechijri16 visualizações
Authenticated Key Exchange Protocols for Parallel Network File Systems por 1crore projects
Authenticated Key Exchange Protocols for Parallel Network File SystemsAuthenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File Systems
1crore projects82 visualizações
Authenticated key exchange protocols for parallel network file systems por Pvrtechnologies Nellore
Authenticated key exchange protocols for parallel network file systemsAuthenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systems
Pvrtechnologies Nellore696 visualizações
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN por IRJET Journal
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
IRJET Journal7 visualizações
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por IRJET Journal
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal36 visualizações
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal25 visualizações
IRJET- Adaptable Wildcard Searchable Encryption System por IRJET Journal
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET Journal11 visualizações
IRJET-Using Downtoken Secure Group Data Sharing on Cloud por IRJET Journal
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal22 visualizações
IJSRED-V2I2P10 por IJSRED
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
IJSRED12 visualizações
Implementation of De-Duplication Algorithm por IRJET Journal
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal31 visualizações
Multi-part Dynamic Key Generation For Secure Data Encryption por CSCJournals
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals430 visualizações

Mais de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
20 visualizações7 slides
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 visualizações7 slides
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
7 visualizações5 slides
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 visualizações11 slides
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 visualizações6 slides
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 visualizações5 slides

Mais de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal20 visualizações
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 visualizações
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal7 visualizações
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 visualizações
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 visualizações
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 visualizações
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 visualizações
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 visualizações
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 visualizações
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 visualizações
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 visualizações
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal44 visualizações
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal10 visualizações
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 visualizações
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 visualizações
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 visualizações
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 visualizações
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 visualizações
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal4 visualizações
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 visualizações

Último

Instrumentation & Control Lab Manual.pdf por
Instrumentation & Control Lab Manual.pdfInstrumentation & Control Lab Manual.pdf
Instrumentation & Control Lab Manual.pdfNTU Faisalabad
5 visualizações63 slides
NEW SUPPLIERS SUPPLIES (copie).pdf por
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdfgeorgesradjou
15 visualizações30 slides
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa... por
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...ijseajournal
5 visualizações13 slides
Thermal aware task assignment for multicore processors using genetic algorithm por
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm IJECEIAES
31 visualizações12 slides
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Tsuyoshi Horigome
23 visualizações16 slides
SPICE PARK DEC2023 (6,625 SPICE Models) por
SPICE PARK DEC2023 (6,625 SPICE Models) SPICE PARK DEC2023 (6,625 SPICE Models)
SPICE PARK DEC2023 (6,625 SPICE Models) Tsuyoshi Horigome
17 visualizações218 slides

Último(20)

Instrumentation & Control Lab Manual.pdf por NTU Faisalabad
Instrumentation & Control Lab Manual.pdfInstrumentation & Control Lab Manual.pdf
Instrumentation & Control Lab Manual.pdf
NTU Faisalabad 5 visualizações
NEW SUPPLIERS SUPPLIES (copie).pdf por georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou15 visualizações
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa... por ijseajournal
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
ijseajournal5 visualizações
Thermal aware task assignment for multicore processors using genetic algorithm por IJECEIAES
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm
IJECEIAES31 visualizações
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome23 visualizações
SPICE PARK DEC2023 (6,625 SPICE Models) por Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models) SPICE PARK DEC2023 (6,625 SPICE Models)
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome17 visualizações
An approach of ontology and knowledge base for railway maintenance por IJECEIAES
An approach of ontology and knowledge base for railway maintenanceAn approach of ontology and knowledge base for railway maintenance
An approach of ontology and knowledge base for railway maintenance
IJECEIAES12 visualizações
Machine Element II Course outline.pdf por odatadese1
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdf
odatadese18 visualizações
Saikat Chakraborty Java Oracle Certificate.pdf por SaikatChakraborty787148
Saikat Chakraborty Java Oracle Certificate.pdfSaikat Chakraborty Java Oracle Certificate.pdf
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty78714815 visualizações
Generative AI Models & Their Applications por SN
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their Applications
SN6 visualizações
Activated sludge process .pdf por 8832RafiyaAltaf
Activated sludge process .pdfActivated sludge process .pdf
Activated sludge process .pdf
8832RafiyaAltaf9 visualizações
Dynamics of Hard-Magnetic Soft Materials por Shivendra Nandan
Dynamics of Hard-Magnetic Soft MaterialsDynamics of Hard-Magnetic Soft Materials
Dynamics of Hard-Magnetic Soft Materials
Shivendra Nandan15 visualizações
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli6 visualizações
CHEMICAL KINETICS.pdf por AguedaGutirrez
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdf
AguedaGutirrez12 visualizações
Codes and Conventions.pptx por IsabellaGraceAnkers
Codes and Conventions.pptxCodes and Conventions.pptx
Codes and Conventions.pptx
IsabellaGraceAnkers7 visualizações
Machine learning in drug supply chain management during disease outbreaks: a ... por IJECEIAES
Machine learning in drug supply chain management during disease outbreaks: a ...Machine learning in drug supply chain management during disease outbreaks: a ...
Machine learning in drug supply chain management during disease outbreaks: a ...
IJECEIAES12 visualizações
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli9 visualizações
MSA Website Slideshow (16).pdf por msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla64 visualizações
K8S Roadmap.pdf por MaryamTavakkoli2
K8S Roadmap.pdfK8S Roadmap.pdf
K8S Roadmap.pdf
MaryamTavakkoli26 visualizações
zincalume water storage tank design.pdf por 3D LABS
zincalume water storage tank design.pdfzincalume water storage tank design.pdf
zincalume water storage tank design.pdf
3D LABS5 visualizações

IRJET- A Survey on File Storage and Retrieval using Blockchain Technology

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 763 A Survey on File Storage & Retrieval using Blockchain Technology Yash Ranka1, Jainam Bagrecha2, Kavish Gandhi3, Bhargav Sarvaria4, Prof. P. M. Chawan5 1,2,3,4U. G. Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India 5Associate Professor, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Data drives business around the globe and is a crucial aspect of the industry, which makes misuse of data equally dangerous. Data needs to be stored and transferred securely in order to maintain its confidentiality and integrity. Ethereum platform and technologies like swarm and whisper can make it possible to make a secured file storage and retrieval Decentralized Application (DApp). With the help of blockchain we propose an architecture which is much safer and easier for human use and it also solves the existing data storage and retrieval difficulties. Key Words: Blockchain, Swarm, Whisper, Ethereum, File Storage & Retrieval, P2P, IPFS, ENS 1. INTRODUCTION A blockchain is a chain of blocks, where each block contains a set of records (transactions) and the blocks are linked using cryptography[1]. Blocks hold batches of valid transactions. The transactions are hashed and encoded together into a Merkle tree. Every block includes the cryptographic hash of the previous block in the blockchain which links and creates a chain of blocks. The linked blocks form a chain. This iterative process confirms the integrity of the previous block, all the way back to the original genesis block. There are many applications of blockchain viz. Cryptocurrency, to secure Internet of Things, smart Contracts based transactions. One promising application of blockchain is File Transfer (Storage and Retrieval), which can be implemented using Peer-to-Peer network, Directed Acyclic Graph, Distributed Hash Table. 2. EXISTING TECHNOLOGIES 2.1 Distributed File System Traditional file storage on a single computer can be made more efficient using Distributed File System (DFS) [2]. Data which is stored on a single computer can be split and stored on multiple independent computer (nodes). DFS makes file storage reliable by allowing an user to retrieve data even when one or more nodes of the network goes down, the data is replicated on several nodes which increases availability of data, only authenticated users can store and retrieve data from DFS which makes it more secure and if the system runs out of space we can add more nodes to the system which makes DFS scalable. Fig -1: DFS Architecture A file is split into metadata and its content and stored on the system while uploading. When a user wishes to download the same file, he provides the Meta information and the file is retrieved from multiple nodes and provided to the user, this makes it appear as a single coherent system for the user. Thus for a user it appears to be stored as it were being stored on his own computer. Thus DFS is reliable, scalable, secure and more available but reduces the time of access for a file. DFS requires algorithms for synchronization, locking and maintaining data consistency. 2.2 InterPlanetary File System The InterPlanetary File System (IPFS) [3] is a peer-to- peer distributed file system that seeks to connect all computing devices with the same system of files. The file is divided into small blocks, the block is then hashed and distributed across the IPFS network. The redundant information is removed because the hashes are same for similar files. IPFS provides a high throughput content- addressed block storage model, with content-addressed hyperlinks. A generalized Merkle DAG (Directed Acyclic Graph), which can be used to build versioned file systems, blockchain, etc. A distributed hash table, an incentivized block exchange, and a self-certifying namespace is used by IPFS. There is no point of failure in IPFS and it is not necessary for the nodes to trust each other.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 764 Fig -2: Overview of IPFS 2.3 Secured File Storage and Retrieval using Blockchain One of the simplest way to store/retrieve files is to upload the file directly in the blocks of a blockchain. The complexity to verify a block is directly proportional to the size of the block and hence, larger file size will lead to bigger blocks which eventually makes the network inefficient with high latency. Though the file remains secured because of decentralized nature of blockchain, we cannot use it practically. 2.4 Storing the hashes of files on Blockchain One way to increase the efficiency of the file storage/retrieval is to use the hash of the file on the blockchain instead of using the blocks of file. It further provides auditable accountability of exactly what content has been authorized by whom for sharing and transfer through the file transfer guard. Continuous updating the ledger for every file transfer gives an immutable record of the entire life cycle of file. [4] Fig -3: Storing hashes on Blockchain 2.5 Filecoin Filecoin [5] is a kind of cryptocurrency where individual data providers are provided with incentives for their storage resources for storage of data pieces in the filecoin network. The incentives are given based on the amount of resources shared by the individual. Large number of such individuals form a global distributed network that runs filecoin protocol for file storage. The contributing users may opt out if they wish and yet the availability of the data is maintained by the distributed network. Filecoin makes use of two kinds of nodes: Storage nodes & Retrieval nodes. The file is first encrypted and then segments of the file are distributed to storage nodes. The retrieval nodes need to be near the storage nodes so that the transfer of data is fast. Only the authorized person can retrieve it using her private key. 2.6 Storj A peer-to-peer (P2P) cloud storage network which uses client-side encryption allows users to transfer and share data without depending on a third party storage provider. Data availability is a function of popularity, rather than utility which makes the P2P networks unfeasible for production storage systems. A solution in the form of a challenge-response verification system coupled with direct payments is used by Storj [6]. The file is encrypted and sharded. The shards are then distributed over a decentralized network of storage nodes which are known as “farmers”. The data owners are responsible for everything from pre-processing shards to collecting them, managing file encryption keys, etc. 2.7 Decentralized file transfer using Multichain framework [7] This is a file transfer system where the receiver first sends a request message to the sender with body as burn address and its public key via email or facebook. The RSA 2048 algorithm is used to generate public-key private- key pair. The file is encrypted using Advanced Encryption Standard (AES) and the public key. Then the encrypted file is sharded into fixed size blocks and then encoded using Hex encoding algorithm. The encoded parts and the RSA public key is then stored on a private blockchain. At the receiver’s end, the different blocks of file are decoded using hex decoding and merged together. The merged file is decrypted using the private key (of the respective public key) and AES to produce the desired file. [8] 3. PROPOSED SYSTEM Our primary aim lies in solving the problem of decentralized data storage, restricted data access and preventing data redundancy using peer-to-peer network storage clubbed with blockchain technology. The proposed
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 765 tech stack for the same includes Ethereum[9] swarm[10] for data storage, distribution and retrieval over the network, Ethereum whisper[11] protocol for sharing access rights by the file owner and various Asymmetric cryptographic algorithms along with data compression algorithms for maintaining data confidentiality and efficient data storage. The process is as follows: We take the file which user needs to upload and encrypt it using a new public-key private-key pair which will be held by the file owner. The Asymmetric encryption technique can help ensure the read-write access privileges. The user with just public key can have read access and the user with private key can have write access. Symmetric encryption algorithms can also be used as per the requirements. Once the file is encrypted it is further processed for data compression using a predefined data compression algorithm for efficient file storage. The compressed and encrypted file is then distributed over the swarm network and a unique hash for the file is calculated by the swarm protocol through which the file can later be accessed. Once the file is distributed over the swarm network, the generated hash for the file is then added to the blockchain as a transaction to preserve the file integrity. Thus we record the hash of the file by uploading it on the blockchain. Once the hash of the file is recorded on the blockchain, the file owner can then decide to grant access privilege to various other users using a messaging protocol- Ethereum Whisper. The owner needs to send the file hash along with the public key of the encrypted file by which the other user will be able to decrypt the encrypted file and hence access it and the entire message is encrypted using the receiver’s public key, making the message unintelligible for others. The receiver can then decrypt it using her private key. Thus even if someone tries to access the encrypted file by fetching the file hash from the public blockchain she won't be able to decrypt the file without the key. Thus, preserving the confidentiality. The problem of data redundancy has been automatically solved as we calculate a unique hash for each file. Thus, if we have two exactly same files both files will effectively produce the same hash thus solving the redundancy conflicts. To make the file system more human-readable we make use of the Ethereum Name Server (ENS). ENS works the same way as the Domain Name Server, it effectively stores the mapping of file hashes with the human readable filenames using distributed hash tables. Thus the hashes can be uniquely named as per the user convenience. Along with improving readability, ENS serves an important purpose. Generally the files stored this way are immutable and static in nature as a slight change in file content would effectively produce a new hash which will again increase the redundancy of the network. ENS solves this by efficient mapping from old files to new files, thus adding up more to the user convenience. ENS can also be used to maintain version control (like git). The above process considers file uploaded to be the one with limited access where the file owner shares the access permissions with the limited set of users. However, some files could be made available to general public where we do not need to specify the access permissions. Such files can be directly compressed and stored over the network. The users who wants the access of such public files can directly access it on the blockchain via some blockchain explorer that searches for file hashes on the blockchain. To make it more convenient for users such files can be explicitly marked as public with the help of ENS. Fig -4: Proposed System Architecture 4. CONCLUSION In this paper we proposed an enhanced mechanism for data storage and transfer. The whole mechanism uses cryptography, blockchain and ethereum technology to carry out the task as opposed to older mechanisms. The given mechanism will make the task more secure through cryptography, maintain data integrity through hash codes and data readily available with decentralized data storage on multiple hosts. REFERENCES [1] Blockchain-Wikipedia “https://en.wikipedia.org/wiki/Blockchain” [2] Pavel Bžoch - “Distributed File Systems”, “https://www.kiv.zcu.cz/site/documents/verejne/vy zkum/publikace/technicke-zpravy/2012/tr-2012- 02.pdf” [3] J. Benet, “IPFS - content addressed, versioned, P2P file system, (2014)”, “https://github.com/ipfs/ipfs/blob/master/papers/i pfs-cap2pfs/ipfs-p2p-file-system.pdf”
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 766 [4] Securing your cross-domain file transfers with blockchain, “https://www.ibm.com/blogs/blockchain/2018/05/s ecuring-your-cross-domain-file-transfers-with- blockchain/” [5] Filecoin: “A Cryptocurrency Operated File Storage Network” , “https://filecoin.io/filecoin-jul-2014.pdf” [6] Storj - A Peer-to-Peer Cloud Storage Network, “https://storj.io/storj.pdf” [7] Dr Gideon Greenspan, “MultiChain Private Blockchain”, “https://www.multichain.com/download/MultiChain- White-Paper.pdf” [8] SriBalaji, Vignesh Mohan, Soundarya, “Secure and Decentralized File Transfer Application using Blockchain” , “http://troindia.in/journal/ijcesr/vol4iss4/169- 175.pdf” [9] Vitalik Buterin, “Ethereum” , “https://ethereum.org/” [10] Ethereum Swarm, “https://swarm- guide.readthedocs.io/en/latest/introduction.html” [11] Ethereum whisper, “https://github.com/ethereum/wiki/wiki/Whisper- PoC-2-Protocol-Spec”