Suche senden
Hochladen
A Decentralized Application for Secure Private and Group Messaging in a Peer-to-Peer Environment
•
0 gefällt mir
•
17 views
IRJET Journal
Folgen
https://www.irjet.net/archives/V9/i2/IRJET-V9I2173.pdf
Weniger lesen
Mehr lesen
Ingenieurwesen
Melden
Teilen
Melden
Teilen
1 von 5
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
IRJET Journal
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
Amanda Brady
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
eSAT Publishing House
App for peer-to-peer file transfer
App for peer-to-peer file transfer
IRJET Journal
IRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication System
IRJET Journal
Essay On Ethernet
Essay On Ethernet
Jennifer Wood
Empfohlen
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
IRJET Journal
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
Amanda Brady
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
eSAT Publishing House
App for peer-to-peer file transfer
App for peer-to-peer file transfer
IRJET Journal
IRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication System
IRJET Journal
Essay On Ethernet
Essay On Ethernet
Jennifer Wood
DECENTRALISED CHAT APPLICATION
DECENTRALISED CHAT APPLICATION
IRJET Journal
An approach of software engineering through middleware
An approach of software engineering through middleware
IAEME Publication
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
IRJET Journal
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
IRJET Journal
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
Integrating Multimedia Services Over Software Defined Networking
Integrating Multimedia Services Over Software Defined Networking
IRJET Journal
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
IJCNCJournal
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Editor IJARCET
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Editor IJARCET
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
IRJET Journal
Security Testing of Network Protocol Implementation
Security Testing of Network Protocol Implementation
IRJET Journal
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc Networks
IRJET Journal
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET Journal
En35793797
En35793797
IJERA Editor
Authentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET Journal
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing Framework
IRJET Journal
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
Emily Jones
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
Journal For Research
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Weitere ähnliche Inhalte
Ähnlich wie A Decentralized Application for Secure Private and Group Messaging in a Peer-to-Peer Environment
DECENTRALISED CHAT APPLICATION
DECENTRALISED CHAT APPLICATION
IRJET Journal
An approach of software engineering through middleware
An approach of software engineering through middleware
IAEME Publication
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
IRJET Journal
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
IRJET Journal
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
Integrating Multimedia Services Over Software Defined Networking
Integrating Multimedia Services Over Software Defined Networking
IRJET Journal
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
IJCNCJournal
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Editor IJARCET
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Editor IJARCET
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
IRJET Journal
Security Testing of Network Protocol Implementation
Security Testing of Network Protocol Implementation
IRJET Journal
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc Networks
IRJET Journal
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET Journal
En35793797
En35793797
IJERA Editor
Authentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET Journal
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing Framework
IRJET Journal
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
Emily Jones
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
Journal For Research
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
Ähnlich wie A Decentralized Application for Secure Private and Group Messaging in a Peer-to-Peer Environment
(20)
DECENTRALISED CHAT APPLICATION
DECENTRALISED CHAT APPLICATION
An approach of software engineering through middleware
An approach of software engineering through middleware
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Integrating Multimedia Services Over Software Defined Networking
Integrating Multimedia Services Over Software Defined Networking
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Security Testing of Network Protocol Implementation
Security Testing of Network Protocol Implementation
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
En35793797
En35793797
Authentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing Framework
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
Mehr von IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Mehr von IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Kürzlich hochgeladen
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
simmis5
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
rknatarajan
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
result management system report for college project
result management system report for college project
Tonystark477637
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
University management System project report..pdf
University management System project report..pdf
Kamal Acharya
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
Kürzlich hochgeladen
(20)
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
result management system report for college project
result management system report for college project
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
University management System project report..pdf
University management System project report..pdf
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
A Decentralized Application for Secure Private and Group Messaging in a Peer-to-Peer Environment
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1008 A Decentralized Application for Secure Private and Group Messaging in a Peer-to-Peer Environment Badgujar Niranjan Sanjay1, Nair Aditya Sivaram2, Nair Sidharth Shankaranarayanan3, Vishwakarma Anant Jaiprakash4 and Dr. Sharvari Govilkar5 1,2,3,4 UG Student, Dept. of Computer Engineering, Pillai College of Engineering, New Panvel, Maharashtra, India 5 Head of the Dept., Dept. of Computer Engineering, Pillai College of Engineering, New Panvel, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Text messaging in a peer-to-peer environment is a concept that has been explored in the past using various technologies available at that time. The peer-to-peer model does not use a central database or computation server, thus eliminating single points of failure and increasing the availability and reliability of the network. It also provides opportunities to improve privacy and confidentiality since messages are not being routed through a server but are directly sent to the recipient. Previous work has focused on private one to one messaging between peers. Also, both peers needed to be online at the same time in order for the text message to be sent to the recipient. The proposed solution uses WebRTC, a modern peer to peer web communication technology as the underlying framework that facilitates secure communication. A variation of the Proof of Authority algorithm which is normally used in blockchain technology will be used to facilitate secure and reliable group messaging. A provisional node management system will be established so that messages can be transmitted across the network even if the recipient is offline at the time of transmission. The message transmission delay will be analyzed to ensure optimum performance. The queue size for unsent messages will be optimized so that it does not consume excess memory and storage. The provisional node management system will be tested to include hard limits such that bandwidth used is in the acceptable range. Key Words: Decentralized Application (dApp), Peer-to- Peer (P2P) Networks, WebRTC, Blockchain 1. INTRODUCTION Traditional chat applications are centralized i.e., all the data is stored or passed through a centralized server. Therefore, the major problem of this structure is, if the central server fails then the whole network collapses. For example, WhatsApp stores all the data on a central server, if in case that server is destroyed then there can be a loss of user data, or they can even leak the user information stored on the server. To overcome this, Decentralized Applications (dApps) are useful as the data is not stored on the central server and it also uses encryption to provide security. Due to these features, dApps are gaining popularity and are replacing centralized systems gradually. 2. LITERATURE SURVEY A. WebRTC: Shikhar Vashishth et al. [18] proposed a peer to peer (p2p) architecture to exchange messages asynchronously and facilitate new peer joins via existing peers in the network, thus reducing the dependency on the bootstrap server. The data channel of WebRTC was used to implement the browser compatible framework. It is a modified version of Chord (a distributed lookup protocol for p2p networks). Multiple STUN servers were used to balance load of ICE candidate requests on them. A TURN server was used to route traffic via the relay server. Further, periodically existing connections were checked for whether or not they were required and if not, destroyed. B. Etherium: Sourabh et al. [4] proposed an implementation of a decentralized chat application on the Ethereum blockchain network with ReactJS. Infura was also used which is a hosted Ethereum node cluster that lets users run the application without requiring to set up their own Ethereum node or wallet. Solidity was used which is an object-oriented, high-level language for implementing smart contracts (programs which govern the behavior of accounts within the Ethereum state). Also used Etherscan which allows to explore and search the Ethereum blockchain for transactions, addresses, tokens, prices and other activities. The AES-256 algorithm was used for encryption and decryption using CryptoJS. C. Interplanetary File System (IPFS): Faraz Khan et al. [5] proposed a Dchat that uses IPFS technology for decentralized anonymous and tamper-proof cross platform communication systems with user friendly interface. IPFS establishes a permanent distributed network by using content-based reference. It uses the hash of the file itself to be used as a reference. It also gives the users an advantage to be anonymous during the communication. The system uses IPFS hashes for security which are 32 bytes with SHA256 algorithm. LibP2P protocol was used to listen for incoming messages and
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1009 broadcasts and directly messaging to peers on the network. 2.1 SUMMARY OF RELATED WORK The summary of methods used in literature is given in Table 1. Table - 1: Summary of literature survey Literature WebRTC Etherium IPFS Shikhar Vashishth et al. 2016 [18] Yes No No Sourabh et al. 2020 [4] No Yes No Faraz Khan et al. 2020 [5] No No Yes 3. PROPOSED WORK The proposed system uses different technologies like WebRTC, Blockchain and various other concepts like encryption, consistency, availability and techniques to improve network stability to create a robust peer to peer decentralized application. 3.1 SYSTEM ARCHITECTURE The system architecture is given in Figure 1. Each block is described in this Section. Fig - 1: Proposed system architecture A. WebRTC module: The WebRTC module is the foundation of the entire architecture. It is responsible for connecting two peers over the internet as well as providing end to end encryption using HTTP over TLS (HTTPS) for any communication occurring between them. However, issues arise due to the limited address space of the IPv4 protocol. Each client has their own private IP address as well as a public IP address. WebRTC can only connect two peers if their public IPs are known. To solve this problem, STUN and TURN servers are used. A STUN server only comes into play during the connection phase. Once the two peers are connected, all data is transmitted directly between them. However, in some cases this is not possible e.g., when one of the peer's network is masqueraded by a symmetric NAT. A TURN server is used in this case to act as a proxy between the two peers. Since all data transmitted has to pass through the TURN server, it results in bandwidth costs for the TURN server. Hence, TURN servers are not freely available. Thus, the architecture requires us to implement a few TURN servers of our own. Although this makes our system seem like a more centralized architecture due to the reliance on TURN servers, when looked through the application's point of view, the TURN server is only responsible for connecting peers and facilitating communication between them. These servers do not store any application data, thus if one TURN server is down, it does not affect the application performance as long as another TURN server is running (if network latency is ignored and server is considered to be ideal). Thus, it can be concluded that the system architecture is still decentralized. B. Client / Application layer: There are various issues that can arise when a peer tries to send messages to another peer. The data may be received out of order, or corrupted, or lost. To deal with these issues certain mechanisms have to be implemented in the application. An internal message queue is used as a buffer to store messages that have yet to be successfully sent. For a message to be successfully sent, the sender must have an active internet connection, and the receiver must reply with an acknowledgement before a specified timeout expires. Once this happens, the message is removed from the queue. A message digest created using the SHA-256 algorithm is included in the sent data that can be used by the receiver to verify the integrity of the received message. A nonce is also included in the message, which ensures that the received message is not processed more than once by the receiver. A serial message identifier is also included in the message to ensure that the messages are not processed out of order. Explicit encryption does not have to be implemented unless necessary (for e.g., when using the provisionary data node layer) because end to end encryption is already provided by the WebRTC module. Heart Beating is done with the receivers to check if they are online in order to send them messages.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1010 C. Provisionary data node layer: The WebRTC connections can only work when both the peers are online at the time of data transmission. However, in a messaging system it is often the case that the receiver is offline at the time of message transmission. Although this can be solved with a message queue, an issue arises when the receiver comes back online but the sender is currently offline. Now the sender cannot send the message due to lack of internet connectivity. To solve this problem, the message can be sent to one or more intermediate or provisionary data nodes along with the recipient’s address. These data nodes can be picked from the sender’s contact list. The provisionary nodes would heartbeat the recipient to check their online status and forward the message to them once they become online. The nonce facility from the application layer can be used to deal with duplicate messages received from multiple such nodes. The RSA asymmetric encryption algorithm is used to encrypt messages sent to provisionary data nodes. For end-to-end encryption to be maintained, the public keys should already be exchanged between the sender and receiver through the WebRTC module. This facility raises minor privacy concerns however, as the sender and recipient addresses become known to a third party. Although they cannot decrypt the message that is being sent, they can come to know who is communicating to what, and when they are communicating. D. Blockchain module: Although the above modules are sufficient to facilitate communication, it becomes increasingly inefficient in the case of group messages. One sender would have to individually send messages to all group members, and maintain individual internal message queues for them and wait for their acknowledgements. This would further lead to congestion in the provisionary data node layer as one message is being duplicated multiple times. To solve this problem, private blockchains can be used. Every group would have their own private blockchain that would store records of messages in it’s blocks. The individual messages are digitally signed (using RSA) by the sender’s private key for verification. The messages are encrypted by a symmetric shared secret key using the AES-256 algorithm of which every group member has a copy. Proof of Authority is used as the consensus mechanism where the authority belongs to the group admins. Each block inside the blockchain is digitally signed (using RSA) using the group admin’s private key for verification. So in case a user comes online after a long time and wants the new blocks in the blockchain, they can ask the other online users in the group for the blocks even if an admin is not currently online and securely accept all blocks that have been digitally signed by any group admin. The system works better if a group has more than one admin. A group member who wants to send a message to the group would send it to the online group admins. Once an admin receives such a message, they add it to the current block that they are creating. Once a specified time interval has passed (3 to 5 seconds), no more messages will be added to that block. The admin is going to digitally sign the block using RSA and append it to his blockchain copy. The admin transmits the new block to all the group members. A time based nonce is used so that duplicate blocks received from other online admins do not cause problems. The drawback with this approach is that if an admin is not online, group messages are no longer able to be sent by any member. 4. REQUIREMENT ANALYSIS The implementation detail is given in this section. 4.1 ALGORITHMS Encryption: TLS over HTTP (HTTPS) uses RSA encryption, RSA encryption for sending messages to provisionary data nodes, AES-256 encryption for shared symmetric key encryption. Hashing: SHA-256 (for message digest & verifiable tokens) Encoding: Base64 encoding for invite link generation. Digital Signatures: RSA 4.2 HARDWARE The hardware specifications are given in Table 2. Table - 2: Hardware specifications Processor 2 GHz Intel HDD (Free Space) 2 GB RAM 8 GB 4.3 SOFTWARE The software specifications are given in Table 3. Table - 3: Software specifications Operating System Windows 10 or later Programming Language HTML, CSS, JavaScript, JSX
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1011 5. CONCLUSION Peer-to-peer messaging is more secure and reliable than a messaging application with a centralized server. Decentralized environments are a better option than a centralized one since the whole system will shutdown in case the central server goes down. Group messaging can be made efficient using blockchain concepts. ACKNOWLEDGEMENT It is our privilege to express our sincerest regards to our supervisor and Head of the Department Dr. Sharvari Govilkar for the valuable inputs, able guidance, encouragement, whole-hearted cooperation and constructive criticism throughout the duration of this work. We deeply express our sincere thanks to our Principal Dr. Sandeep M. Joshi for encouraging and allowing us to present this work. REFERENCES [1] Vikas Bhardwaj, Raja Ram Sharma, Akhilesh Kumar, “Chat Application using Blockchain Technology”, International Journal for Research in Engineering Application & Management (IJREAM), 04 Apr 2021. [2] George Suciu, Stefan Stefanescu, Cristian Beceanu, Marian Ceaparu, "WebRTC role in real-time communication and video conferencing", Global Internet of Things Summit (GIoTS), 2020. [3] Christos Aslanoglou, Michalis Konstantopoulos, Nikos Chondros, Mema Roussopoulos, “Take Back your Friends with DCS: A Decentralized Connectivity Service for private social communication apps”, IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 2020. [4] Sourabh, Deepanker Rawat, Karan Kapkoti, Sourabh Aggarwal, Anshul Khanna, “bChat: A Decentralized Chat Application”, International Research Journal of Engineering and Technology (IRJET), May 2020. [5] Faraz Khan, Niraj Mantri, Sagar Rajput, Dhananjay Dhakane, Puja Padiya, “Anonymous De- centralized Ephemeral Chat Application using Interplanetary File System”, ITM Web of Conferences 32, 02004, 2020. [6] Kaidong Wu, Yun Ma, Gang Huang, Xuanzhe Liu, “A First Look at Blockchain-based Decentralized Applications”, Key Lab of High-Confidence Software Technology, 3 Sept 2019. [7] Kahina Khacef, Guy Pujolle, “Secure Peer-to-Peer communication based on Blockchain”, 33rd International Conference on Advanced Information Networking and Applications (AINA- 2019), Matsue, Japan, Mar 2019 [8] Mohamed Abdulaziz, Davut Çulha, Ali Yazici, "A Decentralized Application for Secure Messaging in a Trustless Environment", International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism, Ankara, Turkey, 3-4 Dec 2018. [9] Nileshkumar Pandey, Doina Bein, "Web Application for Social Networking using RTC", IEEE Annual Computing and Communication Workshop and Conference (CCWC), 2018. [10]Wei Cai1, Zehua Wang, Jason B. Ernst, Zhen Hong, Chen Feng, Victor C.M. Leung, “Decentralized Applications: The Blockchain-Empowered Software System”, Natural Sciences and Engineering Research Council of Canada, 2018. [11]Abhishek P. Takale, Chaitanya V. Vaidya, Suresh S. Kolekar, “Decentralized Chat Application using Blockchain Technology”, International Journal for Research in Engineering Application & Management (IJREAM), 2018. [12]Yunhua He, Hong Li, Xiuzhen Cheng, Yan Liu, Chao Yang, Limin Sun, “A Blockchain based Truthful Incentive Mechanism for Distributed P2P Applications”, Natural Science Foundation of Shaanxi Province, 2018. [13]Hiroyoshi Ichikawa, Aki Kobayashi, “Collaborative Messaging Protocol with Multiple Intermediate Nodes”, 7th International Congress on Advanced Applied Informatics, 2018. [14]Nikita V. Ghodpage, Prof. R. V. Mante, “Privacy Preserving and Information Sharing in Decentralized Online Social Network”, 2nd International Conference on Inventive Communication and Computational Technologies (ICICCT 2018). [15]Peter Menegay, Jason Salyers, Griffin College, “Secure Communications Using Blockchain Technology”, Milcom 2018 Track 3 - Cyber Security and Trusted Computing, 2018. [16]Yongle Chen, Hui Li, Kejiao Li, Jiyang Zhang, “An improved P2P File System Scheme based on IPFS and Blockchain”, IEEE International Conference on Big Data, 2017. [17]Paulo Chainho, Steffen Drusedow, Ricardo Lopes Pereira, Ricardo Chaves, Nuno Santos, Kay Haensge, Anton Roman Portabales, “Decentralized Communications: Trustworthy Interoperability in Peer-To-Peer Networks”, 2017. [18]Shikhar Vashishth, Yash Sinha, K Hari Babu, “Addressing Challenges in Browser Based P2P Content Sharing Framework Using WebRTC”, IEEE 30th International Conference on Advanced Information Networking and Applications, 2016.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1012 [19]Cristian Constantin Spoiala, Alin Calinciuc, Corneliu Octavian Turcu, Constantin Filote, “Performance comparison of a WebRTC server on Docker versus Virtual Machine”, 13th International Conference on Development And Application Systems, Suceava, Romania, May 19- 21, 2016. BIOGRAPHIES Badgujar Niranjan Sanjay Nair Aditya Sivaram Nair Sidharth Shankaranarayanan Vishwakarma Anant Jaiprakash Dr. Sharvari Govilkar She is a professor and Head of Computer Engineering Dept. at PCE, New Panvel. She has more than 24 years of teaching experience in the field of Computer Engineering. She has published about 81 research papers in various national and international conferences and journals of repute with google citation count as 503.
Jetzt herunterladen