IRJET- A Survey on File Storage and Retrieval using Blockchain Technology

IRJET Journal
IRJET JournalFast Track Publications

https://www.irjet.net/archives/V5/i10/IRJET-V5I10142.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 763
A Survey on File Storage & Retrieval using Blockchain Technology
Yash Ranka1, Jainam Bagrecha2, Kavish Gandhi3, Bhargav Sarvaria4, Prof. P. M. Chawan5
1,2,3,4U. G. Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India
5Associate Professor, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Data drives business around the globe and is a
crucial aspect of the industry, which makes misuse of data
equally dangerous. Data needs to be stored and transferred
securely in order to maintain its confidentiality and
integrity. Ethereum platform and technologies like swarm
and whisper can make it possible to make a secured file
storage and retrieval Decentralized Application (DApp).
With the help of blockchain we propose an architecture
which is much safer and easier for human use and it also
solves the existing data storage and retrieval difficulties.
Key Words: Blockchain, Swarm, Whisper, Ethereum,
File Storage & Retrieval, P2P, IPFS, ENS
1. INTRODUCTION
A blockchain is a chain of blocks, where each block
contains a set of records (transactions) and the blocks are
linked using cryptography[1]. Blocks hold batches of valid
transactions. The transactions are hashed and encoded
together into a Merkle tree. Every block includes the
cryptographic hash of the previous block in the blockchain
which links and creates a chain of blocks. The linked
blocks form a chain. This iterative process confirms the
integrity of the previous block, all the way back to the
original genesis block.
There are many applications of blockchain viz.
Cryptocurrency, to secure Internet of Things, smart
Contracts based transactions. One promising application
of blockchain is File Transfer (Storage and Retrieval),
which can be implemented using Peer-to-Peer network,
Directed Acyclic Graph, Distributed Hash Table.
2. EXISTING TECHNOLOGIES
2.1 Distributed File System
Traditional file storage on a single computer can
be made more efficient using Distributed File System
(DFS) [2]. Data which is stored on a single
computer can be split and stored on multiple independent
computer (nodes). DFS makes file storage reliable by
allowing an user to retrieve data even when one or more
nodes of the network goes down, the data is replicated on
several nodes which increases availability of data, only
authenticated users can store and retrieve data from DFS
which makes it more secure and if the system runs out of
space we can add more nodes to the system which makes
DFS scalable.
Fig -1: DFS Architecture
A file is split into metadata and its content and
stored on the system while uploading. When a user wishes
to download the same file, he provides the Meta
information and the file is retrieved from multiple nodes
and provided to the user, this makes it appear as a single
coherent system for the user. Thus for a user it appears to
be stored as it were being stored on his own computer.
Thus DFS is reliable, scalable, secure and more available
but reduces the time of access for a file. DFS requires
algorithms for synchronization, locking and maintaining
data consistency.
2.2 InterPlanetary File System
The InterPlanetary File System (IPFS) [3] is a peer-to-
peer distributed file system that seeks to connect all
computing devices with the same system of files. The file is
divided into small blocks, the block is then hashed and
distributed across the IPFS network. The redundant
information is removed because the hashes are same for
similar files. IPFS provides a high throughput content-
addressed block storage model, with content-addressed
hyperlinks. A generalized Merkle DAG (Directed Acyclic
Graph), which can be used to build versioned file systems,
blockchain, etc. A distributed hash table, an incentivized
block exchange, and a self-certifying namespace is used by
IPFS. There is no point of failure in IPFS and it is not
necessary for the nodes to trust each other.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 764
Fig -2: Overview of IPFS
2.3 Secured File Storage and Retrieval using
Blockchain
One of the simplest way to store/retrieve files is
to upload the file directly in the blocks of a blockchain. The
complexity to verify a block is directly proportional to the
size of the block and hence, larger file size will lead to
bigger blocks which eventually makes the network
inefficient with high latency. Though the file remains
secured because of decentralized nature of blockchain, we
cannot use it practically.
2.4 Storing the hashes of files on Blockchain
One way to increase the efficiency of the file
storage/retrieval is to use the hash of the file on the
blockchain instead of using the blocks of file. It further
provides auditable accountability of exactly what content
has been authorized by whom for sharing and transfer
through the file transfer guard. Continuous updating the
ledger for every file transfer gives an immutable record of
the entire life cycle of file. [4]
Fig -3: Storing hashes on Blockchain
2.5 Filecoin
Filecoin [5] is a kind of cryptocurrency where
individual data providers are provided with incentives for
their storage resources for storage of data pieces in the
filecoin network. The incentives are given based on the
amount of resources shared by the individual. Large
number of such individuals form a global distributed
network that runs filecoin protocol for file storage. The
contributing users may opt out if they wish and yet the
availability of the data is maintained by the distributed
network.
Filecoin makes use of two kinds of nodes: Storage
nodes & Retrieval nodes. The file is first encrypted and
then segments of the file are distributed to storage nodes.
The retrieval nodes need to be near the storage nodes so
that the transfer of data is fast. Only the authorized person
can retrieve it using her private key.
2.6 Storj
A peer-to-peer (P2P) cloud storage network
which uses client-side encryption allows users to transfer
and share data without depending on a third party storage
provider. Data availability is a function of popularity,
rather than utility which makes the P2P networks
unfeasible for production storage systems. A solution in
the form of a challenge-response verification system
coupled with direct payments is used by Storj [6].
The file is encrypted and sharded. The shards are
then distributed over a decentralized network of storage
nodes which are known as “farmers”. The data owners are
responsible for everything from pre-processing shards to
collecting them, managing file encryption keys, etc.
2.7 Decentralized file transfer using Multichain
framework [7]
This is a file transfer system where the receiver
first sends a request message to the sender with body as
burn address and its public key via email or facebook. The
RSA 2048 algorithm is used to generate public-key
private- key pair. The file is encrypted using Advanced
Encryption Standard (AES) and the public key. Then the
encrypted file is sharded into fixed size blocks and then
encoded using Hex encoding algorithm. The encoded parts
and the RSA public key is then stored on a private
blockchain. At the receiver’s end, the different blocks of
file are decoded using hex decoding and merged together.
The merged file is decrypted using the private key (of the
respective public key) and AES to produce the desired file.
[8]
3. PROPOSED SYSTEM
Our primary aim lies in solving the problem of
decentralized data storage, restricted data access and
preventing data redundancy using peer-to-peer network
storage clubbed with blockchain technology. The proposed
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 765
tech stack for the same includes Ethereum[9] swarm[10]
for data storage, distribution and retrieval over the
network, Ethereum whisper[11] protocol for sharing
access rights by the file owner and various Asymmetric
cryptographic algorithms along with data compression
algorithms for maintaining data confidentiality and
efficient data storage. The process is as follows:
We take the file which user needs to upload and encrypt it
using a new public-key private-key pair which will be held
by the file owner. The Asymmetric encryption technique
can help ensure the read-write access privileges. The user
with just public key can have read access and the user
with private key can have write access. Symmetric
encryption algorithms can also be used as per the
requirements. Once the file is encrypted it is further
processed for data compression using a predefined data
compression algorithm for efficient file storage. The
compressed and encrypted file is then distributed over the
swarm network and a unique hash for the file is calculated
by the swarm protocol through which the file can later be
accessed.
Once the file is distributed over the swarm network, the
generated hash for the file is then added to the blockchain
as a transaction to preserve the file integrity. Thus we
record the hash of the file by uploading it on the
blockchain.
Once the hash of the file is recorded on the blockchain, the
file owner can then decide to grant access privilege to
various other users using a messaging protocol- Ethereum
Whisper. The owner needs to send the file hash along with
the public key of the encrypted file by which the other
user will be able to decrypt the encrypted file and hence
access it and the entire message is encrypted using the
receiver’s public key, making the message unintelligible
for others.
The receiver can then decrypt it using her private key.
Thus even if someone tries to access the encrypted file by
fetching the file hash from the public blockchain she won't
be able to decrypt the file without the key. Thus,
preserving the confidentiality.
The problem of data redundancy has been automatically
solved as we calculate a unique hash for each file. Thus, if
we have two exactly same files both files will effectively
produce the same hash thus solving the redundancy
conflicts.
To make the file system more human-readable we make
use of the Ethereum Name Server (ENS). ENS works the
same way as the Domain Name Server, it effectively stores
the mapping of file hashes with the human readable
filenames using distributed hash tables. Thus the hashes
can be uniquely named as per the user convenience. Along
with improving readability, ENS serves an important
purpose. Generally the files stored this way are immutable
and static in nature as a slight change in file content would
effectively produce a new hash which will again increase
the redundancy of the network. ENS solves this by efficient
mapping from old files to new files, thus adding up more
to the user convenience. ENS can also be used to maintain
version control (like git).
The above process considers file uploaded to be the one
with limited access where the file owner shares the access
permissions with the limited set of users. However, some
files could be made available to general public where we
do not need to specify the access permissions. Such files
can be directly compressed and stored over the network.
The users who wants the access of such public files can
directly access it on the blockchain via some blockchain
explorer that searches for file hashes on the blockchain. To
make it more convenient for users such files can be
explicitly marked as public with the help of ENS.
Fig -4: Proposed System Architecture
4. CONCLUSION
In this paper we proposed an enhanced mechanism for
data storage and transfer. The whole mechanism uses
cryptography, blockchain and ethereum technology to
carry out the task as opposed to older mechanisms. The
given mechanism will make the task more secure through
cryptography, maintain data integrity through hash codes
and data readily available with decentralized data storage
on multiple hosts.
REFERENCES
[1] Blockchain-Wikipedia
“https://en.wikipedia.org/wiki/Blockchain”
[2] Pavel Bžoch - “Distributed File Systems”,
“https://www.kiv.zcu.cz/site/documents/verejne/vy
zkum/publikace/technicke-zpravy/2012/tr-2012-
02.pdf”
[3] J. Benet, “IPFS - content addressed, versioned, P2P file
system, (2014)”,
“https://github.com/ipfs/ipfs/blob/master/papers/i
pfs-cap2pfs/ipfs-p2p-file-system.pdf”
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 766
[4] Securing your cross-domain file transfers with
blockchain,
“https://www.ibm.com/blogs/blockchain/2018/05/s
ecuring-your-cross-domain-file-transfers-with-
blockchain/”
[5] Filecoin: “A Cryptocurrency Operated File Storage
Network” , “https://filecoin.io/filecoin-jul-2014.pdf”
[6] Storj - A Peer-to-Peer Cloud Storage Network,
“https://storj.io/storj.pdf”
[7] Dr Gideon Greenspan, “MultiChain Private
Blockchain”,
“https://www.multichain.com/download/MultiChain-
White-Paper.pdf”
[8] SriBalaji, Vignesh Mohan, Soundarya, “Secure and
Decentralized File Transfer Application using
Blockchain” ,
“http://troindia.in/journal/ijcesr/vol4iss4/169-
175.pdf”
[9] Vitalik Buterin, “Ethereum” , “https://ethereum.org/”
[10] Ethereum Swarm, “https://swarm-
guide.readthedocs.io/en/latest/introduction.html”
[11] Ethereum whisper,
“https://github.com/ethereum/wiki/wiki/Whisper-
PoC-2-Protocol-Spec”

Recomendados

IRJET - Healthcare Data Storage using Blockchain von
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET Journal
53 views5 Folien
IRJET- Blockchain based Data Sharing Framework von
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
67 views3 Folien
A decentralized consensus application using blockchain ecosystem von
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem IJECEIAES
42 views13 Folien
P14 towards using blockchain technology for e health von
P14 towards using blockchain technology for e healthP14 towards using blockchain technology for e health
P14 towards using blockchain technology for e healthdevid8
43 views4 Folien
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) von
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
32 views12 Folien
Ieeepro techno solutions 2011 ieee java project -secure role based data von
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
174 views6 Folien

Más contenido relacionado

Was ist angesagt?

Dynamic and public auditing with fair arbitration for cloud data von
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataShakas Technologies
105 views2 Folien
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID von
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRIDINFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRIDIJNSA Journal
7 views16 Folien
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP... von
BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP...AIRCC Publishing Corporation
114 views18 Folien
Cloud Data Security and Secure Data Sharing Methods von
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsIJCSIS Research Publications
52 views9 Folien
Oruta project report von
Oruta project reportOruta project report
Oruta project reportManasa Chowdary
4.7K views47 Folien
Global Digital Sukuk (GDS) - A basic framework von
Global Digital Sukuk (GDS) - A basic frameworkGlobal Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic frameworkTariqullah Khan
1.4K views45 Folien

Was ist angesagt?(18)

Dynamic and public auditing with fair arbitration for cloud data von Shakas Technologies
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud data
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID von IJNSA Journal
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRIDINFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
IJNSA Journal7 views
Global Digital Sukuk (GDS) - A basic framework von Tariqullah Khan
Global Digital Sukuk (GDS) - A basic frameworkGlobal Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic framework
Tariqullah Khan1.4K views
A Novel privacy preserving public auditing for shared data in cloud von JAVVAJI VENKATA RAO
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO1.2K views
Pistoia Alliance Blockchain Webinar 20 June 2017 von Pistoia Alliance
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance1.5K views
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide von Galen Growth
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
Galen Growth2.9K views
Aplicación de la tecnología blockchain en sistemas energéticos sostenibles von José Luis Casal
Aplicación de la tecnología blockchain en sistemas energéticos sosteniblesAplicación de la tecnología blockchain en sistemas energéticos sostenibles
Aplicación de la tecnología blockchain en sistemas energéticos sostenibles
José Luis Casal362 views
International Journal of Engineering Research and Development von IJERD Editor
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor251 views
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ... von Chad Lawler
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Chad Lawler4.3K views
Secure Data Sharing In an Untrusted Cloud von IJERA Editor
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor294 views
Keynote Session : Emerging Healthcare Tech & Future Security Impact von Priyanka Aash
Keynote Session : Emerging Healthcare Tech & Future Security ImpactKeynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Priyanka Aash857 views
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou... von IOSR Journals
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals628 views

Similar a IRJET- A Survey on File Storage and Retrieval using Blockchain Technology

WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch... von
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...CyberLab
36 views5 Folien
SECRY - Secure file storage on cloud using hybrid cryptography von
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
2.1K views34 Folien
IRJET- Distributed Decentralized Data Storage using IPFS von
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET Journal
33 views4 Folien
Paper id 712019116 von
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
26 views4 Folien
IRJET - A Secure Access Policies based on Data Deduplication System von
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
8 views3 Folien
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing von
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
359 views7 Folien

Similar a IRJET- A Survey on File Storage and Retrieval using Blockchain Technology(20)

WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch... von CyberLab
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
CyberLab36 views
SECRY - Secure file storage on cloud using hybrid cryptography von ALIN BABU
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU2.1K views
IRJET- Distributed Decentralized Data Storage using IPFS von IRJET Journal
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET Journal33 views
Paper id 712019116 von IJRAT
Paper id 712019116Paper id 712019116
Paper id 712019116
IJRAT26 views
IRJET - A Secure Access Policies based on Data Deduplication System von IRJET Journal
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal8 views
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing von IJERA Editor
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor359 views
IRJET- A Secure File Storage & Retrieval using Blockchain Technology von IRJET Journal
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET Journal23 views
Secured Authorized Deduplication Based Hybrid Cloud von theijes
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
theijes539 views
E031102034039 von theijes
E031102034039E031102034039
E031102034039
theijes304 views
Providing Secure Cloud for College Campus von vivatechijri
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
vivatechijri16 views
Authenticated Key Exchange Protocols for Parallel Network File Systems von 1crore projects
Authenticated Key Exchange Protocols for Parallel Network File SystemsAuthenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File Systems
1crore projects82 views
Authenticated key exchange protocols for parallel network file systems von Pvrtechnologies Nellore
Authenticated key exchange protocols for parallel network file systemsAuthenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systems
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN von IRJET Journal
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
IRJET Journal7 views
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC von IRJET Journal
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal36 views
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC von IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal25 views
IRJET- Adaptable Wildcard Searchable Encryption System von IRJET Journal
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET Journal11 views
IRJET-Using Downtoken Secure Group Data Sharing on Cloud von IRJET Journal
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal22 views
IJSRED-V2I2P10 von IJSRED
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
IJSRED12 views
Implementation of De-Duplication Algorithm von IRJET Journal
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal31 views
Multi-part Dynamic Key Generation For Secure Data Encryption von CSCJournals
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals430 views

Más de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL von
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
20 views7 Folien
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 views7 Folien
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
7 views5 Folien
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 views11 Folien
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 views6 Folien
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 views5 Folien

Más de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL von IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal20 views
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 views
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal7 views
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 views
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 views
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 views
Heart Failure Prediction using Different Machine Learning Techniques von IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 views
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel von IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 views
Metro Development and Pedestrian Concerns von IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 views
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... von IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 views
Data Analytics and Artificial Intelligence in Healthcare Industry von IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 views
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... von IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal44 views
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... von IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal10 views
Development of Effective Tomato Package for Post-Harvest Preservation von IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 views
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” von IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 views
Understanding the Nature of Consciousness with AI von IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 views
Augmented Reality App for Location based Exploration at JNTUK Kakinada von IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 views
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... von IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 views
Enhancing Real Time Communication and Efficiency With Websocket von IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal4 views
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... von IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 views

Último

K8S Roadmap.pdf von
K8S Roadmap.pdfK8S Roadmap.pdf
K8S Roadmap.pdfMaryamTavakkoli2
6 views1 Folie
Investor Presentation von
Investor PresentationInvestor Presentation
Investor Presentationeser sevinç
23 views26 Folien
Plumbing von
PlumbingPlumbing
PlumbingIwiss Tools Co.,Ltd
15 views14 Folien
SEMI CONDUCTORS von
SEMI CONDUCTORSSEMI CONDUCTORS
SEMI CONDUCTORSpavaniaalla2005
20 views8 Folien
CHEMICAL KINETICS.pdf von
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdfAguedaGutirrez
8 views337 Folien
Machine Element II Course outline.pdf von
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdfodatadese1
8 views2 Folien

Último(20)

Machine Element II Course outline.pdf von odatadese1
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdf
odatadese18 views
_MAKRIADI-FOTEINI_diploma thesis.pptx von fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi7 views
fakenews_DBDA_Mar23.pptx von deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra812 views
Informed search algorithms.pptx von Dr.Shweta
Informed search algorithms.pptxInformed search algorithms.pptx
Informed search algorithms.pptx
Dr.Shweta16 views
Multi-objective distributed generation integration in radial distribution sy... von IJECEIAES
Multi-objective distributed generation integration in radial  distribution sy...Multi-objective distributed generation integration in radial  distribution sy...
Multi-objective distributed generation integration in radial distribution sy...
IJECEIAES15 views
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,... von AakashShakya12
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
AakashShakya1263 views
Effect of deep chemical mixing columns on properties of surrounding soft clay... von AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli6 views
NEW SUPPLIERS SUPPLIES (copie).pdf von georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou14 views

IRJET- A Survey on File Storage and Retrieval using Blockchain Technology

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 763 A Survey on File Storage & Retrieval using Blockchain Technology Yash Ranka1, Jainam Bagrecha2, Kavish Gandhi3, Bhargav Sarvaria4, Prof. P. M. Chawan5 1,2,3,4U. G. Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India 5Associate Professor, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Data drives business around the globe and is a crucial aspect of the industry, which makes misuse of data equally dangerous. Data needs to be stored and transferred securely in order to maintain its confidentiality and integrity. Ethereum platform and technologies like swarm and whisper can make it possible to make a secured file storage and retrieval Decentralized Application (DApp). With the help of blockchain we propose an architecture which is much safer and easier for human use and it also solves the existing data storage and retrieval difficulties. Key Words: Blockchain, Swarm, Whisper, Ethereum, File Storage & Retrieval, P2P, IPFS, ENS 1. INTRODUCTION A blockchain is a chain of blocks, where each block contains a set of records (transactions) and the blocks are linked using cryptography[1]. Blocks hold batches of valid transactions. The transactions are hashed and encoded together into a Merkle tree. Every block includes the cryptographic hash of the previous block in the blockchain which links and creates a chain of blocks. The linked blocks form a chain. This iterative process confirms the integrity of the previous block, all the way back to the original genesis block. There are many applications of blockchain viz. Cryptocurrency, to secure Internet of Things, smart Contracts based transactions. One promising application of blockchain is File Transfer (Storage and Retrieval), which can be implemented using Peer-to-Peer network, Directed Acyclic Graph, Distributed Hash Table. 2. EXISTING TECHNOLOGIES 2.1 Distributed File System Traditional file storage on a single computer can be made more efficient using Distributed File System (DFS) [2]. Data which is stored on a single computer can be split and stored on multiple independent computer (nodes). DFS makes file storage reliable by allowing an user to retrieve data even when one or more nodes of the network goes down, the data is replicated on several nodes which increases availability of data, only authenticated users can store and retrieve data from DFS which makes it more secure and if the system runs out of space we can add more nodes to the system which makes DFS scalable. Fig -1: DFS Architecture A file is split into metadata and its content and stored on the system while uploading. When a user wishes to download the same file, he provides the Meta information and the file is retrieved from multiple nodes and provided to the user, this makes it appear as a single coherent system for the user. Thus for a user it appears to be stored as it were being stored on his own computer. Thus DFS is reliable, scalable, secure and more available but reduces the time of access for a file. DFS requires algorithms for synchronization, locking and maintaining data consistency. 2.2 InterPlanetary File System The InterPlanetary File System (IPFS) [3] is a peer-to- peer distributed file system that seeks to connect all computing devices with the same system of files. The file is divided into small blocks, the block is then hashed and distributed across the IPFS network. The redundant information is removed because the hashes are same for similar files. IPFS provides a high throughput content- addressed block storage model, with content-addressed hyperlinks. A generalized Merkle DAG (Directed Acyclic Graph), which can be used to build versioned file systems, blockchain, etc. A distributed hash table, an incentivized block exchange, and a self-certifying namespace is used by IPFS. There is no point of failure in IPFS and it is not necessary for the nodes to trust each other.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 764 Fig -2: Overview of IPFS 2.3 Secured File Storage and Retrieval using Blockchain One of the simplest way to store/retrieve files is to upload the file directly in the blocks of a blockchain. The complexity to verify a block is directly proportional to the size of the block and hence, larger file size will lead to bigger blocks which eventually makes the network inefficient with high latency. Though the file remains secured because of decentralized nature of blockchain, we cannot use it practically. 2.4 Storing the hashes of files on Blockchain One way to increase the efficiency of the file storage/retrieval is to use the hash of the file on the blockchain instead of using the blocks of file. It further provides auditable accountability of exactly what content has been authorized by whom for sharing and transfer through the file transfer guard. Continuous updating the ledger for every file transfer gives an immutable record of the entire life cycle of file. [4] Fig -3: Storing hashes on Blockchain 2.5 Filecoin Filecoin [5] is a kind of cryptocurrency where individual data providers are provided with incentives for their storage resources for storage of data pieces in the filecoin network. The incentives are given based on the amount of resources shared by the individual. Large number of such individuals form a global distributed network that runs filecoin protocol for file storage. The contributing users may opt out if they wish and yet the availability of the data is maintained by the distributed network. Filecoin makes use of two kinds of nodes: Storage nodes & Retrieval nodes. The file is first encrypted and then segments of the file are distributed to storage nodes. The retrieval nodes need to be near the storage nodes so that the transfer of data is fast. Only the authorized person can retrieve it using her private key. 2.6 Storj A peer-to-peer (P2P) cloud storage network which uses client-side encryption allows users to transfer and share data without depending on a third party storage provider. Data availability is a function of popularity, rather than utility which makes the P2P networks unfeasible for production storage systems. A solution in the form of a challenge-response verification system coupled with direct payments is used by Storj [6]. The file is encrypted and sharded. The shards are then distributed over a decentralized network of storage nodes which are known as “farmers”. The data owners are responsible for everything from pre-processing shards to collecting them, managing file encryption keys, etc. 2.7 Decentralized file transfer using Multichain framework [7] This is a file transfer system where the receiver first sends a request message to the sender with body as burn address and its public key via email or facebook. The RSA 2048 algorithm is used to generate public-key private- key pair. The file is encrypted using Advanced Encryption Standard (AES) and the public key. Then the encrypted file is sharded into fixed size blocks and then encoded using Hex encoding algorithm. The encoded parts and the RSA public key is then stored on a private blockchain. At the receiver’s end, the different blocks of file are decoded using hex decoding and merged together. The merged file is decrypted using the private key (of the respective public key) and AES to produce the desired file. [8] 3. PROPOSED SYSTEM Our primary aim lies in solving the problem of decentralized data storage, restricted data access and preventing data redundancy using peer-to-peer network storage clubbed with blockchain technology. The proposed
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 765 tech stack for the same includes Ethereum[9] swarm[10] for data storage, distribution and retrieval over the network, Ethereum whisper[11] protocol for sharing access rights by the file owner and various Asymmetric cryptographic algorithms along with data compression algorithms for maintaining data confidentiality and efficient data storage. The process is as follows: We take the file which user needs to upload and encrypt it using a new public-key private-key pair which will be held by the file owner. The Asymmetric encryption technique can help ensure the read-write access privileges. The user with just public key can have read access and the user with private key can have write access. Symmetric encryption algorithms can also be used as per the requirements. Once the file is encrypted it is further processed for data compression using a predefined data compression algorithm for efficient file storage. The compressed and encrypted file is then distributed over the swarm network and a unique hash for the file is calculated by the swarm protocol through which the file can later be accessed. Once the file is distributed over the swarm network, the generated hash for the file is then added to the blockchain as a transaction to preserve the file integrity. Thus we record the hash of the file by uploading it on the blockchain. Once the hash of the file is recorded on the blockchain, the file owner can then decide to grant access privilege to various other users using a messaging protocol- Ethereum Whisper. The owner needs to send the file hash along with the public key of the encrypted file by which the other user will be able to decrypt the encrypted file and hence access it and the entire message is encrypted using the receiver’s public key, making the message unintelligible for others. The receiver can then decrypt it using her private key. Thus even if someone tries to access the encrypted file by fetching the file hash from the public blockchain she won't be able to decrypt the file without the key. Thus, preserving the confidentiality. The problem of data redundancy has been automatically solved as we calculate a unique hash for each file. Thus, if we have two exactly same files both files will effectively produce the same hash thus solving the redundancy conflicts. To make the file system more human-readable we make use of the Ethereum Name Server (ENS). ENS works the same way as the Domain Name Server, it effectively stores the mapping of file hashes with the human readable filenames using distributed hash tables. Thus the hashes can be uniquely named as per the user convenience. Along with improving readability, ENS serves an important purpose. Generally the files stored this way are immutable and static in nature as a slight change in file content would effectively produce a new hash which will again increase the redundancy of the network. ENS solves this by efficient mapping from old files to new files, thus adding up more to the user convenience. ENS can also be used to maintain version control (like git). The above process considers file uploaded to be the one with limited access where the file owner shares the access permissions with the limited set of users. However, some files could be made available to general public where we do not need to specify the access permissions. Such files can be directly compressed and stored over the network. The users who wants the access of such public files can directly access it on the blockchain via some blockchain explorer that searches for file hashes on the blockchain. To make it more convenient for users such files can be explicitly marked as public with the help of ENS. Fig -4: Proposed System Architecture 4. CONCLUSION In this paper we proposed an enhanced mechanism for data storage and transfer. The whole mechanism uses cryptography, blockchain and ethereum technology to carry out the task as opposed to older mechanisms. The given mechanism will make the task more secure through cryptography, maintain data integrity through hash codes and data readily available with decentralized data storage on multiple hosts. REFERENCES [1] Blockchain-Wikipedia “https://en.wikipedia.org/wiki/Blockchain” [2] Pavel Bžoch - “Distributed File Systems”, “https://www.kiv.zcu.cz/site/documents/verejne/vy zkum/publikace/technicke-zpravy/2012/tr-2012- 02.pdf” [3] J. Benet, “IPFS - content addressed, versioned, P2P file system, (2014)”, “https://github.com/ipfs/ipfs/blob/master/papers/i pfs-cap2pfs/ipfs-p2p-file-system.pdf”
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 766 [4] Securing your cross-domain file transfers with blockchain, “https://www.ibm.com/blogs/blockchain/2018/05/s ecuring-your-cross-domain-file-transfers-with- blockchain/” [5] Filecoin: “A Cryptocurrency Operated File Storage Network” , “https://filecoin.io/filecoin-jul-2014.pdf” [6] Storj - A Peer-to-Peer Cloud Storage Network, “https://storj.io/storj.pdf” [7] Dr Gideon Greenspan, “MultiChain Private Blockchain”, “https://www.multichain.com/download/MultiChain- White-Paper.pdf” [8] SriBalaji, Vignesh Mohan, Soundarya, “Secure and Decentralized File Transfer Application using Blockchain” , “http://troindia.in/journal/ijcesr/vol4iss4/169- 175.pdf” [9] Vitalik Buterin, “Ethereum” , “https://ethereum.org/” [10] Ethereum Swarm, “https://swarm- guide.readthedocs.io/en/latest/introduction.html” [11] Ethereum whisper, “https://github.com/ethereum/wiki/wiki/Whisper- PoC-2-Protocol-Spec”