SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 203
Securing Data in Distributed System using Blockchain and AI
Abhijeet Sontakke1, Aditya Gaikwad1, Neha Ovhal1, Kalyani Nagawade1, Sarita Patil2
1Student, Dept. of Computer Engineering, G. H. Raisoni COE & Management Pune, Maharashtra, India
2Professor, Dept. of Computer Engineering, G. H. Raisoni COE & Management Pune, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In hospitals in developing countries when an
individual with symptoms corresponding to a deadly disease
such as hepatitis, influenza, cancer, etc. is encountered, the
staff can either suggest an expert in that particular field or if
the disease hasn’t been identified, the staff could recommend
the patient to a general physician. Most of the time, the
general physician will subject the patient through a series of
trial and error to identify and eliminate the improbable
disease. This process is a very painful ordeal experienced by
the patient as the doctors try to determine the cause of the
symptoms, one disease medication at a time. This problemhas
largely been overcome by developed countries by a Data
Vendor. This paper analyses all the past workonprovidingthe
security for the data in the network where especially data
brokers are being involved. The best way to provide this is,
introducing of block chains and Artificial intelligence. This
research article analyses past methodologies and evaluate
them to introduce a newer version of maintaining data
integrity in network.
Key Words: Block chain, Artificial intelligence,Intrusion
detection system, Network threats, Access control
mechanism.
1. INTRODUCTION
Data and its security have been paramount since the day
human beings started accumulating it. Since the earliest
stone age era, humans have evolved to process the
information around us byvarioussensoryinputsreceivedby
different sensory organs. This has led to the development of
various arts such as paintings, music, textures, etc. This
thirst for the unknown has made us go into space and
advance a significant amount in technology over the years.
All of this data created needs to be stored somewherewhere
it cannot be modified or destroyed, as these are valuable
lessons learned throughout the lifetime of an individual or a
group which can help the species to grow forward. This has
led to the humans collecting and storing a lot of data on
various different topics and was accelerated due to the
invention of the printing press at which allowed the
information to take the form of books that could retain it for
a very long time.
Another revolution in the storage, retrieval, and access of
data happened when the internet was conceived. Electronic
storage was already invented by then but the internetadded
another element to this as the internet allowed the various
computers and computing devices all over the world to
connect to each other and share information. This was
designed to facilitate the exchange of information between
the researchers over a large distanceto eliminatetheneedto
be physically present at the location to utilize the resources.
Due to its initial success, the internet was opened to the
public and various different services that used the internet
as the backbone started flourishing.
The internet started growing exponentially with a lot more
users and machines being connected every day. People
started using the platform more and more and this led to an
increased number of users interacting online. With social
media and educational portals, the internet grew to
astronomical sizes and the data being produced every day
grew to a massive size. With the growthofdata andtheusers
online, it created a nourishing environment for people to
learn and share valuable skills and information all over the
world. The major drawback of open access to everyone on
the internet was that there are also some individuals with
malicious intent that can ruin the experience of another
person purely for personal gain.
A lot of users on the internet have valuable and sensitive
personal information that is stored in the databases and
various organizations to have their internal data that is
confidentially stored electronically. This increases the
likelihood of an attacker gaining access to this information
that would lead to compromised security as well as a huge
loss for the organization. This is problematic as there are no
alternatives for storage and the convenience offered by the
database. Therefore, there is an utmost need to provide a
mechanism for controlling the access to the sensitive data
through which only the trusted employees and other
members of the organization can access the data, based on
their hierarchy.
This brings forth the blockchain paradigm, being proposed
by a group of scientists in the late 1990s the technique was
initially developed for use in a digital notary as it is an
excellent choice for tamper-proofing a document. The
paradigm was largely unused until it was utilized for the
creation of the world’s first cryptocurrency.Duetoitsstrong
tamper-proof and distributed nature, it is an apt choice for a
cryptocurrency. The blockchain is one of the most secure
applications and is capable of providingveryhighsecurityto
the data stored and can, therefore, be utilized in an
application to safeguard the data and provide an efficient as
well as an effective access control mechanism for the
sensitive data of an organization.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 204
This paper dedicates section 2 for analysis of past work as
literature survey and section 3 concludes the paper with
feasible statement of the literature study.
2. LITERATURE SURVEY
This section of the literature survey eventually revealssome
facts based on thoughtful analysis of many authors work as
follows.
S. Yu states that due to rapid pace of technology and the
introduction of Internet of Things or IoT, there has been a
swift increase in the number of intelligent devices being
connected to the internet. These devices are capable of
generating a large amount of data due to the fact that it is
connected and is interacting with the internet. A large
number of devices generate equally large amount of data
which cannot be processedefficiently.Therefore,theauthors
propose an effective technique based on blockchain thatcan
provide a low-cost alternative to create economic value for
the IoT data generated. A major drawback of this
methodology is that it has the potential to be misused by
uploading large amounts of malicious data.
R. Wang elaborates on the foundation of network security
construction which is the PKI or The Public Key
Infrastructure. The researchers also commented on the
reliability and the robust security offered by the blockchain
platform. Therefore, the authors amalgamated both the
methodologies to strengthen the Public Key Infrastructure
by a permissioned blockchain that converts the PKI into a
privacy-aware PKI. This is crucial as the implementationofa
permissioned blockchain also improves the efficiency of the
configuration and certificate application. The major
drawback is that this technique has been a very specialized
approach towards the blockchain paradigm.
C. Ehmke explains that the innovative paradigm of
Blockchain has been popular and has seen extensive usage
recently. The blockchain was utilized for financial
applications and that is how it gained immense popularity
and limelight. The blockchain was readily picked up by a
plethora of researchers and implemented in various
different fields, which has greatly helped in bringing
increased security to numerous applications. Due to the fact
that the blockchain paradigm requires a user of the
blockchain to download the wholechaintogainanoverview.
To ameliorate this effect, the authors have implemented a
scalable and lightweight blockchain protocol.
R. Wang introduces the video surveillance system as an
irreplaceable tool that can be used to efficiently manage and
survey big cities. When a video surveillance system is
installed it can easily transmit environment information
remotely, this is highly useful as the person does not need to
travel long distances and physically be present in the
location for the management. Due to a large-scaleincrease in
the monitoring standards with the inclusion of IoT and real-
time monitoring, it is susceptible to attacks. Therefore, the
authors developed a system for video surveillance based on
permissioned blockchains and Convolutional Neural
Networks for a seamless and secure system. A Major
drawback in the system is that large scale testing of the
System has not been performed and will be done in the
upcoming researches.
J. Lou states that there has been a lack of a key management
feature in the Named Data Networking, which is utilized to
name each and every object by the producer and also
digitally sign it. There are some disadvantages of the
conventional approach such as lack of trust between the
sites as well as the high chances of failure observed in the
centralized architecture if the main nodefails.Therefore, the
authors in this paper propose an efficient key management
scheme based on blockchainfortheNamedData Networking
paradigm. The blockchain increases the trust between the
sites as well as the decentralizedarchitectureishighlyuseful
in overcoming failure.Thedrawback oftheproposedscheme
is that it has not been evaluated extensively for its feasibility
in reducing the NDN cache pollution.
S. Wang explains that therehasbeena veryfastdevelopment
of cryptocurrency in recent years, which has led to detailed
scrutiny of the paradigm. This has uncovered a lot of
irregularities in the paradigm such as the Smart Contracts
that have been the cause of “The DOA Attack” which has
resulted in a huge loss. Therefore, the authors have
presented a comprehensive and systematic review of the
smart contracts in the blockchain paradigm. The authors
have presented a six-layer architecture for smart contracts
for increasing the security of the system. The authors have
not implemented a formal verification which can provide
confidence.
Y. Xu introduces the concept of decentralized storage that is
based on the blockchain framework.Theblockchainisoneof
the most innovative concepts that can be used to design a
highly secure decentralized framework. The authors have
proposed section blockchain protocol, which aims to
eliminate the storage problem that is encountered incertain
devices. The proposed methodology is highly resilient to
failure due to the decentralizedarchitecture,aswell as,ithas
the ability to withstand heavy loads and optimization
gracefully due to the implementation of the Blockchain
paradigm.
M. Marchesi in his keynote speech details the rapid
development and ongoing researches going on in the field of
blockchain. This is due to the increased attention to this
paradigm and increased demand in this sector. The author
indicates that this increased pressure on a nascent
framework has led to an increase in security lapses that are
evident in the various different incidents on the Ethereum
platform and the cryptocurrency exchanges.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 205
That being said the speaker also highlighted the immense
opportunities that can be utilized by using the blockchain
paradigm such as the Blockchain tokens that can be used to
implement a reward and penalty-based scheme for
developers.
A. Maksutov elaborates on the paradigm of Blockchain and
its uses. The authors have proposed an innovative concept
for the detection and identification of various money
laundering schemes that use the blockchain framework for
their nefarious activities. The proposed methodology has
been used to deanonymizing the transactions and tracking
the coin join transactions, which allows the authors to
evaluate user participation. All of this information is used to
determine if the transactions are being fraudulentorused to
launder money.
F. Wessling states that the addition of blockchain to existing
platforms is problematic as it is different from building the
applications from scratch by incorporating the Blockchain
into the application. The authors determine the amount of
blockchain required for various different implementations,
this is done by analyzing the attributes of blockchainsuchas
anonymous, trustless and immutable, etc. The authors have
outlined the various different processes that utilize various
different elements of the blockchain technology that can be
implemented based on the specific application and use case
of the application.
J. Wang explains that most of the applications based on
crowd sensing gather a huge amount of data by using
pervasive smartphone users to provide the data.Butmost of
the time the users are not compensated enough for their
contribution to the system. Therefore, the authors have
presented an innovativeframework fora privacy-preserving
reward and penalty scheme that rewards the users for
contributing to the large data sensing paradigm using the
trustless and secure blockchain. The major drawback of this
paper has been that the authors have not discussed the
solutions for a possible collusion attack.
S. Pandey introduces the benefits of utilizing the Blockchain
paradigm for its security and decentralizedarchitecture.The
author states that there has been a jump in the number of
researches is going on in this field and there has been
increased interest in implementing the blockchain
framework to make existing systems resilientandsecure. To
this effect, the authors have formulated an ingenious and
practical simulation tool for planning,stability,anddesignof
the systems and applications as well as networks in a
blockchain environment. TheBlockSIMisanopensource and
comprehensive solution for all the Blockchain simulation
needs. The major drawback is that the authors have not
modeled the internet latency that would affect the accuracy
of the simulation.
3. SYSTEM OVERVIEW DIAGRAM
4. CONCLUSION
In this paper there have been some related works that have
utilized the Public health record database and techniques to
achieve various different approaches and to identify their
flaws and shortcomings. There have been various
methodologies that have been proposed by a plethora of
authors each offering a unique technique to Public Health
Record management. This has influenced our approach
drastically and helped and enabled us to propose a secure
and efficient Public Health Record management system that
uses the Blockchain Paradigm. The Blockchainisuseddueto
its inherent nature of being resilient to changes and
tampering, this is utilized to provide an effective Access
control Mechanism that can help restrict the leakage of
valuable sensitive data of the patients in the Public Health
Records. The methodology discussedwill beimplemented in
the upcoming researches.
REFERENCES
[1] S. Yu, K. Lv, Z. Shao, Y. Guo. J. Zou and b. Zhang, “A High-
Performance Blockchain Platform for Intelligent Devices”,
1st IEEE International Conference on Hot Information-
Centric Networking, HotICN, 2018.
[2] R. Wang et al, “A Privacy-Aware PKI System Based on
Permissioned Blockchains”, IEEE 9th International
Conference on Software Engineering and Service Science
(ICSESS), 2018.
[3] C. Ehmke, F. Wessling and C. Friedrich, “Proof-of-
Property – A Lightweight and Scalable Blockchain Protocol”,
ACM/IEEE 1st International Workshop on EmergingTrends
in Software Engineering for Blockchain, 2018.
[4] R. Wang et al, “A Video Surveillance System Based on
Permissioned Blockchains and Edge Computing”, IEEE
International Conference on Big Data and Smart Computing,
BigComp, 2019.
[5] J. Lou, Q. Zhang, Z. Qi and K. Lei, “A Blockchain-based key
Management Scheme for Named Data Networking”,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 206
Proceedings of 2018 1st IEEE International Conference on
Hot Information-Centric Networking, HotICN 2018.
[6] S. Wang L. Ouyang et al, “Blockchain-Enabled Smart
Contracts: Architecture, Applications, and Future Trends”,
IEEE Transactions on Systems, Man, and Cybernetics:
Systems, 2019.
[7] Y. Xu, “Section-Blockchain:AStorageReducedBlockchain
Protocol, the Foundation of an Autotrophic Decentralized
Storage Architecture”, 23rd International Conference on
Engineering of Complex Computer Systems (ICECCS), 2018.
[8] M. Marchesi, “Why Blockchain Is Important for Software
Developers, and Why Software Engineering Is Importantfor
Blockchain Software”, International Workshop on
Blockchain Oriented Software Engineering (IWBOSE),2018.
[9] A. Maksutov et al, “Detection of Blockchain Transactions
Used in Blockchain Mixer of Coin Join Type”, IEEE
Conference of Russian Young Researchers in Electrical and
Electronic Engineering (EIConRus), 2019.
[10] F. Wessling et al, “How Much Blockchain Do You Need?
Towards a Concept for BuildingHybridDAppArchitectures”,
ACM/IEEE 1st International Workshop on EmergingTrends
in Software Engineering for Blockchain, 2018.
[11] J. Wang et al, “A Blockchain-based Privacy-Preserving
Incentive Mechanism in Crowdsensing Applications”, IEEE
Access, 2018.
[12] S. Pandey et al, “BlockSIM: A practical simulation tool
for optimal network design, stability, and planning”, IEEE
International Conference on BlockchainandCryptocurrency
(ICBC), 2019.

Weitere ähnliche Inhalte

Was ist angesagt?

December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docxAmir Khan
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Securityijceronline
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityDeniseFerniza
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsVishwesh Nagamalla
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Was ist angesagt? (20)

December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docx
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and security
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 

Ähnlich wie IRJET -Securing Data in Distributed System using Blockchain and AI

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
BEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election SystemBEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election SystemIRJET Journal
 
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using BlockchainIRJET Journal
 
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...IRJET Journal
 
The Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage applicationThe Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage applicationIRJET Journal
 
Authentication and Tracking of Government Benefits Using Blockchain
Authentication and Tracking of Government Benefits Using BlockchainAuthentication and Tracking of Government Benefits Using Blockchain
Authentication and Tracking of Government Benefits Using BlockchainIRJET Journal
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET Journal
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsIRJET Journal
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudIRJET Journal
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
 
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake newsBlockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake newsIRJET Journal
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
 

Ähnlich wie IRJET -Securing Data in Distributed System using Blockchain and AI (20)

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
BEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election SystemBEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election System
 
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT Applications
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
 
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
 
The Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage applicationThe Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage application
 
Authentication and Tracking of Government Benefits Using Blockchain
Authentication and Tracking of Government Benefits Using BlockchainAuthentication and Tracking of Government Benefits Using Blockchain
Authentication and Tracking of Government Benefits Using Blockchain
 
final.pdf
final.pdffinal.pdf
final.pdf
 
NIS.docx
NIS.docxNIS.docx
NIS.docx
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake newsBlockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake news
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Kürzlich hochgeladen (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 

IRJET -Securing Data in Distributed System using Blockchain and AI

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 203 Securing Data in Distributed System using Blockchain and AI Abhijeet Sontakke1, Aditya Gaikwad1, Neha Ovhal1, Kalyani Nagawade1, Sarita Patil2 1Student, Dept. of Computer Engineering, G. H. Raisoni COE & Management Pune, Maharashtra, India 2Professor, Dept. of Computer Engineering, G. H. Raisoni COE & Management Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In hospitals in developing countries when an individual with symptoms corresponding to a deadly disease such as hepatitis, influenza, cancer, etc. is encountered, the staff can either suggest an expert in that particular field or if the disease hasn’t been identified, the staff could recommend the patient to a general physician. Most of the time, the general physician will subject the patient through a series of trial and error to identify and eliminate the improbable disease. This process is a very painful ordeal experienced by the patient as the doctors try to determine the cause of the symptoms, one disease medication at a time. This problemhas largely been overcome by developed countries by a Data Vendor. This paper analyses all the past workonprovidingthe security for the data in the network where especially data brokers are being involved. The best way to provide this is, introducing of block chains and Artificial intelligence. This research article analyses past methodologies and evaluate them to introduce a newer version of maintaining data integrity in network. Key Words: Block chain, Artificial intelligence,Intrusion detection system, Network threats, Access control mechanism. 1. INTRODUCTION Data and its security have been paramount since the day human beings started accumulating it. Since the earliest stone age era, humans have evolved to process the information around us byvarioussensoryinputsreceivedby different sensory organs. This has led to the development of various arts such as paintings, music, textures, etc. This thirst for the unknown has made us go into space and advance a significant amount in technology over the years. All of this data created needs to be stored somewherewhere it cannot be modified or destroyed, as these are valuable lessons learned throughout the lifetime of an individual or a group which can help the species to grow forward. This has led to the humans collecting and storing a lot of data on various different topics and was accelerated due to the invention of the printing press at which allowed the information to take the form of books that could retain it for a very long time. Another revolution in the storage, retrieval, and access of data happened when the internet was conceived. Electronic storage was already invented by then but the internetadded another element to this as the internet allowed the various computers and computing devices all over the world to connect to each other and share information. This was designed to facilitate the exchange of information between the researchers over a large distanceto eliminatetheneedto be physically present at the location to utilize the resources. Due to its initial success, the internet was opened to the public and various different services that used the internet as the backbone started flourishing. The internet started growing exponentially with a lot more users and machines being connected every day. People started using the platform more and more and this led to an increased number of users interacting online. With social media and educational portals, the internet grew to astronomical sizes and the data being produced every day grew to a massive size. With the growthofdata andtheusers online, it created a nourishing environment for people to learn and share valuable skills and information all over the world. The major drawback of open access to everyone on the internet was that there are also some individuals with malicious intent that can ruin the experience of another person purely for personal gain. A lot of users on the internet have valuable and sensitive personal information that is stored in the databases and various organizations to have their internal data that is confidentially stored electronically. This increases the likelihood of an attacker gaining access to this information that would lead to compromised security as well as a huge loss for the organization. This is problematic as there are no alternatives for storage and the convenience offered by the database. Therefore, there is an utmost need to provide a mechanism for controlling the access to the sensitive data through which only the trusted employees and other members of the organization can access the data, based on their hierarchy. This brings forth the blockchain paradigm, being proposed by a group of scientists in the late 1990s the technique was initially developed for use in a digital notary as it is an excellent choice for tamper-proofing a document. The paradigm was largely unused until it was utilized for the creation of the world’s first cryptocurrency.Duetoitsstrong tamper-proof and distributed nature, it is an apt choice for a cryptocurrency. The blockchain is one of the most secure applications and is capable of providingveryhighsecurityto the data stored and can, therefore, be utilized in an application to safeguard the data and provide an efficient as well as an effective access control mechanism for the sensitive data of an organization.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 204 This paper dedicates section 2 for analysis of past work as literature survey and section 3 concludes the paper with feasible statement of the literature study. 2. LITERATURE SURVEY This section of the literature survey eventually revealssome facts based on thoughtful analysis of many authors work as follows. S. Yu states that due to rapid pace of technology and the introduction of Internet of Things or IoT, there has been a swift increase in the number of intelligent devices being connected to the internet. These devices are capable of generating a large amount of data due to the fact that it is connected and is interacting with the internet. A large number of devices generate equally large amount of data which cannot be processedefficiently.Therefore,theauthors propose an effective technique based on blockchain thatcan provide a low-cost alternative to create economic value for the IoT data generated. A major drawback of this methodology is that it has the potential to be misused by uploading large amounts of malicious data. R. Wang elaborates on the foundation of network security construction which is the PKI or The Public Key Infrastructure. The researchers also commented on the reliability and the robust security offered by the blockchain platform. Therefore, the authors amalgamated both the methodologies to strengthen the Public Key Infrastructure by a permissioned blockchain that converts the PKI into a privacy-aware PKI. This is crucial as the implementationofa permissioned blockchain also improves the efficiency of the configuration and certificate application. The major drawback is that this technique has been a very specialized approach towards the blockchain paradigm. C. Ehmke explains that the innovative paradigm of Blockchain has been popular and has seen extensive usage recently. The blockchain was utilized for financial applications and that is how it gained immense popularity and limelight. The blockchain was readily picked up by a plethora of researchers and implemented in various different fields, which has greatly helped in bringing increased security to numerous applications. Due to the fact that the blockchain paradigm requires a user of the blockchain to download the wholechaintogainanoverview. To ameliorate this effect, the authors have implemented a scalable and lightweight blockchain protocol. R. Wang introduces the video surveillance system as an irreplaceable tool that can be used to efficiently manage and survey big cities. When a video surveillance system is installed it can easily transmit environment information remotely, this is highly useful as the person does not need to travel long distances and physically be present in the location for the management. Due to a large-scaleincrease in the monitoring standards with the inclusion of IoT and real- time monitoring, it is susceptible to attacks. Therefore, the authors developed a system for video surveillance based on permissioned blockchains and Convolutional Neural Networks for a seamless and secure system. A Major drawback in the system is that large scale testing of the System has not been performed and will be done in the upcoming researches. J. Lou states that there has been a lack of a key management feature in the Named Data Networking, which is utilized to name each and every object by the producer and also digitally sign it. There are some disadvantages of the conventional approach such as lack of trust between the sites as well as the high chances of failure observed in the centralized architecture if the main nodefails.Therefore, the authors in this paper propose an efficient key management scheme based on blockchainfortheNamedData Networking paradigm. The blockchain increases the trust between the sites as well as the decentralizedarchitectureishighlyuseful in overcoming failure.Thedrawback oftheproposedscheme is that it has not been evaluated extensively for its feasibility in reducing the NDN cache pollution. S. Wang explains that therehasbeena veryfastdevelopment of cryptocurrency in recent years, which has led to detailed scrutiny of the paradigm. This has uncovered a lot of irregularities in the paradigm such as the Smart Contracts that have been the cause of “The DOA Attack” which has resulted in a huge loss. Therefore, the authors have presented a comprehensive and systematic review of the smart contracts in the blockchain paradigm. The authors have presented a six-layer architecture for smart contracts for increasing the security of the system. The authors have not implemented a formal verification which can provide confidence. Y. Xu introduces the concept of decentralized storage that is based on the blockchain framework.Theblockchainisoneof the most innovative concepts that can be used to design a highly secure decentralized framework. The authors have proposed section blockchain protocol, which aims to eliminate the storage problem that is encountered incertain devices. The proposed methodology is highly resilient to failure due to the decentralizedarchitecture,aswell as,ithas the ability to withstand heavy loads and optimization gracefully due to the implementation of the Blockchain paradigm. M. Marchesi in his keynote speech details the rapid development and ongoing researches going on in the field of blockchain. This is due to the increased attention to this paradigm and increased demand in this sector. The author indicates that this increased pressure on a nascent framework has led to an increase in security lapses that are evident in the various different incidents on the Ethereum platform and the cryptocurrency exchanges.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 205 That being said the speaker also highlighted the immense opportunities that can be utilized by using the blockchain paradigm such as the Blockchain tokens that can be used to implement a reward and penalty-based scheme for developers. A. Maksutov elaborates on the paradigm of Blockchain and its uses. The authors have proposed an innovative concept for the detection and identification of various money laundering schemes that use the blockchain framework for their nefarious activities. The proposed methodology has been used to deanonymizing the transactions and tracking the coin join transactions, which allows the authors to evaluate user participation. All of this information is used to determine if the transactions are being fraudulentorused to launder money. F. Wessling states that the addition of blockchain to existing platforms is problematic as it is different from building the applications from scratch by incorporating the Blockchain into the application. The authors determine the amount of blockchain required for various different implementations, this is done by analyzing the attributes of blockchainsuchas anonymous, trustless and immutable, etc. The authors have outlined the various different processes that utilize various different elements of the blockchain technology that can be implemented based on the specific application and use case of the application. J. Wang explains that most of the applications based on crowd sensing gather a huge amount of data by using pervasive smartphone users to provide the data.Butmost of the time the users are not compensated enough for their contribution to the system. Therefore, the authors have presented an innovativeframework fora privacy-preserving reward and penalty scheme that rewards the users for contributing to the large data sensing paradigm using the trustless and secure blockchain. The major drawback of this paper has been that the authors have not discussed the solutions for a possible collusion attack. S. Pandey introduces the benefits of utilizing the Blockchain paradigm for its security and decentralizedarchitecture.The author states that there has been a jump in the number of researches is going on in this field and there has been increased interest in implementing the blockchain framework to make existing systems resilientandsecure. To this effect, the authors have formulated an ingenious and practical simulation tool for planning,stability,anddesignof the systems and applications as well as networks in a blockchain environment. TheBlockSIMisanopensource and comprehensive solution for all the Blockchain simulation needs. The major drawback is that the authors have not modeled the internet latency that would affect the accuracy of the simulation. 3. SYSTEM OVERVIEW DIAGRAM 4. CONCLUSION In this paper there have been some related works that have utilized the Public health record database and techniques to achieve various different approaches and to identify their flaws and shortcomings. There have been various methodologies that have been proposed by a plethora of authors each offering a unique technique to Public Health Record management. This has influenced our approach drastically and helped and enabled us to propose a secure and efficient Public Health Record management system that uses the Blockchain Paradigm. The Blockchainisuseddueto its inherent nature of being resilient to changes and tampering, this is utilized to provide an effective Access control Mechanism that can help restrict the leakage of valuable sensitive data of the patients in the Public Health Records. The methodology discussedwill beimplemented in the upcoming researches. REFERENCES [1] S. Yu, K. Lv, Z. Shao, Y. Guo. J. Zou and b. Zhang, “A High- Performance Blockchain Platform for Intelligent Devices”, 1st IEEE International Conference on Hot Information- Centric Networking, HotICN, 2018. [2] R. Wang et al, “A Privacy-Aware PKI System Based on Permissioned Blockchains”, IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), 2018. [3] C. Ehmke, F. Wessling and C. Friedrich, “Proof-of- Property – A Lightweight and Scalable Blockchain Protocol”, ACM/IEEE 1st International Workshop on EmergingTrends in Software Engineering for Blockchain, 2018. [4] R. Wang et al, “A Video Surveillance System Based on Permissioned Blockchains and Edge Computing”, IEEE International Conference on Big Data and Smart Computing, BigComp, 2019. [5] J. Lou, Q. Zhang, Z. Qi and K. Lei, “A Blockchain-based key Management Scheme for Named Data Networking”,
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 206 Proceedings of 2018 1st IEEE International Conference on Hot Information-Centric Networking, HotICN 2018. [6] S. Wang L. Ouyang et al, “Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends”, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019. [7] Y. Xu, “Section-Blockchain:AStorageReducedBlockchain Protocol, the Foundation of an Autotrophic Decentralized Storage Architecture”, 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), 2018. [8] M. Marchesi, “Why Blockchain Is Important for Software Developers, and Why Software Engineering Is Importantfor Blockchain Software”, International Workshop on Blockchain Oriented Software Engineering (IWBOSE),2018. [9] A. Maksutov et al, “Detection of Blockchain Transactions Used in Blockchain Mixer of Coin Join Type”, IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2019. [10] F. Wessling et al, “How Much Blockchain Do You Need? Towards a Concept for BuildingHybridDAppArchitectures”, ACM/IEEE 1st International Workshop on EmergingTrends in Software Engineering for Blockchain, 2018. [11] J. Wang et al, “A Blockchain-based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications”, IEEE Access, 2018. [12] S. Pandey et al, “BlockSIM: A practical simulation tool for optimal network design, stability, and planning”, IEEE International Conference on BlockchainandCryptocurrency (ICBC), 2019.