SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 249
DECENTRALISED CHAT APPLICATION
Uma Thakur1, Abhishek Chichmalkar2, Aditya Sambhare3, Aman Chaturvedi4, Chinmay
Khuspare5, Nikhil Tembhe6
#Department of Computer Science and Engineering, Priyadarshini College of Engineering, Nagpur, Maharashtra,
India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - When we wanted to buy a product like a watch
on the internet, then suddenly we see ads related to the
product on Facebook, Instagram, Google, etc thismeansthey
are accessing our every information even the messages we
send to people on the Internet. There is a growing suspicion
that the web is betraying and spying on us. As
communication is an important part of an individual’s
lifestyle, as each person communicates globally with the
means of the internet every day and as in today’s world,
different chat systems are almost working on centralized
systems i.e., all the data is in a centralized server. Therefore,
a major problem is if the central server fails then the whole
network fails, and due to this major drawback is that there
can be a loss of user’s data, information,and resourceswhich
is stored on the centralized server or even there can be a
leak of user’s chat information that is stored on the server.
Decentralized is the way to resolve this problem, it’s an
internet hosted via a peer-to-peer network. Theinformation
will be distributed and stored around the world on multiple
devices like phones, laptops, and even smart appliances. To
achieve this, we are using Gun.js, a decentralized graph
database that is real-time has Low latency, and also has
security, encryption, and authorization for the data.
Key Words: Gun.js, Radisk, webRTC, Svelte, Decentralized
server, User Interface, Peer to peer network.
1. INTRODUCTION
In today’s world chatting over the messagingplatformsarea
part of an individual’s lifestyle. The most of the
communication whether it is a confidential chat or normal
chat are mostly happens overin social media platform.Aswe
all know that most of the traditional chat application are
working on a centralizedserver i.e., all the user data isstored
on a central server. So, the major problem of this server is if
the central server fails then the whole data collapses (break
down) or even can leak the user information stored on the
server. This is the major drawback of this system, but in
today’s world privacy makes a very important role in
everyone’s life and specially for those organizations that
works on confidential tasks like for example the military
purpose, they need a very secured privacy to handle their
communication from the one end to the other end. So, to
achieve this system our project had made the use of
decentralized backend server, as the name suggests
decentralized server it does not have any central server. It is
peer to peer network i.e., all the computers are linked
together with equal permissions for processing data. To
achieve this decentralized backend server, we used a library
called as Gun.js, a decentralized graph database. In this, for
front end UI of our chat application, we used Svelte a
JavaScript library. Decentralized application consists of
multiple nodes connected to each other in a mesh type of
topology network. It’s just like a peer-to-peer network that
data is stored in such a way that it is almost impossible to
view by an anonymous user.
2. PROBLEM STATEMENT
A. Data is stored in centralized server.
As to storing the user data, it has been storedinbigserversas
it also takes an ample amountof space. It has been said thatif
any one of the servers fails, the whole network collapse due
to that loss of data, which is dangerous for the user as if their
data has been lost. Due to that, you cannot retrieve your
information back to overcome this issue.
So here comes our project in the picture, whereas the high-
tech company stores their user in the server. At the same
time, there is no guarantee that your data will be safe. Where
data is stored in a hard disk somewhere in the cloud, which
has been shared across multiple machines, whereas our
project stores a small subset of data on each user based on
the actual data that they consume via a peer-to-peer
connection.
B. Lack of loyalty
As in today's fast-growing world, whenever we search for
some product in a search engine after a while, we see a pop-
up coming out of know ware showing the exact related
product that you searched a while ago. Guess how they came
to know that you were looking forthisproduct.Thismaylead
someone is monetizing your activity that your data is not
secure, which means your data has been shared with a
different company that you are not aware of, which means
you have no longer control over your data where as in our
project the data is stored in a subset of data based on actual
data. Which is much more securethan the centralizedserver.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 250
3. COMPONENTS
Fig.1: Diagram of Decentralized web
Gun.js: -
Gun.js decentralized graph database is a centralized
database that which on a server hosted by big tech data in
the gun is distributed across multiple peersorusersthrough
the use of webRTC and end-user like user requiresa specific
graphic data to use your app while another user requires an
entirely different one with a few shared data points in
between each peer can store the data it needs in the
browsers local storage thensync changeswithotherpeers in
the network a peer might be one of your end-users ora relay
server that you deploy to make thesystemmorereliablethat
means the entire database is the union of all graphs on the
network, and no one machine controls the entire system a
decentralized fire stored where you get real-time updates
offline mode and the illusion of what latency the data itselfis
managed through a minimal graph API where each record is
a node that contains a unique ID and any other custom data
for that entity in plain JavaScript any node on the graph can
reference another node allowing you to create an infinite
chain of circular dependencies. an individual node never
contains a duplicate of another node just a reference to it
allowing you to model complex relationships without the
need for a schema.
Radisk: -
The Radisk Storage Engine (RAD)isanin-memory,aswell as
on-disk radix tree that saves the GUN databasegraphforfast
and performant look-ups. Radix trees have a constant
lookup-time.
webRTC: -
webRTC exchange real-time audio video streams with your
friends entirely in the browser to capitalize on the work
from home boom then webRTC is the API because it allows
you to establish a peer-to-peer connection between two or
more browsers where they can exchange audio video media
directly without the need for a third-party server or native
app webRTC will make a series of requests to a stun server.
Svelte: -
Svelte it's a JavaScript tool for building UI components,
whereas svelte is a compiler it converts the declarative code
that writes as a developer into imperative code that works
with native browser APIs. As a result, to get highly
performant code in a tiny package, but most importantly,it's
the only JavaScript framework that's actually used to create
components in dot spelt files which containthreemain parts
a script for your JavaScript code which canalsobetypescript
a style tag for your CSS which can also use a preprocessor
like as and the main template represented as HTML
4. PROJECT DESCRIPTION
Fig. 2: User Flow Diagram
We made a chat web app where the data and
infrastructure are not controlled by a big tech company
instead it is decentralized across the entire user base
using web technologies. We built this decentralized chat
application using a library called gun.js and for the front-
end UI, we have used Svelte a JavaScript library (an open-
source front-end compiler).
A gun.js is a decentralized graph database, a normal
database that stores all the data in a harddisk somewhere
in the cloud it may be shared across multiple machines,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 251
but for all intents a purpose we can imagine our entire
data set on a single disk whereas gun.js also storesa small
subset of data on each user based on the actual data they
consume in the application.
When a user makes a query for some data it will search
across the network for the other users that have that data
and sync up using webRTC which is a web real-time
communication, so it is like an entire database as the
union of all peers on the network. It’s like a peer-to-peer
network that data is stored in such a way that it is almost
impossible to view as a very secure encryption functionis
used, this idea is very similar to a blockchainledger where
no individual has control of the entire network but it is
not a blockchain technology which tends to be too slow.
For user authentication when we create a new user
account this will generate secure key pair
cryptographically andthekeyisassociatedwiththepublic
key so the past message can be found and the password is
proof of work seed to prove and to decrypt access to an
account's private keys.
For the data to be persisted if a user just clears the
browser cache data, in the browser's the local storage is
limited to 5 megabytes and if a user clears out the data in
local storage it could potentially be lost if it's not
somewhere else on the network probably not acceptable
but for this, we deploy a relay server that uses a different
storage mechanism called Radisk thatcanstorea lotmore
data on the disk of an actual server and which will make
the network more robust because if a query falls back toa
relay if it's not available from another peer by creating a
node in the database which will be available to the entire
decentralized network.
5. PROJECT IMPLEMENTATION
We have used a Svelte app with two main features email
password user authentication and then a massive group
chat room that anybody can join the only dependency in
this project is gun.js which we installed with npm.
The first thing we will focus on is user authentication and
to do that we created a file called user.js, at the file we
imported gun.js, and below that we imported two
supporting librariesthefirst one SEA(SecurityEncryption
and Authorization) which is the module that enables user
authentication and we use AXE (Advanced Exchange
Equation) it is an alternative way to connect peers
together and tends to be more performant for a chat app.
We created a variable called DB to initialize the database
then used it to refer to the currently authenticated user,
we also changed the option of recall to session storage, so
the user stays logged in between browser sessions.
To manage the user in the app, we need to know if the
user is logged in and we also want their username so we
can show it in the UI (User Interface). We get the
username by making a reference to the user then calling
git alias which will be the value of whatever username
users choose and when they sign up, we then going to use
this value frequently throughout the application.
So, for that, we imported writable from the Svelte store to
make it reactive. A store is like an observable value that
will re-render the UI whenever it’s changed and it can be
shared across multiple components sowheneverthealias
for the current user updates, we will set the value of the
store to that value but we also want to listen to changesto
the authorization state when the user signs in sign-out.
To handle that we'll listen to the authorization events on
the database and do the same thing where we fetch the
alias and then set that as the value on the store.
In Svelte we have the Header - it's component where it
will show the title of the app when you're not logged in
but if you are logged in it'll show your usernameaswell as
your avatar.
Now to implement sign out we imported the username
store and the gun user object then we created a function
called sign out that calls will leave on the user and set the
username store to an empty string. Then in ourHTMLfile,
we have a button that when clicked we'll call thesignouta
function but we only want to show that button if the user
is signed in and the way we can tell if a user is signed in is
if their username is present in svelte, we do that with a
store in any component by adding an if statement
followed by a '$' dollar sign and then the name of the
store. The dollar sign will subscribe to the store and react
to any changes that happen to it iftheusernamedoesexist
then we will go ahead and show the username by
subscribing to the store once again, we also did the same
thing to show an avatar with the user’s initials by using
DiceBear API which will make a unique avatar based on
the username as the random seed, then we have a button
that has the sign out function when clicked and we add an
else block to show something else if the user is not logged
in, this is about the header component and we declared it
in the app component also.
Now on to the login component which will allow the user
to sign in or sign up with their username and password,
we will import the user object and then set up the local
state for the username and password.
In svelte we can implement two-way data binding with a
variable by creating a form input and then stating bind
value to that variable which means anytime user types
into the form, the value of the variable will change. We
have created separate form inputs for username and
password, and we will share them for both the login and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 252
signup process which itself just consists of two different
buttons that will either call the login function or the sign-
up function.
To user log in, we used the user auth method which
consists of three arguments, takes the username and
password as first and second arguments and in the third
argument, we defined a callback, in this case the callback
is the value of the store that we set up earlier which will
update automatically.
Now to sign up a new user is very similar to the previous
but instead of calling auth we call that create method on
the user and if the user creation is successful then we will
log that user in automatically.
Now at this point, we have a working user authentication
system.
For the main chat component which is where we query
items from the database and which also gives the user the
ability to send a message.
The chat component has two pieces of state, a string for a
new message that the user will type into form input and
an array of messages which will contain the message text
along with the user who sent it and a timestamp.
To query messages, we set up the onMount lifecycle hook
that will run whenever the component is first initialized,
inside it, we used the database to make a reference to the
chat node as for creating super chat we just give it a name
of chat.
Then we just call map to loop over everysinglemessagein
the chat and then call once to only read each message
once, in this case each message is immutable so we don't
need to listen to changes in real-time, then we defined a
call-back that will be called on each new messagethatwill
give us access to the data and the id of that node.
Now if the data is defined, we format a message more
suitable for the User Interface with the properties of who,
what, and when.
1. Who - It is the user that sent the message and we
can figure out who sent it by taking that data of the
raw message and using it to get the alias,
2. What - It is the actual text of the user’s message,
3. When - It is the property to get an accurate
timestamp across all of our users, we're using Gun
state as the final source of truth with the raw data,
this gives us all the data we need for the User
Interface.
Then we take each message and add it to an array that we
can then loop over it in the UI (User Interface) with Svelte.
We loop overran array of items in svelte with each this will
render the chat message component for each message inthe
array and by adding parentheseswithmessage-When,which
will provide svelte with a unique key to sort all themessages
efficiently by which we read messages in the chat.
We made a form to submit them in the UI (User Interface), in
the form on the submit event will call the send message
function. Inside that function, we use SEA to encrypt the
actual message text and the key is the same as the one we
used earlier to decrypt the messages. Now we can associate
the message to the currentuserusingtheencryptedmessage
as the value then we created a date to serve as the index for
the message so it can be sorted properly at which point, we
can reference the chat collection create a new node based on
that index and store the message value.
6. ADVANTAGES
1. For Government/Military officials: - It will be very
useful for government security officials when they
need to send their confidential messages or
information regarding any work or to send their
data to their intenders for some official reasons
without any third-party involvement. As they don’t
need to trust any other application.
2. Users don’t have to put trust in any Central
authority.
a. You don’t need to trust any other chat
application that is workingona centralized
server or followed by the third parties that
use or sell your data, information, photos
to any adman who follows you around the
internet. As this decentralized chat
application will be useful for securing your
data you should be able to reduce or
eliminate the trust that you’re required to
put into third parties.
7. CONCLUSION
Decentralized applications tend to form the interaction
between two people more efficientandsimpler.Thechatting
process nowadays features a mediating node, while our
software doesn't have any mediating device/node i.e. Every
person is connected by a peer-to-peer network. A
Decentralized network can be a key technology that can
solve privacy and confidentiality-related issues that exist in
the Traditional or existing messaging system.
8. REFERENCES
[1] Sourabh, Deepanker Rawat,Karan Kapkoti,Sourabh
Aggarwal,Anshul Khanna, "bChat: A Decentralized Chat
Application",Inderprastha Engineering College, Uttar
Pradesh, India,(IRJET).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 253
[2] Peter Menegay, Jason Salyers,Griffin College,"Secure
Communications Using BlockchainTechnology",Milcom
2018 Track 3 - Cyber Security and Trusted Computing.
[3] Suman Kumar Das, Zenlabs, Zensar Technologies, Pune,
India,"Secure Messaging Platform Using Blockchain
Technology”, (IJRES), ISSN (Online): 2320-9364, ISSN
(Print): 2320-9356.
[4] Abhishek P. Takale,Chaitanya V. Vaidya,Suresh S.
Kolekar,"Decentralized Chat Application using
Blockchain Technology",Rajendra Mane College Of
Engineering And Technology, Ambav, India.(IJREAM).
[5] Muhammed Kuliya, Hassan Abubakar,"SecuredChatting
System Using Cryptography", Lovely Professional
University, Punjab India,(IJCRT).
[6] “A WebRTC Video Chat Implementation Within the
Yioop Search Engine”(2019). By Ho, Yangcha, Master’s
projects. 726. DOI:https://doi.org/10.31979/etd.dtz2-
hstt .
[7] “A secure Chat Application Based on Peer-to-Peer
Architecture”, Mohamad Afendee Mohamed, Abdullah
Muhammed, and Mustafa Man on 28-05-2015 in
Journal of Computer Science.
[8] Secure Peer-to-Peer communication based on
Blockchain Kahina Khacef, Guy Pujolle.
[9] https://gun.eco/docs/Radisk
[10] https://gun.eco/docs/API
[11] https://webrtc.org/getting-started/peer-connections
[12] https://svelte.dev/docs
[13] https://relay.dev/docs/

More Related Content

What's hot

Active directory and application
Active directory and applicationActive directory and application
Active directory and applicationaminpathan11
 
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...NRB
 
cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptx
cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptxcloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptx
cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptxVitNguyn252054
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
 
Designing the active directory logical structure
Designing the active directory logical structureDesigning the active directory logical structure
Designing the active directory logical structureJohn Carlo Catacutan
 
What is active directory
What is active directoryWhat is active directory
What is active directoryAdeel Khurram
 
Creating a Healthcare Data Fabric, and Providing a Single, Unified, and Curat...
Creating a Healthcare Data Fabric, and Providing a Single, Unified, and Curat...Creating a Healthcare Data Fabric, and Providing a Single, Unified, and Curat...
Creating a Healthcare Data Fabric, and Providing a Single, Unified, and Curat...Denodo
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using EucalyptusAbhishek Dey
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
 
Network servers
Network serversNetwork servers
Network serversOnline
 
1.2 active directory
1.2 active directory1.2 active directory
1.2 active directoryMuuluu
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisorsGaurav Suri
 
ZStack for Datacenter as a Service - Product Deck
ZStack for Datacenter as a Service - Product DeckZStack for Datacenter as a Service - Product Deck
ZStack for Datacenter as a Service - Product DeckRyo Ardian
 
Active Directory Ii
Active Directory   IiActive Directory   Ii
Active Directory Iideshvikas
 
Genesys SIP Server Architecture
Genesys SIP Server ArchitectureGenesys SIP Server Architecture
Genesys SIP Server ArchitectureRanjit Patel
 
Understanding software licensing with IBM Power Systems PowerVM virtualization
Understanding software licensing with IBM Power Systems PowerVM virtualizationUnderstanding software licensing with IBM Power Systems PowerVM virtualization
Understanding software licensing with IBM Power Systems PowerVM virtualizationJay Kruemcke
 
Ibm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopIbm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopsolarisyougood
 
Unix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksUnix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksLOKESH KUMAR
 

What's hot (20)

Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
 
cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptx
cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptxcloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptx
cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptx
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
Designing the active directory logical structure
Designing the active directory logical structureDesigning the active directory logical structure
Designing the active directory logical structure
 
Business Models in LTE & 5G
Business Models in LTE & 5GBusiness Models in LTE & 5G
Business Models in LTE & 5G
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Creating a Healthcare Data Fabric, and Providing a Single, Unified, and Curat...
Creating a Healthcare Data Fabric, and Providing a Single, Unified, and Curat...Creating a Healthcare Data Fabric, and Providing a Single, Unified, and Curat...
Creating a Healthcare Data Fabric, and Providing a Single, Unified, and Curat...
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
Network servers
Network serversNetwork servers
Network servers
 
1.2 active directory
1.2 active directory1.2 active directory
1.2 active directory
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
ZStack for Datacenter as a Service - Product Deck
ZStack for Datacenter as a Service - Product DeckZStack for Datacenter as a Service - Product Deck
ZStack for Datacenter as a Service - Product Deck
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Active Directory Ii
Active Directory   IiActive Directory   Ii
Active Directory Ii
 
Genesys SIP Server Architecture
Genesys SIP Server ArchitectureGenesys SIP Server Architecture
Genesys SIP Server Architecture
 
Understanding software licensing with IBM Power Systems PowerVM virtualization
Understanding software licensing with IBM Power Systems PowerVM virtualizationUnderstanding software licensing with IBM Power Systems PowerVM virtualization
Understanding software licensing with IBM Power Systems PowerVM virtualization
 
Ibm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopIbm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshop
 
Unix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksUnix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | Blocks
 

Similar to DECENTRALISED CHAT APPLICATION

Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET Journal
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmIRJET Journal
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...IRJET Journal
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET Journal
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingIJECEIAES
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...Microsoft Private Cloud
 

Similar to DECENTRALISED CHAT APPLICATION (20)

Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and Ethereum
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing Framework
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

DECENTRALISED CHAT APPLICATION

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 249 DECENTRALISED CHAT APPLICATION Uma Thakur1, Abhishek Chichmalkar2, Aditya Sambhare3, Aman Chaturvedi4, Chinmay Khuspare5, Nikhil Tembhe6 #Department of Computer Science and Engineering, Priyadarshini College of Engineering, Nagpur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - When we wanted to buy a product like a watch on the internet, then suddenly we see ads related to the product on Facebook, Instagram, Google, etc thismeansthey are accessing our every information even the messages we send to people on the Internet. There is a growing suspicion that the web is betraying and spying on us. As communication is an important part of an individual’s lifestyle, as each person communicates globally with the means of the internet every day and as in today’s world, different chat systems are almost working on centralized systems i.e., all the data is in a centralized server. Therefore, a major problem is if the central server fails then the whole network fails, and due to this major drawback is that there can be a loss of user’s data, information,and resourceswhich is stored on the centralized server or even there can be a leak of user’s chat information that is stored on the server. Decentralized is the way to resolve this problem, it’s an internet hosted via a peer-to-peer network. Theinformation will be distributed and stored around the world on multiple devices like phones, laptops, and even smart appliances. To achieve this, we are using Gun.js, a decentralized graph database that is real-time has Low latency, and also has security, encryption, and authorization for the data. Key Words: Gun.js, Radisk, webRTC, Svelte, Decentralized server, User Interface, Peer to peer network. 1. INTRODUCTION In today’s world chatting over the messagingplatformsarea part of an individual’s lifestyle. The most of the communication whether it is a confidential chat or normal chat are mostly happens overin social media platform.Aswe all know that most of the traditional chat application are working on a centralizedserver i.e., all the user data isstored on a central server. So, the major problem of this server is if the central server fails then the whole data collapses (break down) or even can leak the user information stored on the server. This is the major drawback of this system, but in today’s world privacy makes a very important role in everyone’s life and specially for those organizations that works on confidential tasks like for example the military purpose, they need a very secured privacy to handle their communication from the one end to the other end. So, to achieve this system our project had made the use of decentralized backend server, as the name suggests decentralized server it does not have any central server. It is peer to peer network i.e., all the computers are linked together with equal permissions for processing data. To achieve this decentralized backend server, we used a library called as Gun.js, a decentralized graph database. In this, for front end UI of our chat application, we used Svelte a JavaScript library. Decentralized application consists of multiple nodes connected to each other in a mesh type of topology network. It’s just like a peer-to-peer network that data is stored in such a way that it is almost impossible to view by an anonymous user. 2. PROBLEM STATEMENT A. Data is stored in centralized server. As to storing the user data, it has been storedinbigserversas it also takes an ample amountof space. It has been said thatif any one of the servers fails, the whole network collapse due to that loss of data, which is dangerous for the user as if their data has been lost. Due to that, you cannot retrieve your information back to overcome this issue. So here comes our project in the picture, whereas the high- tech company stores their user in the server. At the same time, there is no guarantee that your data will be safe. Where data is stored in a hard disk somewhere in the cloud, which has been shared across multiple machines, whereas our project stores a small subset of data on each user based on the actual data that they consume via a peer-to-peer connection. B. Lack of loyalty As in today's fast-growing world, whenever we search for some product in a search engine after a while, we see a pop- up coming out of know ware showing the exact related product that you searched a while ago. Guess how they came to know that you were looking forthisproduct.Thismaylead someone is monetizing your activity that your data is not secure, which means your data has been shared with a different company that you are not aware of, which means you have no longer control over your data where as in our project the data is stored in a subset of data based on actual data. Which is much more securethan the centralizedserver.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 250 3. COMPONENTS Fig.1: Diagram of Decentralized web Gun.js: - Gun.js decentralized graph database is a centralized database that which on a server hosted by big tech data in the gun is distributed across multiple peersorusersthrough the use of webRTC and end-user like user requiresa specific graphic data to use your app while another user requires an entirely different one with a few shared data points in between each peer can store the data it needs in the browsers local storage thensync changeswithotherpeers in the network a peer might be one of your end-users ora relay server that you deploy to make thesystemmorereliablethat means the entire database is the union of all graphs on the network, and no one machine controls the entire system a decentralized fire stored where you get real-time updates offline mode and the illusion of what latency the data itselfis managed through a minimal graph API where each record is a node that contains a unique ID and any other custom data for that entity in plain JavaScript any node on the graph can reference another node allowing you to create an infinite chain of circular dependencies. an individual node never contains a duplicate of another node just a reference to it allowing you to model complex relationships without the need for a schema. Radisk: - The Radisk Storage Engine (RAD)isanin-memory,aswell as on-disk radix tree that saves the GUN databasegraphforfast and performant look-ups. Radix trees have a constant lookup-time. webRTC: - webRTC exchange real-time audio video streams with your friends entirely in the browser to capitalize on the work from home boom then webRTC is the API because it allows you to establish a peer-to-peer connection between two or more browsers where they can exchange audio video media directly without the need for a third-party server or native app webRTC will make a series of requests to a stun server. Svelte: - Svelte it's a JavaScript tool for building UI components, whereas svelte is a compiler it converts the declarative code that writes as a developer into imperative code that works with native browser APIs. As a result, to get highly performant code in a tiny package, but most importantly,it's the only JavaScript framework that's actually used to create components in dot spelt files which containthreemain parts a script for your JavaScript code which canalsobetypescript a style tag for your CSS which can also use a preprocessor like as and the main template represented as HTML 4. PROJECT DESCRIPTION Fig. 2: User Flow Diagram We made a chat web app where the data and infrastructure are not controlled by a big tech company instead it is decentralized across the entire user base using web technologies. We built this decentralized chat application using a library called gun.js and for the front- end UI, we have used Svelte a JavaScript library (an open- source front-end compiler). A gun.js is a decentralized graph database, a normal database that stores all the data in a harddisk somewhere in the cloud it may be shared across multiple machines,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 251 but for all intents a purpose we can imagine our entire data set on a single disk whereas gun.js also storesa small subset of data on each user based on the actual data they consume in the application. When a user makes a query for some data it will search across the network for the other users that have that data and sync up using webRTC which is a web real-time communication, so it is like an entire database as the union of all peers on the network. It’s like a peer-to-peer network that data is stored in such a way that it is almost impossible to view as a very secure encryption functionis used, this idea is very similar to a blockchainledger where no individual has control of the entire network but it is not a blockchain technology which tends to be too slow. For user authentication when we create a new user account this will generate secure key pair cryptographically andthekeyisassociatedwiththepublic key so the past message can be found and the password is proof of work seed to prove and to decrypt access to an account's private keys. For the data to be persisted if a user just clears the browser cache data, in the browser's the local storage is limited to 5 megabytes and if a user clears out the data in local storage it could potentially be lost if it's not somewhere else on the network probably not acceptable but for this, we deploy a relay server that uses a different storage mechanism called Radisk thatcanstorea lotmore data on the disk of an actual server and which will make the network more robust because if a query falls back toa relay if it's not available from another peer by creating a node in the database which will be available to the entire decentralized network. 5. PROJECT IMPLEMENTATION We have used a Svelte app with two main features email password user authentication and then a massive group chat room that anybody can join the only dependency in this project is gun.js which we installed with npm. The first thing we will focus on is user authentication and to do that we created a file called user.js, at the file we imported gun.js, and below that we imported two supporting librariesthefirst one SEA(SecurityEncryption and Authorization) which is the module that enables user authentication and we use AXE (Advanced Exchange Equation) it is an alternative way to connect peers together and tends to be more performant for a chat app. We created a variable called DB to initialize the database then used it to refer to the currently authenticated user, we also changed the option of recall to session storage, so the user stays logged in between browser sessions. To manage the user in the app, we need to know if the user is logged in and we also want their username so we can show it in the UI (User Interface). We get the username by making a reference to the user then calling git alias which will be the value of whatever username users choose and when they sign up, we then going to use this value frequently throughout the application. So, for that, we imported writable from the Svelte store to make it reactive. A store is like an observable value that will re-render the UI whenever it’s changed and it can be shared across multiple components sowheneverthealias for the current user updates, we will set the value of the store to that value but we also want to listen to changesto the authorization state when the user signs in sign-out. To handle that we'll listen to the authorization events on the database and do the same thing where we fetch the alias and then set that as the value on the store. In Svelte we have the Header - it's component where it will show the title of the app when you're not logged in but if you are logged in it'll show your usernameaswell as your avatar. Now to implement sign out we imported the username store and the gun user object then we created a function called sign out that calls will leave on the user and set the username store to an empty string. Then in ourHTMLfile, we have a button that when clicked we'll call thesignouta function but we only want to show that button if the user is signed in and the way we can tell if a user is signed in is if their username is present in svelte, we do that with a store in any component by adding an if statement followed by a '$' dollar sign and then the name of the store. The dollar sign will subscribe to the store and react to any changes that happen to it iftheusernamedoesexist then we will go ahead and show the username by subscribing to the store once again, we also did the same thing to show an avatar with the user’s initials by using DiceBear API which will make a unique avatar based on the username as the random seed, then we have a button that has the sign out function when clicked and we add an else block to show something else if the user is not logged in, this is about the header component and we declared it in the app component also. Now on to the login component which will allow the user to sign in or sign up with their username and password, we will import the user object and then set up the local state for the username and password. In svelte we can implement two-way data binding with a variable by creating a form input and then stating bind value to that variable which means anytime user types into the form, the value of the variable will change. We have created separate form inputs for username and password, and we will share them for both the login and
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 252 signup process which itself just consists of two different buttons that will either call the login function or the sign- up function. To user log in, we used the user auth method which consists of three arguments, takes the username and password as first and second arguments and in the third argument, we defined a callback, in this case the callback is the value of the store that we set up earlier which will update automatically. Now to sign up a new user is very similar to the previous but instead of calling auth we call that create method on the user and if the user creation is successful then we will log that user in automatically. Now at this point, we have a working user authentication system. For the main chat component which is where we query items from the database and which also gives the user the ability to send a message. The chat component has two pieces of state, a string for a new message that the user will type into form input and an array of messages which will contain the message text along with the user who sent it and a timestamp. To query messages, we set up the onMount lifecycle hook that will run whenever the component is first initialized, inside it, we used the database to make a reference to the chat node as for creating super chat we just give it a name of chat. Then we just call map to loop over everysinglemessagein the chat and then call once to only read each message once, in this case each message is immutable so we don't need to listen to changes in real-time, then we defined a call-back that will be called on each new messagethatwill give us access to the data and the id of that node. Now if the data is defined, we format a message more suitable for the User Interface with the properties of who, what, and when. 1. Who - It is the user that sent the message and we can figure out who sent it by taking that data of the raw message and using it to get the alias, 2. What - It is the actual text of the user’s message, 3. When - It is the property to get an accurate timestamp across all of our users, we're using Gun state as the final source of truth with the raw data, this gives us all the data we need for the User Interface. Then we take each message and add it to an array that we can then loop over it in the UI (User Interface) with Svelte. We loop overran array of items in svelte with each this will render the chat message component for each message inthe array and by adding parentheseswithmessage-When,which will provide svelte with a unique key to sort all themessages efficiently by which we read messages in the chat. We made a form to submit them in the UI (User Interface), in the form on the submit event will call the send message function. Inside that function, we use SEA to encrypt the actual message text and the key is the same as the one we used earlier to decrypt the messages. Now we can associate the message to the currentuserusingtheencryptedmessage as the value then we created a date to serve as the index for the message so it can be sorted properly at which point, we can reference the chat collection create a new node based on that index and store the message value. 6. ADVANTAGES 1. For Government/Military officials: - It will be very useful for government security officials when they need to send their confidential messages or information regarding any work or to send their data to their intenders for some official reasons without any third-party involvement. As they don’t need to trust any other application. 2. Users don’t have to put trust in any Central authority. a. You don’t need to trust any other chat application that is workingona centralized server or followed by the third parties that use or sell your data, information, photos to any adman who follows you around the internet. As this decentralized chat application will be useful for securing your data you should be able to reduce or eliminate the trust that you’re required to put into third parties. 7. CONCLUSION Decentralized applications tend to form the interaction between two people more efficientandsimpler.Thechatting process nowadays features a mediating node, while our software doesn't have any mediating device/node i.e. Every person is connected by a peer-to-peer network. A Decentralized network can be a key technology that can solve privacy and confidentiality-related issues that exist in the Traditional or existing messaging system. 8. REFERENCES [1] Sourabh, Deepanker Rawat,Karan Kapkoti,Sourabh Aggarwal,Anshul Khanna, "bChat: A Decentralized Chat Application",Inderprastha Engineering College, Uttar Pradesh, India,(IRJET).
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 253 [2] Peter Menegay, Jason Salyers,Griffin College,"Secure Communications Using BlockchainTechnology",Milcom 2018 Track 3 - Cyber Security and Trusted Computing. [3] Suman Kumar Das, Zenlabs, Zensar Technologies, Pune, India,"Secure Messaging Platform Using Blockchain Technology”, (IJRES), ISSN (Online): 2320-9364, ISSN (Print): 2320-9356. [4] Abhishek P. Takale,Chaitanya V. Vaidya,Suresh S. Kolekar,"Decentralized Chat Application using Blockchain Technology",Rajendra Mane College Of Engineering And Technology, Ambav, India.(IJREAM). [5] Muhammed Kuliya, Hassan Abubakar,"SecuredChatting System Using Cryptography", Lovely Professional University, Punjab India,(IJCRT). [6] “A WebRTC Video Chat Implementation Within the Yioop Search Engine”(2019). By Ho, Yangcha, Master’s projects. 726. DOI:https://doi.org/10.31979/etd.dtz2- hstt . [7] “A secure Chat Application Based on Peer-to-Peer Architecture”, Mohamad Afendee Mohamed, Abdullah Muhammed, and Mustafa Man on 28-05-2015 in Journal of Computer Science. [8] Secure Peer-to-Peer communication based on Blockchain Kahina Khacef, Guy Pujolle. [9] https://gun.eco/docs/Radisk [10] https://gun.eco/docs/API [11] https://webrtc.org/getting-started/peer-connections [12] https://svelte.dev/docs [13] https://relay.dev/docs/