SlideShare a Scribd company logo
1 of 17
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
BELAGAVI-590 018,KARNATAKA
7th SEM PROJECT PHASE-I (18CSP77)
ON
“BLOCKCHAIN BASED CLOUD FILE RESOURCE SHARING SYSTEM”
PROJECT ASSOCIATES
ABHISHEK V 4BD20CS004
ANOOP M 4BD20CS014
SAGAR K R 4BD20CS082
ADITYA D BENKIKERE 4BD20CS122
PROJECT GUIDES
Dr.CHETANA PRAKASH B.E,M.S,Ph.D(CSE) Prof.SUPREETA S M M.Tech
Associate Professor, BIET Assistant Professor, BIET
Guide Guide
BAPUJI INSTITUTE OF ENGINEERING AND TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CONTENTS :
1.INTRODUCTION
2. LITERATURE SURVEY
3. EXISTING SYSTEM
4. PROPOSED SYSTEM
5. PROBLEM STATEMENT
6. METHODOLOGY
7. FLOWCHART
8.SYSTEM REQUIREMENTS
9.CONCLUSION
INTRODUCTION:
• Nowadays, cloud infrastructure is used to store many confidential files from many
individuals and providing security to those files is a major task.
• This Blockchain based cloud file storage system prevents such data thefts as it doesn’t store
the actual data but it only stores the hash value of the file.
• User needs to register a transaction with owner in order to get access to a file.
• This process is achieved by using Secured Hashing Algorithm (SHA-256).
LITERATURE SURVEY:
[1] “Cloud based File Sharing” by Pragathi Shetty, Rajkumari Sunanda, Soumyashree K S, Swathi N
G and Hemanth Kumar N P, 4th May 2018.
Use of only cloud sharing which led to the security issues
[2] “Implementation of Data encryption and decryption using DES algorithm” by Deepak Guled,
Nagaraj Angadi, Soumya Gali, Vidya M and Deepti Raj, 20th Jan 2019.
Use of DES requires huge computational cost and also has the performance issues when compared with
the AES(Advance Encryption Standard)
[3] “Adoption of cloud computing as innovation in the organization” by Lewis Goligthly, Victor
Chang, and Ben SC Liu , 31st May 2022.
Use of the private clouds in organization isn’t that feasible as it faces scalability issues.
[4] “Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed
System” by Xiaolu Zhang, Justin Grannis, Ibrahim Baggili and Nicole Lang Beebe, 3rd February
2019.
Use of centralized server for communication control which resulted in the sharing of the files to the
Unauthorized personnel.
[5] “Sharing files using Cloud Storage Services” by Tiago Olivera, Ricardo and Alysson S Bessani,
24th February 2019.
Since here the security is handed over to a third party service provider the users data is still vulnerable
to data thefts which can lead to leakage of some confidential organization data.
LITERETURE SUMMARY :
• Use of http : Issue with file size
• Use of cloud : Security issue
• Use of Blockchain : Expensive
To over come the above issues fallowing technologies are used:
• RSA,DES,AES algorithm for Encryption to deal with the security issue
• SHA algorithm for hashing to deal with security issue
• IPFS to stote the data in decentralized form and which is also less expensive
Combining the different technologies can lead to efficient and secure file sharing system like combining the
cloud sharing and blockchain with AES , SHA and IFPS which overcomes almost all the limitations
mentioned above.
EXISTING SYSTEM:
 Earlier, people relied over FTP(File Transfer Protocol) for transferring
of files which has many limitations like max. of only 2 GB file was
allowed to transfer.
 Later, to overcome such issues cloud infrastructure was used to store
and transfer the data. But still the security issues remained as it is as
here a third party service providers which still had issues.
 And another major issue in both FTP and cloud transfer was that both
were a centralized networks where the central authority has the
complete access to the data.
PROPOSED SYSTEM:
 To overcome the problem of the data insecurity a much enhanced system which can transfer data
files of any size with enhanced security measures, this is a decentralized and a peer-to-peer system
which is based on Blockchain.
 Here, blocks are created using socket programming which updates the number of blocks created in
the Blockchain immediately
PROBLEM STATEMENT:
• A cloud file system is a storage system that allows for the shared access to file data.
• Cloud file sharing security is managed through user and group permissions,
allowing the data owner to tightly control the access to the shared file data.
• Users can easily share files with one another by using our blockchain-based
application and the cloud-based file sharing method.
• As a result, this system enables users to easily and effectively store and share files
via cloud networks.
METHODOLOGy:
1. SYSTEM ARCHITECTURE:
 IPFS (Inter Planetary File System): Distributes files across a peer-to-peer network, providing
decentralized storage and content addressing.
 Blockchain: Records file metadata (hashes, ownership, access control) and transactions, ensuring
tamper-proofness and transparency.
 Cloud Storage: May be used optionally for storing encrypted files or large files not suitable for IPFS.
2. DECENTRALIZED STORAGE WITH IPFS(INTER PLANETARY FILE SYSTEM):
 Integrate IPFS for decentralized file storage and retrieval.
 When a user uploads a file, break it into blocks, hash each block using SHA-256, and then store the
blocks on IPFS.
 Record IPFS hash references on the blockchain to ensure traceability.
3.ENCRYPTION WITH AES-128(ADVANCED ENCRYPTION STANDARDS)
 Implement AES-128 encryption for file data before storing it on IPFS.
 Use a secure key management system to handle encryption keys.
Consider using different keys for each file or each user to enhance security.
4.HASHING WITH SHA-256(SECURED HASHING ALGORITHM):
 Use SHA-256 for hashing critical information such as file metadata, IPFS hash references, and user
details.
 Leverage SHA-256 for integrity verification during file retrieval and auditing.
5.USER AUTHENTICATION AND ACCESS CONTROL:
 Implement a secure user authentication mechanism using blockchain-based identities or traditional
authentication methods.
 Define access control rules in smart contracts to manage user permissions for file sharing.
6.AUDITING AND LOGGING:
 Implement logging mechanisms to record user activities and file transactions on the blockchain.
 Use hashing for creating secure digests of logs to maintain integrity.
Fig : Methodology
FLOWCHART
Adding a block:
Data transfer through Blockchain:
SYSTEM REQUIREMENTS
Hardware Requirement
 Windows 7 or higher
 I3 processor system or higher
 4 GB RAM or higher
 100 GB Internal memory or higher
Software Requirement
 Visual Studio
 SQL Server Management Studio
9.CONCLUSION
Securing the data during storage or even while transferring is the most important
thing demanded by the data owners as the data being stored can be much
confidential like a document which belongs to defence ministry of a country or
even the crime records of a criminal being transferred from one police station to
another. Blockchain network being a decentralized and peer-to-peer network
provides the enhanced security to the data files being stored and also maintains the
confidentiality of the sender and the receiver. Blockchain plays a major role also
in carrying out the transaction between the sender and receiver in a secured
manner.

More Related Content

Similar to Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht

Authenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsAuthenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsPvrtechnologies Nellore
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
APS-Presentation-MK.pptx
APS-Presentation-MK.pptxAPS-Presentation-MK.pptx
APS-Presentation-MK.pptxMadhura Arvind
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET Journal
 
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINIRJET Journal
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...NAUMAN MUSHTAQ
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPvrtechnologies Nellore
 
Secure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved ReliabilitySecure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved Reliability1crore projects
 
Secure distributed deduplication systems
Secure distributed deduplication systemsSecure distributed deduplication systems
Secure distributed deduplication systemsPvrtechnologies Nellore
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationTmks Infotech
 

Similar to Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht (20)

Authenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsAuthenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systems
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
APS-Presentation-MK.pptx
APS-Presentation-MK.pptxAPS-Presentation-MK.pptx
APS-Presentation-MK.pptx
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Secure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved ReliabilitySecure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved Reliability
 
Secure distributed deduplication systems
Secure distributed deduplication systemsSecure distributed deduplication systems
Secure distributed deduplication systems
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 

Recently uploaded

社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token PredictionNABLAS株式会社
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...BabaJohn3
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjadimosmejiaslendon
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfgreat91
 
How to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsHow to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsBrainSell Technologies
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Klinik Aborsi
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样jk0tkvfv
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancingmohamed Elzalabany
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives23050636
 
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam DunksNOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam Dunksgmuir1066
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxStephen266013
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Valters Lauzums
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证pwgnohujw
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationmuqadasqasim10
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...yulianti213969
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证pwgnohujw
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证acoha1
 
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...yulianti213969
 
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单aqpto5bt
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...ThinkInnovation
 

Recently uploaded (20)

社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
 
How to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsHow to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data Analytics
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam DunksNOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptx
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic information
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
 
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 

Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht

  • 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY BELAGAVI-590 018,KARNATAKA 7th SEM PROJECT PHASE-I (18CSP77) ON “BLOCKCHAIN BASED CLOUD FILE RESOURCE SHARING SYSTEM” PROJECT ASSOCIATES ABHISHEK V 4BD20CS004 ANOOP M 4BD20CS014 SAGAR K R 4BD20CS082 ADITYA D BENKIKERE 4BD20CS122 PROJECT GUIDES Dr.CHETANA PRAKASH B.E,M.S,Ph.D(CSE) Prof.SUPREETA S M M.Tech Associate Professor, BIET Assistant Professor, BIET Guide Guide BAPUJI INSTITUTE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
  • 2. CONTENTS : 1.INTRODUCTION 2. LITERATURE SURVEY 3. EXISTING SYSTEM 4. PROPOSED SYSTEM 5. PROBLEM STATEMENT 6. METHODOLOGY 7. FLOWCHART 8.SYSTEM REQUIREMENTS 9.CONCLUSION
  • 3. INTRODUCTION: • Nowadays, cloud infrastructure is used to store many confidential files from many individuals and providing security to those files is a major task. • This Blockchain based cloud file storage system prevents such data thefts as it doesn’t store the actual data but it only stores the hash value of the file. • User needs to register a transaction with owner in order to get access to a file. • This process is achieved by using Secured Hashing Algorithm (SHA-256).
  • 4. LITERATURE SURVEY: [1] “Cloud based File Sharing” by Pragathi Shetty, Rajkumari Sunanda, Soumyashree K S, Swathi N G and Hemanth Kumar N P, 4th May 2018. Use of only cloud sharing which led to the security issues [2] “Implementation of Data encryption and decryption using DES algorithm” by Deepak Guled, Nagaraj Angadi, Soumya Gali, Vidya M and Deepti Raj, 20th Jan 2019. Use of DES requires huge computational cost and also has the performance issues when compared with the AES(Advance Encryption Standard) [3] “Adoption of cloud computing as innovation in the organization” by Lewis Goligthly, Victor Chang, and Ben SC Liu , 31st May 2022. Use of the private clouds in organization isn’t that feasible as it faces scalability issues.
  • 5. [4] “Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed System” by Xiaolu Zhang, Justin Grannis, Ibrahim Baggili and Nicole Lang Beebe, 3rd February 2019. Use of centralized server for communication control which resulted in the sharing of the files to the Unauthorized personnel. [5] “Sharing files using Cloud Storage Services” by Tiago Olivera, Ricardo and Alysson S Bessani, 24th February 2019. Since here the security is handed over to a third party service provider the users data is still vulnerable to data thefts which can lead to leakage of some confidential organization data.
  • 6. LITERETURE SUMMARY : • Use of http : Issue with file size • Use of cloud : Security issue • Use of Blockchain : Expensive To over come the above issues fallowing technologies are used: • RSA,DES,AES algorithm for Encryption to deal with the security issue • SHA algorithm for hashing to deal with security issue • IPFS to stote the data in decentralized form and which is also less expensive Combining the different technologies can lead to efficient and secure file sharing system like combining the cloud sharing and blockchain with AES , SHA and IFPS which overcomes almost all the limitations mentioned above.
  • 7. EXISTING SYSTEM:  Earlier, people relied over FTP(File Transfer Protocol) for transferring of files which has many limitations like max. of only 2 GB file was allowed to transfer.  Later, to overcome such issues cloud infrastructure was used to store and transfer the data. But still the security issues remained as it is as here a third party service providers which still had issues.  And another major issue in both FTP and cloud transfer was that both were a centralized networks where the central authority has the complete access to the data.
  • 8. PROPOSED SYSTEM:  To overcome the problem of the data insecurity a much enhanced system which can transfer data files of any size with enhanced security measures, this is a decentralized and a peer-to-peer system which is based on Blockchain.  Here, blocks are created using socket programming which updates the number of blocks created in the Blockchain immediately
  • 9. PROBLEM STATEMENT: • A cloud file system is a storage system that allows for the shared access to file data. • Cloud file sharing security is managed through user and group permissions, allowing the data owner to tightly control the access to the shared file data. • Users can easily share files with one another by using our blockchain-based application and the cloud-based file sharing method. • As a result, this system enables users to easily and effectively store and share files via cloud networks.
  • 10. METHODOLOGy: 1. SYSTEM ARCHITECTURE:  IPFS (Inter Planetary File System): Distributes files across a peer-to-peer network, providing decentralized storage and content addressing.  Blockchain: Records file metadata (hashes, ownership, access control) and transactions, ensuring tamper-proofness and transparency.  Cloud Storage: May be used optionally for storing encrypted files or large files not suitable for IPFS. 2. DECENTRALIZED STORAGE WITH IPFS(INTER PLANETARY FILE SYSTEM):  Integrate IPFS for decentralized file storage and retrieval.  When a user uploads a file, break it into blocks, hash each block using SHA-256, and then store the blocks on IPFS.  Record IPFS hash references on the blockchain to ensure traceability.
  • 11. 3.ENCRYPTION WITH AES-128(ADVANCED ENCRYPTION STANDARDS)  Implement AES-128 encryption for file data before storing it on IPFS.  Use a secure key management system to handle encryption keys. Consider using different keys for each file or each user to enhance security. 4.HASHING WITH SHA-256(SECURED HASHING ALGORITHM):  Use SHA-256 for hashing critical information such as file metadata, IPFS hash references, and user details.  Leverage SHA-256 for integrity verification during file retrieval and auditing. 5.USER AUTHENTICATION AND ACCESS CONTROL:  Implement a secure user authentication mechanism using blockchain-based identities or traditional authentication methods.  Define access control rules in smart contracts to manage user permissions for file sharing.
  • 12. 6.AUDITING AND LOGGING:  Implement logging mechanisms to record user activities and file transactions on the blockchain.  Use hashing for creating secure digests of logs to maintain integrity.
  • 15. Data transfer through Blockchain:
  • 16. SYSTEM REQUIREMENTS Hardware Requirement  Windows 7 or higher  I3 processor system or higher  4 GB RAM or higher  100 GB Internal memory or higher Software Requirement  Visual Studio  SQL Server Management Studio
  • 17. 9.CONCLUSION Securing the data during storage or even while transferring is the most important thing demanded by the data owners as the data being stored can be much confidential like a document which belongs to defence ministry of a country or even the crime records of a criminal being transferred from one police station to another. Blockchain network being a decentralized and peer-to-peer network provides the enhanced security to the data files being stored and also maintains the confidentiality of the sender and the receiver. Blockchain plays a major role also in carrying out the transaction between the sender and receiver in a secured manner.