Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY
BELAGAVI-590 018,KARNATAKA
7th SEM PROJECT PHASE-I (18CSP77)
ON
“BLOCKCHAIN BASED CLOUD FILE RESOURCE SHARING SYSTEM”
PROJECT ASSOCIATES
ABHISHEK V 4BD20CS004
ANOOP M 4BD20CS014
SAGAR K R 4BD20CS082
ADITYA D BENKIKERE 4BD20CS122
PROJECT GUIDES
Dr.CHETANA PRAKASH B.E,M.S,Ph.D(CSE) Prof.SUPREETA S M M.Tech
Associate Professor, BIET Assistant Professor, BIET
Guide Guide
BAPUJI INSTITUTE OF ENGINEERING AND TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
2. CONTENTS :
1.INTRODUCTION
2. LITERATURE SURVEY
3. EXISTING SYSTEM
4. PROPOSED SYSTEM
5. PROBLEM STATEMENT
6. METHODOLOGY
7. FLOWCHART
8.SYSTEM REQUIREMENTS
9.CONCLUSION
3. INTRODUCTION:
• Nowadays, cloud infrastructure is used to store many confidential files from many
individuals and providing security to those files is a major task.
• This Blockchain based cloud file storage system prevents such data thefts as it doesn’t store
the actual data but it only stores the hash value of the file.
• User needs to register a transaction with owner in order to get access to a file.
• This process is achieved by using Secured Hashing Algorithm (SHA-256).
4. LITERATURE SURVEY:
[1] “Cloud based File Sharing” by Pragathi Shetty, Rajkumari Sunanda, Soumyashree K S, Swathi N
G and Hemanth Kumar N P, 4th May 2018.
Use of only cloud sharing which led to the security issues
[2] “Implementation of Data encryption and decryption using DES algorithm” by Deepak Guled,
Nagaraj Angadi, Soumya Gali, Vidya M and Deepti Raj, 20th Jan 2019.
Use of DES requires huge computational cost and also has the performance issues when compared with
the AES(Advance Encryption Standard)
[3] “Adoption of cloud computing as innovation in the organization” by Lewis Goligthly, Victor
Chang, and Ben SC Liu , 31st May 2022.
Use of the private clouds in organization isn’t that feasible as it faces scalability issues.
5. [4] “Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed
System” by Xiaolu Zhang, Justin Grannis, Ibrahim Baggili and Nicole Lang Beebe, 3rd February
2019.
Use of centralized server for communication control which resulted in the sharing of the files to the
Unauthorized personnel.
[5] “Sharing files using Cloud Storage Services” by Tiago Olivera, Ricardo and Alysson S Bessani,
24th February 2019.
Since here the security is handed over to a third party service provider the users data is still vulnerable
to data thefts which can lead to leakage of some confidential organization data.
6. LITERETURE SUMMARY :
• Use of http : Issue with file size
• Use of cloud : Security issue
• Use of Blockchain : Expensive
To over come the above issues fallowing technologies are used:
• RSA,DES,AES algorithm for Encryption to deal with the security issue
• SHA algorithm for hashing to deal with security issue
• IPFS to stote the data in decentralized form and which is also less expensive
Combining the different technologies can lead to efficient and secure file sharing system like combining the
cloud sharing and blockchain with AES , SHA and IFPS which overcomes almost all the limitations
mentioned above.
7. EXISTING SYSTEM:
Earlier, people relied over FTP(File Transfer Protocol) for transferring
of files which has many limitations like max. of only 2 GB file was
allowed to transfer.
Later, to overcome such issues cloud infrastructure was used to store
and transfer the data. But still the security issues remained as it is as
here a third party service providers which still had issues.
And another major issue in both FTP and cloud transfer was that both
were a centralized networks where the central authority has the
complete access to the data.
8. PROPOSED SYSTEM:
To overcome the problem of the data insecurity a much enhanced system which can transfer data
files of any size with enhanced security measures, this is a decentralized and a peer-to-peer system
which is based on Blockchain.
Here, blocks are created using socket programming which updates the number of blocks created in
the Blockchain immediately
9. PROBLEM STATEMENT:
• A cloud file system is a storage system that allows for the shared access to file data.
• Cloud file sharing security is managed through user and group permissions,
allowing the data owner to tightly control the access to the shared file data.
• Users can easily share files with one another by using our blockchain-based
application and the cloud-based file sharing method.
• As a result, this system enables users to easily and effectively store and share files
via cloud networks.
10. METHODOLOGy:
1. SYSTEM ARCHITECTURE:
IPFS (Inter Planetary File System): Distributes files across a peer-to-peer network, providing
decentralized storage and content addressing.
Blockchain: Records file metadata (hashes, ownership, access control) and transactions, ensuring
tamper-proofness and transparency.
Cloud Storage: May be used optionally for storing encrypted files or large files not suitable for IPFS.
2. DECENTRALIZED STORAGE WITH IPFS(INTER PLANETARY FILE SYSTEM):
Integrate IPFS for decentralized file storage and retrieval.
When a user uploads a file, break it into blocks, hash each block using SHA-256, and then store the
blocks on IPFS.
Record IPFS hash references on the blockchain to ensure traceability.
11. 3.ENCRYPTION WITH AES-128(ADVANCED ENCRYPTION STANDARDS)
Implement AES-128 encryption for file data before storing it on IPFS.
Use a secure key management system to handle encryption keys.
Consider using different keys for each file or each user to enhance security.
4.HASHING WITH SHA-256(SECURED HASHING ALGORITHM):
Use SHA-256 for hashing critical information such as file metadata, IPFS hash references, and user
details.
Leverage SHA-256 for integrity verification during file retrieval and auditing.
5.USER AUTHENTICATION AND ACCESS CONTROL:
Implement a secure user authentication mechanism using blockchain-based identities or traditional
authentication methods.
Define access control rules in smart contracts to manage user permissions for file sharing.
12. 6.AUDITING AND LOGGING:
Implement logging mechanisms to record user activities and file transactions on the blockchain.
Use hashing for creating secure digests of logs to maintain integrity.
16. SYSTEM REQUIREMENTS
Hardware Requirement
Windows 7 or higher
I3 processor system or higher
4 GB RAM or higher
100 GB Internal memory or higher
Software Requirement
Visual Studio
SQL Server Management Studio
17. 9.CONCLUSION
Securing the data during storage or even while transferring is the most important
thing demanded by the data owners as the data being stored can be much
confidential like a document which belongs to defence ministry of a country or
even the crime records of a criminal being transferred from one police station to
another. Blockchain network being a decentralized and peer-to-peer network
provides the enhanced security to the data files being stored and also maintains the
confidentiality of the sender and the receiver. Blockchain plays a major role also
in carrying out the transaction between the sender and receiver in a secured
manner.