SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5058
Blockchain based Secure Data Storage
Kumar Bhosale1, Kadaya Akbarabbas2, Jadhav Deepak3, Awani Sankhe4
1,2,3Student, Dept. of Computer Engineering, University of Mumbai, India
4Professor, Dept. of Computer Engineering, University of Mumbai, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Today’s cloud storage is completely dependent
exclusively on large storageproviders. Thesestorageproviders
act as trusted third parties, which transacts the data for
storing, sending and receiving the data from an organization.
This type of model poses a number of issues like high
operational cost, data availability and data security.
In this paper, we introduce a project that uses blockchain
technology to provide a secured distributed data storage. The
system allows the user to upload the data through Inter
Planetary File System (IPFS), which distributes the data
content to cloud nodes at global level network and ensures
data availability by fetching that data files through URLs
using the hash values of the files uploaded to IPFS. So the one
who has the hash value of that particular data which was
uploaded on IPFS network can only access the file from IPFS
network. Finally, the system supports the privacy of data by
ensuring the immutability property of the blockchain by
storing them on distributed global network. The project is
implemented using smart contracts and tested on Ethereum
blockchain platform using Ganache Blockchain.
Key Words: Inter Planetary File System, Cloud storage,
Ethereum, Ganache, Blockchain, Smart contracts etc.
1. INTRODUCTION
In the current era, there has been a problem of storing the
huge amount of data for big organizations, which work
globally. So, theseorganizationshaveturnedtocloudstorage,
which has excellent properties for storing and transferring
the data. But these cloud storage providers act as trusted
third party organization. This results in various security and
confidentiality problems. To overcome this problem this
paper presents the system which provides thestoringofdata
with the help ofBlockchainbasedInterPlanetaryFileSystem.
1.1 What is Blockchain?
A blockchain,[1][2][3] originally block chain,[4][5] is a
growing list of records or data, called blocks, which are
linked to each other using cryptography.[1][6] Each block
contains a cryptographic hash of previous block,[6] a
timestamp, and transaction data.
By design, a blockchain does not allow modification of the
data i.e. blockchain is immutable. It is “an open, distributed
ledger that can record transactions between two parties
efficiently and in a verifiable and permanent way”.[7] A
blockchain is typically managed by a global peer-to-peer
network collectively bonding to a protocol for
communication between inter-node and validation of new
blocks, to use this distributed ledger.Oncestored,thedatain
any block cannot bechanged retroactivelywithoutalteration
of any of the blocks within a blockchain, which requires
validation by consensus (a general agreement) of the
network majority. Even if blockchain records are not
unalterable, blockchain may be considered secured by its
design and illustrating a distributed networked computing
system with high Byzantine fault tolerance. Decentralized
consensus for validating has been claimed with a
blockchain.[8]
1.2 What is IPFS?
IPFS is Inter Planetary File System, which is open source.
Creator of IPFS is Juan Benet. It is an open source distributed
protocol, which works with the function of providing global
file system for all computing devices. Using IPFS within a
blockchain transaction, you can place immutable,permanent
links. In other words IPFS is a protocolandnetworkdesigned
to create a content-addressable, peer-to-peer method of
storing and sharing Hypermedia in a distributed file
system.[9]
Each file and all blocks within it are given a unique identifier,
which is a cryptographic hash. File structures in IPFS are
linked to each other using Merkle links and every file can be
found by using a decentralized naming system called IPNS,
which gives human-readable names. The implementation of
this Merkle DirectedAcyclicGraphs(DAGS),whichillustrates
the linking of the files, is important to the underlying
functionality of the IPFS protocol, but itismorecomplexthan
the scope of this paper.
2. IMPLEMENTATION
2.1 Installing Dependencies
There are some dependencies, which are needed to be
installed and configured in order to further get started with
the project building.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5059
2.1.1 Ganache
Fig -1: Ganache
This dependency is a personal blockchain, which is a local
development blockchain that can be used to act as a public
blockchain.Ganache isusedtodeploysmartcontractsandfor
running tests. Here you have a personal blockchain network
running. Ganache provides 10 accountswith100Ethertotest
our smart contracts on local blockchain bases.
2.1.2 Node.JS
Since we have a private or local blockchain running, we need
to configureour environmentfordevelopingsmartcontracts.
For that, we will require Node Package Manager or NPM,
which includes Node.js
2.1.3 Truffle Framework
Fig -2: Truffle framework
Truffle Framework is an essential tool for developing
Ethereum smart contracts. It uses the Solidity programming
language to develop smart contracts. Truffle framework
provides following functionalities:
 Client Side Development
 Script Runner
 Network Management
 Development Console
 Deployment & Migrations
 Smart Contract Management
 Automated Testing
2.1.4 Metamask
Fig -3: Metamask
Since current browsers do not support the connection to
blockchain networks. Adding Metamask extension to the
browser, converts the browser into a blockchain browser.
Using Metamask, we can connect our Ganache accounts to
deploy our project. MetaMask is also used to manage the
personal accounts, which are used to connect to the
blockchain and transaction purposes.
MetaMask is an extension or plugin that allows us to visit the
distributed web in your browser. It allows you to run
Ethereum Decentralized applications right in your browser
without running a full Ethereum blockchain.
MetaMask includes a secure identity vault, providing a user
interface to manage your identities ondifferentsitesandsign
blockchain transactions. We caninstalltheMetaMaskadd-on
in Chrome, Firefox and Opera.[10]
2.2 Project Setup
Our proposed system involves a user who wants to upload
the data or any file to the IPFS. We are configuring private
local blockchain provided by Ganache and integrating it to
web browser using Metamask extension.
Fig -4: File Upload
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5060
Workflow: As mentioned above first the user needs a local
blockchain network, which is provided by Ganache. The
accounts provided by Ganache are added to Metamask for
transaction purpose.Pertransaction,aspecificamountofGas
is needed in the form of Ether. Ether is a type of crypto token
that fuels the blockchain network.
Ganache provides 10 accounts; each account has 100Eth,
which can be used for transactions. Using these accounts, we
can run tests, execute commands and inspect state while
controlling how the chain operates on a personal Ethereum
blockchain. From these 10 accounts, any one account is used
to log on in Metamask using the private key provided by the
particular account in Ganache.
Now, as our Web browser supports blockchain network, we
can now upload the files through our own designed user
interface (UI).
In our user interface, the files are uploaded on to the Inter
Planetary File System (IPFS). When a file is selected for
uploading process a popup isgenerated by Metamask,which
verifies the transaction. After confirming the transaction the
Ether from our account is deducted, else we can reject the
transaction. Since the file is uploaded, IPFS generates a
unique IPFS hash value of that file which is obtained in
console of web browser.
Fig -5: File Retrieval
The process of retrieving the file back from IPFS requires the
previously obtained IPFShashvalue,whichisgeneratedafter
uploading the file. IPFS Gateway (https://ipfs.io/ipfs/) is
required. We have to put the IPFShash in the URL, IPFS will
search for the file, and preview is shown. Thus, the file is
retrieved back from the IPFS System.
3. RESULTS
As we are using Linux Mint Cinnamon 19.1 for this project
implementation so the below results are been tested on the
linux operating system. Following screenshots are the steps
for usage of the project, which shows the actual procedureof
uploading a fileonIPFSsystemusingBlockchainsuccessfully.
Uploaded file can be retrieved using the IPFS Gateway
(https://ipfs.io/ipfs/).
Fig -6: Initiating Local Blockchain
First, we need to initiate the blockchain by starting the
Ganache. Then we need to choose an account from these 10
accounts as shown in fig.6 provided by Ganache to be logged
in to Metamask.
Fig -7: User Interface
After login in to Metamask, try uploading a file from user
interface as shown in fig.7.
Fig -8: Transaction verification
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5061
Submitting of file needs to be verified. Metamask asshownin
fig.8 does this verification process.
Fig -9: Transaction verification
As soon as the transaction is confirmed, the file is uploaded
on to the IPFS. After uploading the file, IPFS gives back the
hash value of that file so that it can be retrieved back. In fig.8
an image file is uploaded which is previewed by using the
hash value as shown in fig.9 provided by IPFS as it was
uploaded.
4. CONCLUSION
Project outlined in this paper is our own implementation of
Data Storage using IPFS and local blockchain. Although still,
there remains much to do in terms of development and
improvement in this model. Blockchain based Secure Data
Storage is created as a model with IPFS as storage by using
the dependencies viz. NPM, Truffle, Metamask and Ganache.
Files are stored in the IPFS and the hash obtained after
uploading is use to retrieve the File back again. Thus a
victorious result is obtained and is implemented as per the
idea described in the paper.ItalsocleartheconcepthowIPFS
and Blockchain network can be integrated to develop a
Decentralized Storage application.
REFERENCES
[1] "Blockchains: The great chain of being sure about
things". The Economist.31October2015. Archivedfrom
the original on 3 July 2016. Retrieved 18 June 2016. M.
Young, The Technical Writer’s Handbook. Mill Valley,
CA: University Science, 1989.
[2] Morris, DavidZ.(15May2016). "Leaderless,Blockchain-
Based Venture Capital Fund Raises $100 Million, And
Counting". Fortune. Archived from the original on 21
May 2016. Retrieved 23 May 2016.K. Elissa, “Title of
paper if known,” unpublished.
[3] Popper, Nathan (21 May 2016). "A Venture Fund With
Plenty of Virtual Capital, but No Capitalist". The New
York Times. Archived from the original on22May2016.
Retrieved 23 May 2016.
[4] Brito, Jerry; Castillo, Andrea (2013). Bitcoin: A Primer
for Policymakers (PDF) (Report). Fairfax, VA: Mercatus
Center, George Mason University. Archived (PDF) from
the original on 21 September 2013. Retrieved 22
October 2013.
[5] Trottier, Leo (18 June 2016). "original-bitcoin" (self-
published code collection). github. Archived from the
original on 17 April 2016. Retrieved 18June 2016.” This
is a historical repository of Satoshi Nakamoto's original
bit coin sourcecode”
[6] Narayanan, Arvind; Bonneau, Joseph; Felten, Edward;
Miller, Andrew; Goldfeder, Steven (2016). Bitcoin and
cryptocurrency technologies: a comprehensive
introduction. Princeton: Princeton University
Press. ISBN 978-0-691-17169-2.
[7] Iansiti, Marco; Lakhani, Karim R. (January 2017). "The
Truth About Blockchain". Harvard Business
Review. Harvard University. Archived from the original
on 18 January 2017. “Retrieved 17 January 2017. The
technology at the heart of bitcoin and other virtual
currencies, blockchainisanopen,distributedledgerthat
can record transactions between two parties efficiently
and in a verifiable and permanent way.”
[8] Raval, Siraj (2016). "What Is a Decentralized
Application?". Decentralized Applications: Harnessing
Bitcoin's Blockchain Technology. O'Reilly Media, Inc.
pp. 1–2. ISBN 978-1-4919-2452-5. OCLC 968277125.
Retrieved 6 November 2016 – via Google Books.
[9] Finley, Klint (20 June 2016). "The Inventors of the
Internet Are Trying to Build a Truly Permanent
Web". Wired.
[10] Metamask. “https://metamask.io/”

More Related Content

What's hot

IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
Opensource tools for OpenStack IAAS
Opensource tools for OpenStack IAASOpensource tools for OpenStack IAAS
Opensource tools for OpenStack IAAS
Satya Sanjibani Routray
 
CIS13: OpenStack API Security
CIS13: OpenStack API SecurityCIS13: OpenStack API Security
CIS13: OpenStack API Security
CloudIDSummit
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
chennuruvishnu
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
openfly
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
Papitha Velumani
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
Suraj Mehta
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threats
white paper
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
Debakshi_Chakraborty _CV
Debakshi_Chakraborty _CVDebakshi_Chakraborty _CV
Debakshi_Chakraborty _CV
debakshi chakraborty
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
webhostingguy
 
OpenStack Security
OpenStack SecurityOpenStack Security
OpenStack Security
openstackindia
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
webhostingguy
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
webhostingguy
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
vmshimavm
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
Nexgen Technology
 

What's hot (20)

IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Opensource tools for OpenStack IAAS
Opensource tools for OpenStack IAASOpensource tools for OpenStack IAAS
Opensource tools for OpenStack IAAS
 
CIS13: OpenStack API Security
CIS13: OpenStack API SecurityCIS13: OpenStack API Security
CIS13: OpenStack API Security
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threats
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Debakshi_Chakraborty _CV
Debakshi_Chakraborty _CVDebakshi_Chakraborty _CV
Debakshi_Chakraborty _CV
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
 
OpenStack Security
OpenStack SecurityOpenStack Security
OpenStack Security
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 

Similar to IRJET- Blockchain based Secure Data Storage

Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
IRJET Journal
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and Ethereum
IRJET Journal
 
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMBLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
IRJET Journal
 
M0937681
M0937681M0937681
M0937681
IOSR Journals
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
 
IRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing DatabasesIRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET Journal
 
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET-  	  Analysis of Forensics Tools in Cloud EnvironmentIRJET-  	  Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET Journal
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
IRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
IRJET - Ethegram - An Ethereum and IPFS-based Decentralized Social Network Sy...
IRJET - Ethegram - An Ethereum and IPFS-based Decentralized Social Network Sy...IRJET - Ethegram - An Ethereum and IPFS-based Decentralized Social Network Sy...
IRJET - Ethegram - An Ethereum and IPFS-based Decentralized Social Network Sy...
IRJET Journal
 
Blockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management SystemBlockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management System
IRJET Journal
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET Journal
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
IRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET Journal
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing Framework
IRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET Journal
 

Similar to IRJET- Blockchain based Secure Data Storage (20)

Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and Ethereum
 
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMBLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
 
M0937681
M0937681M0937681
M0937681
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
IRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing DatabasesIRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing Databases
 
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET-  	  Analysis of Forensics Tools in Cloud EnvironmentIRJET-  	  Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud Environment
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
IRJET - Ethegram - An Ethereum and IPFS-based Decentralized Social Network Sy...
IRJET - Ethegram - An Ethereum and IPFS-based Decentralized Social Network Sy...IRJET - Ethegram - An Ethereum and IPFS-based Decentralized Social Network Sy...
IRJET - Ethegram - An Ethereum and IPFS-based Decentralized Social Network Sy...
 
Blockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management SystemBlockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management System
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing Framework
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
AnasAhmadNoor
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 

IRJET- Blockchain based Secure Data Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5058 Blockchain based Secure Data Storage Kumar Bhosale1, Kadaya Akbarabbas2, Jadhav Deepak3, Awani Sankhe4 1,2,3Student, Dept. of Computer Engineering, University of Mumbai, India 4Professor, Dept. of Computer Engineering, University of Mumbai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Today’s cloud storage is completely dependent exclusively on large storageproviders. Thesestorageproviders act as trusted third parties, which transacts the data for storing, sending and receiving the data from an organization. This type of model poses a number of issues like high operational cost, data availability and data security. In this paper, we introduce a project that uses blockchain technology to provide a secured distributed data storage. The system allows the user to upload the data through Inter Planetary File System (IPFS), which distributes the data content to cloud nodes at global level network and ensures data availability by fetching that data files through URLs using the hash values of the files uploaded to IPFS. So the one who has the hash value of that particular data which was uploaded on IPFS network can only access the file from IPFS network. Finally, the system supports the privacy of data by ensuring the immutability property of the blockchain by storing them on distributed global network. The project is implemented using smart contracts and tested on Ethereum blockchain platform using Ganache Blockchain. Key Words: Inter Planetary File System, Cloud storage, Ethereum, Ganache, Blockchain, Smart contracts etc. 1. INTRODUCTION In the current era, there has been a problem of storing the huge amount of data for big organizations, which work globally. So, theseorganizationshaveturnedtocloudstorage, which has excellent properties for storing and transferring the data. But these cloud storage providers act as trusted third party organization. This results in various security and confidentiality problems. To overcome this problem this paper presents the system which provides thestoringofdata with the help ofBlockchainbasedInterPlanetaryFileSystem. 1.1 What is Blockchain? A blockchain,[1][2][3] originally block chain,[4][5] is a growing list of records or data, called blocks, which are linked to each other using cryptography.[1][6] Each block contains a cryptographic hash of previous block,[6] a timestamp, and transaction data. By design, a blockchain does not allow modification of the data i.e. blockchain is immutable. It is “an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way”.[7] A blockchain is typically managed by a global peer-to-peer network collectively bonding to a protocol for communication between inter-node and validation of new blocks, to use this distributed ledger.Oncestored,thedatain any block cannot bechanged retroactivelywithoutalteration of any of the blocks within a blockchain, which requires validation by consensus (a general agreement) of the network majority. Even if blockchain records are not unalterable, blockchain may be considered secured by its design and illustrating a distributed networked computing system with high Byzantine fault tolerance. Decentralized consensus for validating has been claimed with a blockchain.[8] 1.2 What is IPFS? IPFS is Inter Planetary File System, which is open source. Creator of IPFS is Juan Benet. It is an open source distributed protocol, which works with the function of providing global file system for all computing devices. Using IPFS within a blockchain transaction, you can place immutable,permanent links. In other words IPFS is a protocolandnetworkdesigned to create a content-addressable, peer-to-peer method of storing and sharing Hypermedia in a distributed file system.[9] Each file and all blocks within it are given a unique identifier, which is a cryptographic hash. File structures in IPFS are linked to each other using Merkle links and every file can be found by using a decentralized naming system called IPNS, which gives human-readable names. The implementation of this Merkle DirectedAcyclicGraphs(DAGS),whichillustrates the linking of the files, is important to the underlying functionality of the IPFS protocol, but itismorecomplexthan the scope of this paper. 2. IMPLEMENTATION 2.1 Installing Dependencies There are some dependencies, which are needed to be installed and configured in order to further get started with the project building.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5059 2.1.1 Ganache Fig -1: Ganache This dependency is a personal blockchain, which is a local development blockchain that can be used to act as a public blockchain.Ganache isusedtodeploysmartcontractsandfor running tests. Here you have a personal blockchain network running. Ganache provides 10 accountswith100Ethertotest our smart contracts on local blockchain bases. 2.1.2 Node.JS Since we have a private or local blockchain running, we need to configureour environmentfordevelopingsmartcontracts. For that, we will require Node Package Manager or NPM, which includes Node.js 2.1.3 Truffle Framework Fig -2: Truffle framework Truffle Framework is an essential tool for developing Ethereum smart contracts. It uses the Solidity programming language to develop smart contracts. Truffle framework provides following functionalities:  Client Side Development  Script Runner  Network Management  Development Console  Deployment & Migrations  Smart Contract Management  Automated Testing 2.1.4 Metamask Fig -3: Metamask Since current browsers do not support the connection to blockchain networks. Adding Metamask extension to the browser, converts the browser into a blockchain browser. Using Metamask, we can connect our Ganache accounts to deploy our project. MetaMask is also used to manage the personal accounts, which are used to connect to the blockchain and transaction purposes. MetaMask is an extension or plugin that allows us to visit the distributed web in your browser. It allows you to run Ethereum Decentralized applications right in your browser without running a full Ethereum blockchain. MetaMask includes a secure identity vault, providing a user interface to manage your identities ondifferentsitesandsign blockchain transactions. We caninstalltheMetaMaskadd-on in Chrome, Firefox and Opera.[10] 2.2 Project Setup Our proposed system involves a user who wants to upload the data or any file to the IPFS. We are configuring private local blockchain provided by Ganache and integrating it to web browser using Metamask extension. Fig -4: File Upload
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5060 Workflow: As mentioned above first the user needs a local blockchain network, which is provided by Ganache. The accounts provided by Ganache are added to Metamask for transaction purpose.Pertransaction,aspecificamountofGas is needed in the form of Ether. Ether is a type of crypto token that fuels the blockchain network. Ganache provides 10 accounts; each account has 100Eth, which can be used for transactions. Using these accounts, we can run tests, execute commands and inspect state while controlling how the chain operates on a personal Ethereum blockchain. From these 10 accounts, any one account is used to log on in Metamask using the private key provided by the particular account in Ganache. Now, as our Web browser supports blockchain network, we can now upload the files through our own designed user interface (UI). In our user interface, the files are uploaded on to the Inter Planetary File System (IPFS). When a file is selected for uploading process a popup isgenerated by Metamask,which verifies the transaction. After confirming the transaction the Ether from our account is deducted, else we can reject the transaction. Since the file is uploaded, IPFS generates a unique IPFS hash value of that file which is obtained in console of web browser. Fig -5: File Retrieval The process of retrieving the file back from IPFS requires the previously obtained IPFShashvalue,whichisgeneratedafter uploading the file. IPFS Gateway (https://ipfs.io/ipfs/) is required. We have to put the IPFShash in the URL, IPFS will search for the file, and preview is shown. Thus, the file is retrieved back from the IPFS System. 3. RESULTS As we are using Linux Mint Cinnamon 19.1 for this project implementation so the below results are been tested on the linux operating system. Following screenshots are the steps for usage of the project, which shows the actual procedureof uploading a fileonIPFSsystemusingBlockchainsuccessfully. Uploaded file can be retrieved using the IPFS Gateway (https://ipfs.io/ipfs/). Fig -6: Initiating Local Blockchain First, we need to initiate the blockchain by starting the Ganache. Then we need to choose an account from these 10 accounts as shown in fig.6 provided by Ganache to be logged in to Metamask. Fig -7: User Interface After login in to Metamask, try uploading a file from user interface as shown in fig.7. Fig -8: Transaction verification
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5061 Submitting of file needs to be verified. Metamask asshownin fig.8 does this verification process. Fig -9: Transaction verification As soon as the transaction is confirmed, the file is uploaded on to the IPFS. After uploading the file, IPFS gives back the hash value of that file so that it can be retrieved back. In fig.8 an image file is uploaded which is previewed by using the hash value as shown in fig.9 provided by IPFS as it was uploaded. 4. CONCLUSION Project outlined in this paper is our own implementation of Data Storage using IPFS and local blockchain. Although still, there remains much to do in terms of development and improvement in this model. Blockchain based Secure Data Storage is created as a model with IPFS as storage by using the dependencies viz. NPM, Truffle, Metamask and Ganache. Files are stored in the IPFS and the hash obtained after uploading is use to retrieve the File back again. Thus a victorious result is obtained and is implemented as per the idea described in the paper.ItalsocleartheconcepthowIPFS and Blockchain network can be integrated to develop a Decentralized Storage application. REFERENCES [1] "Blockchains: The great chain of being sure about things". The Economist.31October2015. Archivedfrom the original on 3 July 2016. Retrieved 18 June 2016. M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [2] Morris, DavidZ.(15May2016). "Leaderless,Blockchain- Based Venture Capital Fund Raises $100 Million, And Counting". Fortune. Archived from the original on 21 May 2016. Retrieved 23 May 2016.K. Elissa, “Title of paper if known,” unpublished. [3] Popper, Nathan (21 May 2016). "A Venture Fund With Plenty of Virtual Capital, but No Capitalist". The New York Times. Archived from the original on22May2016. Retrieved 23 May 2016. [4] Brito, Jerry; Castillo, Andrea (2013). Bitcoin: A Primer for Policymakers (PDF) (Report). Fairfax, VA: Mercatus Center, George Mason University. Archived (PDF) from the original on 21 September 2013. Retrieved 22 October 2013. [5] Trottier, Leo (18 June 2016). "original-bitcoin" (self- published code collection). github. Archived from the original on 17 April 2016. Retrieved 18June 2016.” This is a historical repository of Satoshi Nakamoto's original bit coin sourcecode” [6] Narayanan, Arvind; Bonneau, Joseph; Felten, Edward; Miller, Andrew; Goldfeder, Steven (2016). Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton: Princeton University Press. ISBN 978-0-691-17169-2. [7] Iansiti, Marco; Lakhani, Karim R. (January 2017). "The Truth About Blockchain". Harvard Business Review. Harvard University. Archived from the original on 18 January 2017. “Retrieved 17 January 2017. The technology at the heart of bitcoin and other virtual currencies, blockchainisanopen,distributedledgerthat can record transactions between two parties efficiently and in a verifiable and permanent way.” [8] Raval, Siraj (2016). "What Is a Decentralized Application?". Decentralized Applications: Harnessing Bitcoin's Blockchain Technology. O'Reilly Media, Inc. pp. 1–2. ISBN 978-1-4919-2452-5. OCLC 968277125. Retrieved 6 November 2016 – via Google Books. [9] Finley, Klint (20 June 2016). "The Inventors of the Internet Are Trying to Build a Truly Permanent Web". Wired. [10] Metamask. “https://metamask.io/”