SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2992
Blockchain for Large-Scale Internet of Things Data
Storage and Protection
Ms. Neha Jain (GUIDE), Asst Prof, SLRTCE, Rahul Singh, Bhavesh Chari, Pankaj Chohan,
Jay Valangar
1,2,3,4Computer Engineering Dept Shree LR Tiwari College of Engineering
--------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - With the increasing growth of IOT (internet of
things) devices, storing and securing a large amount of IOT
data have become major issues, Blockchain offers a
convenient platform for distributed data storage and
protection. Due to increasing high computation and storage
demands from cloud server problem such as cloud-based
IOT structures has been arisen, for solving such issues
distributed data storage has been introduced which helps to
employ blockchain. We present a description of the
transaction in a non-cryptocurrency system and specify how
the transactions are processed. Our scheme eliminates the
centralized server by replacing with a decentralized server
which performs "Transaction" verification. Using certificate-
less and blockchain we ensure more security to the IOT data.
1. INTRODUCTION
Here we will elaborate on the aspects like problem
statement, scope, motivation and also the objectives of our
project
1.2 Problem statement
With the increase in the copious amount of IOT devices, a
tremendous amount of interactions are occurring between
the physical objects which improves efficiency. It reduces
human interventions. IOT devices send all the data to
centralized servers. The problem with centralized systems
is that they collect and manipulate all the data. Sensitive or
important data can be easily leaked, hence making the
system vulnerable.
1.3 Scope and Motivation
1.3.1 De-Centralized System:
IOT applications such as smart grid and implantable
medical system, involve tremendous data aggregations. In
a traditional cloud-based IOT structure, a centralized cloud
server collects and controls all the data, which brings two
drawbacks:
1) The cloud server needs a very high storage capacity
to store the IOT data;
2)Sensitive data can be easily leaked from the server. So,
to prevent these drawbacks, we convert the centralized
system into a decentralized system. For example, a server
might trade sensitive data with other entities without
notifying the data owner. A decentralized structure will
properly handle these issues. Data can be transferred and
controlled in a distributed manner as opposed to that in a
centralized structure.
1.3.2 No Centralized Trusted Server :
As in previous systems, centralized systems had
interventions from trusted servers. Now, after the
introduction of Centralized Trusted Server, the access to
IoT data is controlled by the majority of the blockchain
miners, without any intervention from a trusted server.
1.3.3 Traceability and Accountability :
Tracing the changes made in the previous systems were
not possible. But, after the introduction of blockchain in
IoT, every change made in the system will be traced. Users
do not need to worry about unauthorized access to his/her
data. No malicious attempts can be made undetected.
1.3.4 Edge computing :
IoT devices have low computational power.
The computations done by the IoT devices in previous
systems were very slow. With the help of edge computing,
computations are done faster. Edge computing brings real-
time computations and communications by leveraging
nearby edge servers. [4]
1.4 Project Objectives
The basic objective of Blockchain is to offer a convenient
platform for Distributed data storage and protection.
a) To achieve Distributed data storage and protection
through storing data DHT (Distributed hash tables).
b) To achieve complex computations using. Edge
computing.
2. LITERATURE REVIEW
Here we will elaborate the aspects like the literature
survey of the project and what all projects are existing and
been actually used in the market which the makers of this
project took the inspiration from and thus decided to go
ahead with the project covering with the problem
statement.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2993
2.1 Secure Data Sharing in Public Clouds
AUTHOR: Seung-Hyun Seo, Mohamed Nabeel.
An Efficient Certificate-less Encryption for Secure Data
Sharing in Public Clouds mCL-PKE scheme is used to
construct a practical solution to the problem of sharing
sensitive information in public clouds. The clouds are
employed as secure storage as well as a key generation
center. The data owner encrypts the sensitive data using
the cloud generated user’s public keys based on its access
control policies and uploads the encrypted data to the
cloud. After successful authorization, the cloud partially
decrypts the encrypted data for the users.
2.2 Data Storage in Cloud Computing Platform
AUTHOR: Lihong Jiang, Boyi Xu.
This network brings a series of challenges for data storage
and processing in a cloud platform. IOT data can be
generated quite rapidly, the volume of data can be huge
and the types of data can be various. In order to address
these potential problems, this paper proposes a data
storage framework not only enabling ef icient storing of
massive IOT data but also integrating both.
2.3 Smart Contracts for the Internet of Things
AUTHOR: Konstantinos chiristidis, Michael Devetsikiotis.
Motivated by the recent explosion of interest around
blockchains, we examine whether they make a good it for
the Internet of Things(IoT)sector. We review how this
mechanism works and also look into smart contracts—
scripts that reside on the blockchain that allow for the
automation of multi-step processes. We then move into the
IoT domain, and describe how a blockchain-IoT
combination: 1) facilitates the sharing of services and
resources leading to the creation of marketplace of
services between devices and 2) allows us to automate in a
cryptographically verifiable manner several existing, time-
consuming work lows.
2.4 Blockchain For Internet of Things
AUTHOR: Ruinian Li, Tianyi Song, Hong Li.
Traditional cloud-based IoT structures impose extremely
high computation and storage demands on the cloud
servers. Meanwhile, the strong dependencies on the
centralized servers bring significant trust issues. To
mitigate these problems, we propose a distributed data
storage scheme employing blockchain. Our scheme
eliminates the traditional centralized servers by leveraging
the blockchain miners who perform “transaction”
verifications and records audit with the help of certificate-
less cryptography. We present a clear de inition of the
transactions in a non-cryptocurrency system and illustrate
how the transactions are processed. Additionally, we
extend our scheme to enable data trading and elaborate on
how data trading can be efficiently and effectively
achieved.
3. PROPOSED SYSTEM
Due to, day by day increase in usage of IoT devices the
traffic of data transaction is increasing that results in an
overloaded centralized system. The IoT implementation at
present does not excel in security. The previous
implementation of old IoT includes certificate-based
security. It utilizes PKI(Public key infrastructure) which
introduces too much redundancy. This paper proposes the
implementation of blockchain in combination with IoT for
developing a secure, robust and reliable decentralized
system. This paper Consists of hashing techniques, edge
computing for security and decentralization of the system.
A)Storing data: Before an edge device forwards data to
DHT, it posts a “transaction” to the blockchain, announcing
that the data belonging to certain IOT device will be stored
in an address of DHT. Blockchain verifies the transaction
and records the identity of the IOT device and the storage
address. In this way, blockchain helps manage data
storage.[5]
B)When an IOT device requests data from DHT, it posts a
“transactions” to the blockchain. The blockchain will work
as a “trusted third party” to authenticate the requester. If
the transaction is validated and written into a block, the
DHT node storing the data will send data to the requester.
Therefore, authentication is performed through the
blockchain, without a trusted server.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2994
4. APPLICATION ARCHITECTURE
4.1 IOT devices
The IoT module makes all the IoT devices in the network
to be connected to each other. The registration and
authentication of devices is a part of the process handled
by the IOT module. The module is capable of making
transactions among IOT devices and the database.
4.2 DHT
The location at which the data must be stored is recorded
in DHT(Data Hash-table) which is part of the blocks of
transactions and remain secured in the network and is
only to be accessed by the rightful authority and not other
in and out of the network.
4.3 Blockchain
The data coming from the IoT device is stored in a block
sequence and every block contains device id, device data,
previous hash, current hash and time-stamp.
4.4 Edge Computing Device
As the IoT module is not capable of processing such high
computations at an astonishing rate with an increasing
number of IoT devices in the network. Edge devices do the
job calculating the hash values and for all the blocks in the
blockchain.
5. RESULTS AND DISCUSSION.
The deployment of the proposed machine is based heavily
at the layout of blockchain system. Without incredibly
scalable blockchain system, it is hard to set up the IoT
garage system. This is the alternate-off brought through
disposing of the centralized server. Scalability is a chief
trouble in blockchain’s layout. There are a lot of ongoing
studies operating on it.To ind the maximum scalable tool
that exists currently, we need to examine the blockchain
systems that have already been deployed in very huge
networks. Some very new blockchain generation together
with Ripple should machine hundreds of transactions in
step with per second, however the layout is partly
decentral-ized. Decentralized designs together with
Ethereum have to take handiest 13 transactions in keeping
with per second. However, there exists new-rising
blockchain layout built primarily based on Ethereum that
have a whole lot better scalability. For example,
Tomochain is supposed to method as much as a thousand
transactions in step with per second.
6. CONCLUSION
In this paper, we propose A relaxed scheme for IoT facts
storage and safety based totally on blockchain. Edge
computing is included to help control facts storage and
small IoT devices carry out computations. Edge computing
device is adopted to set up a convenient authentication
gadget for the blockchain-primarily based IoT
applications, and blockchain overcomes the drawback of
certificateless cryptography. We give exact algorithms on
the way to procedure transactions in any such system and
a way to gain authentication and accountability. To the
exceptional of our understanding, that is the irst paper
tackling the hassle of constructing a relaxed large-scale
IoT facts, and the irst to combine facet computing and
blockchain as a whole to serve Iot .
REFERENCES
[1] 1. M. F. Kaashoek and D. R. Karger, “Koorde: A simple
degree-optimal distributed hash table,” in
International Workshop on Peer-to-Peer Sys-tems.
Springer, 2003, pp. 98–107.
[2] S. S. Al-Riyami and K. G. Paterson, “Certificateless
public key cryp-tography,” in Asiacrypt, vol. 2894.
Springer, 2003, pp. 452–473.
[3] S. S. Chow, C. Boyd, and J. M. G. Nieto, “Security-
mediated certi icate-less cryptography,” in Public key
cryptography, vol. 3958. Springer,2006, pp. 508–524.
[4] M. Satyanarayanan, “The emergence of edge
computing,” Computer,vol. 50, no. 1, pp. 30–39, 2017.
[5] Blockchain For Large-Scale Internet of Things Data
Storage and Protection AUTHOR: Ruinian Li, Tianyi
Song, Hong Li.
[6] L. Jiang, L. Da Xu, H. Cai, Z. Jiang, F. Bu, and B. Xu, “An
iot-oriented data storage framework in cloud
computing platform,” IEEE Transactions on
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2995
Industriastrial Informatics, vol. 10, no.2, pp.1443-
1451,2014.
[7] L. Jiang, L. Da Xu, H. Cai, Z. Jiang, F. Bu, and B. Xu, “An
iot-oriented data storage framework in cloud
computing platform,” IEEE Transactions on
Industriastrial Informatics, vol. 10, no.2, pp.1443-
1451,2014.

More Related Content

What's hot

Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsMario Drobics
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networksChetan Kumar S
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsVishwesh Nagamalla
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iotChintan Patel
 
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
Applications of Blockchains in the Internet of Things: A Comprehensive SurveyApplications of Blockchains in the Internet of Things: A Comprehensive Survey
Applications of Blockchains in the Internet of Things: A Comprehensive SurveyDavid Bess
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET Journal
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET Journal
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
Securing data with blockchain and ai
Securing data with blockchain and aiSecuring data with blockchain and ai
Securing data with blockchain and aiVenkat Projects
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
IoT on Blockchain Solution Overview
IoT on Blockchain Solution OverviewIoT on Blockchain Solution Overview
IoT on Blockchain Solution OverviewProvide Technologies
 
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET Journal
 

What's hot (20)

Blockchain+IOT
Blockchain+IOTBlockchain+IOT
Blockchain+IOT
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networks
 
[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
 
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
Applications of Blockchains in the Internet of Things: A Comprehensive SurveyApplications of Blockchains in the Internet of Things: A Comprehensive Survey
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Securing data with blockchain and ai
Securing data with blockchain and aiSecuring data with blockchain and ai
Securing data with blockchain and ai
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
BaaS for IoT
BaaS for IoTBaaS for IoT
BaaS for IoT
 
IoT on Blockchain Solution Overview
IoT on Blockchain Solution OverviewIoT on Blockchain Solution Overview
IoT on Blockchain Solution Overview
 
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of Technology
 

Similar to IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection

[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT][A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]IRJET Journal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYIRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINIRJET Journal
 
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain TechnologyIRJET Journal
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET -  	  Blockchain Application Used in Enhance Technology from Cryptocurr...IRJET -  	  Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...IRJET Journal
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing ApplicationIRJET Journal
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSA REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSIRJET Journal
 
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...IRJET Journal
 

Similar to IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection (20)

[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT][A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET -  	  Blockchain Application Used in Enhance Technology from Cryptocurr...IRJET -  	  Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing Application
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSA REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
 
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2992 Blockchain for Large-Scale Internet of Things Data Storage and Protection Ms. Neha Jain (GUIDE), Asst Prof, SLRTCE, Rahul Singh, Bhavesh Chari, Pankaj Chohan, Jay Valangar 1,2,3,4Computer Engineering Dept Shree LR Tiwari College of Engineering --------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - With the increasing growth of IOT (internet of things) devices, storing and securing a large amount of IOT data have become major issues, Blockchain offers a convenient platform for distributed data storage and protection. Due to increasing high computation and storage demands from cloud server problem such as cloud-based IOT structures has been arisen, for solving such issues distributed data storage has been introduced which helps to employ blockchain. We present a description of the transaction in a non-cryptocurrency system and specify how the transactions are processed. Our scheme eliminates the centralized server by replacing with a decentralized server which performs "Transaction" verification. Using certificate- less and blockchain we ensure more security to the IOT data. 1. INTRODUCTION Here we will elaborate on the aspects like problem statement, scope, motivation and also the objectives of our project 1.2 Problem statement With the increase in the copious amount of IOT devices, a tremendous amount of interactions are occurring between the physical objects which improves efficiency. It reduces human interventions. IOT devices send all the data to centralized servers. The problem with centralized systems is that they collect and manipulate all the data. Sensitive or important data can be easily leaked, hence making the system vulnerable. 1.3 Scope and Motivation 1.3.1 De-Centralized System: IOT applications such as smart grid and implantable medical system, involve tremendous data aggregations. In a traditional cloud-based IOT structure, a centralized cloud server collects and controls all the data, which brings two drawbacks: 1) The cloud server needs a very high storage capacity to store the IOT data; 2)Sensitive data can be easily leaked from the server. So, to prevent these drawbacks, we convert the centralized system into a decentralized system. For example, a server might trade sensitive data with other entities without notifying the data owner. A decentralized structure will properly handle these issues. Data can be transferred and controlled in a distributed manner as opposed to that in a centralized structure. 1.3.2 No Centralized Trusted Server : As in previous systems, centralized systems had interventions from trusted servers. Now, after the introduction of Centralized Trusted Server, the access to IoT data is controlled by the majority of the blockchain miners, without any intervention from a trusted server. 1.3.3 Traceability and Accountability : Tracing the changes made in the previous systems were not possible. But, after the introduction of blockchain in IoT, every change made in the system will be traced. Users do not need to worry about unauthorized access to his/her data. No malicious attempts can be made undetected. 1.3.4 Edge computing : IoT devices have low computational power. The computations done by the IoT devices in previous systems were very slow. With the help of edge computing, computations are done faster. Edge computing brings real- time computations and communications by leveraging nearby edge servers. [4] 1.4 Project Objectives The basic objective of Blockchain is to offer a convenient platform for Distributed data storage and protection. a) To achieve Distributed data storage and protection through storing data DHT (Distributed hash tables). b) To achieve complex computations using. Edge computing. 2. LITERATURE REVIEW Here we will elaborate the aspects like the literature survey of the project and what all projects are existing and been actually used in the market which the makers of this project took the inspiration from and thus decided to go ahead with the project covering with the problem statement.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2993 2.1 Secure Data Sharing in Public Clouds AUTHOR: Seung-Hyun Seo, Mohamed Nabeel. An Efficient Certificate-less Encryption for Secure Data Sharing in Public Clouds mCL-PKE scheme is used to construct a practical solution to the problem of sharing sensitive information in public clouds. The clouds are employed as secure storage as well as a key generation center. The data owner encrypts the sensitive data using the cloud generated user’s public keys based on its access control policies and uploads the encrypted data to the cloud. After successful authorization, the cloud partially decrypts the encrypted data for the users. 2.2 Data Storage in Cloud Computing Platform AUTHOR: Lihong Jiang, Boyi Xu. This network brings a series of challenges for data storage and processing in a cloud platform. IOT data can be generated quite rapidly, the volume of data can be huge and the types of data can be various. In order to address these potential problems, this paper proposes a data storage framework not only enabling ef icient storing of massive IOT data but also integrating both. 2.3 Smart Contracts for the Internet of Things AUTHOR: Konstantinos chiristidis, Michael Devetsikiotis. Motivated by the recent explosion of interest around blockchains, we examine whether they make a good it for the Internet of Things(IoT)sector. We review how this mechanism works and also look into smart contracts— scripts that reside on the blockchain that allow for the automation of multi-step processes. We then move into the IoT domain, and describe how a blockchain-IoT combination: 1) facilitates the sharing of services and resources leading to the creation of marketplace of services between devices and 2) allows us to automate in a cryptographically verifiable manner several existing, time- consuming work lows. 2.4 Blockchain For Internet of Things AUTHOR: Ruinian Li, Tianyi Song, Hong Li. Traditional cloud-based IoT structures impose extremely high computation and storage demands on the cloud servers. Meanwhile, the strong dependencies on the centralized servers bring significant trust issues. To mitigate these problems, we propose a distributed data storage scheme employing blockchain. Our scheme eliminates the traditional centralized servers by leveraging the blockchain miners who perform “transaction” verifications and records audit with the help of certificate- less cryptography. We present a clear de inition of the transactions in a non-cryptocurrency system and illustrate how the transactions are processed. Additionally, we extend our scheme to enable data trading and elaborate on how data trading can be efficiently and effectively achieved. 3. PROPOSED SYSTEM Due to, day by day increase in usage of IoT devices the traffic of data transaction is increasing that results in an overloaded centralized system. The IoT implementation at present does not excel in security. The previous implementation of old IoT includes certificate-based security. It utilizes PKI(Public key infrastructure) which introduces too much redundancy. This paper proposes the implementation of blockchain in combination with IoT for developing a secure, robust and reliable decentralized system. This paper Consists of hashing techniques, edge computing for security and decentralization of the system. A)Storing data: Before an edge device forwards data to DHT, it posts a “transaction” to the blockchain, announcing that the data belonging to certain IOT device will be stored in an address of DHT. Blockchain verifies the transaction and records the identity of the IOT device and the storage address. In this way, blockchain helps manage data storage.[5] B)When an IOT device requests data from DHT, it posts a “transactions” to the blockchain. The blockchain will work as a “trusted third party” to authenticate the requester. If the transaction is validated and written into a block, the DHT node storing the data will send data to the requester. Therefore, authentication is performed through the blockchain, without a trusted server.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2994 4. APPLICATION ARCHITECTURE 4.1 IOT devices The IoT module makes all the IoT devices in the network to be connected to each other. The registration and authentication of devices is a part of the process handled by the IOT module. The module is capable of making transactions among IOT devices and the database. 4.2 DHT The location at which the data must be stored is recorded in DHT(Data Hash-table) which is part of the blocks of transactions and remain secured in the network and is only to be accessed by the rightful authority and not other in and out of the network. 4.3 Blockchain The data coming from the IoT device is stored in a block sequence and every block contains device id, device data, previous hash, current hash and time-stamp. 4.4 Edge Computing Device As the IoT module is not capable of processing such high computations at an astonishing rate with an increasing number of IoT devices in the network. Edge devices do the job calculating the hash values and for all the blocks in the blockchain. 5. RESULTS AND DISCUSSION. The deployment of the proposed machine is based heavily at the layout of blockchain system. Without incredibly scalable blockchain system, it is hard to set up the IoT garage system. This is the alternate-off brought through disposing of the centralized server. Scalability is a chief trouble in blockchain’s layout. There are a lot of ongoing studies operating on it.To ind the maximum scalable tool that exists currently, we need to examine the blockchain systems that have already been deployed in very huge networks. Some very new blockchain generation together with Ripple should machine hundreds of transactions in step with per second, however the layout is partly decentral-ized. Decentralized designs together with Ethereum have to take handiest 13 transactions in keeping with per second. However, there exists new-rising blockchain layout built primarily based on Ethereum that have a whole lot better scalability. For example, Tomochain is supposed to method as much as a thousand transactions in step with per second. 6. CONCLUSION In this paper, we propose A relaxed scheme for IoT facts storage and safety based totally on blockchain. Edge computing is included to help control facts storage and small IoT devices carry out computations. Edge computing device is adopted to set up a convenient authentication gadget for the blockchain-primarily based IoT applications, and blockchain overcomes the drawback of certificateless cryptography. We give exact algorithms on the way to procedure transactions in any such system and a way to gain authentication and accountability. To the exceptional of our understanding, that is the irst paper tackling the hassle of constructing a relaxed large-scale IoT facts, and the irst to combine facet computing and blockchain as a whole to serve Iot . REFERENCES [1] 1. M. F. Kaashoek and D. R. Karger, “Koorde: A simple degree-optimal distributed hash table,” in International Workshop on Peer-to-Peer Sys-tems. Springer, 2003, pp. 98–107. [2] S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryp-tography,” in Asiacrypt, vol. 2894. Springer, 2003, pp. 452–473. [3] S. S. Chow, C. Boyd, and J. M. G. Nieto, “Security- mediated certi icate-less cryptography,” in Public key cryptography, vol. 3958. Springer,2006, pp. 508–524. [4] M. Satyanarayanan, “The emergence of edge computing,” Computer,vol. 50, no. 1, pp. 30–39, 2017. [5] Blockchain For Large-Scale Internet of Things Data Storage and Protection AUTHOR: Ruinian Li, Tianyi Song, Hong Li. [6] L. Jiang, L. Da Xu, H. Cai, Z. Jiang, F. Bu, and B. Xu, “An iot-oriented data storage framework in cloud computing platform,” IEEE Transactions on
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2995 Industriastrial Informatics, vol. 10, no.2, pp.1443- 1451,2014. [7] L. Jiang, L. Da Xu, H. Cai, Z. Jiang, F. Bu, and B. Xu, “An iot-oriented data storage framework in cloud computing platform,” IEEE Transactions on Industriastrial Informatics, vol. 10, no.2, pp.1443- 1451,2014.