SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1641
DISTRIBUTED DECENTRALIZED DATA STORAGE USING IPFS
Vijayalakshmi M1, Hemang Thakur2, Aritra Chattopadhayay3
1Asst. Professor, #CSE Department, SRM Institute of Science & Technology
2RA1511003010284, #CSE Department, SRM Institute of Science & Technology
3RA1511003010378, #CSE Department, SRM Institute of Science & Technology
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract – Distributed Decentralized Data Storage is a
type of data storage network that depends upon IPFS
(Inter Planetary File System)Protocol to save the files. The
files are encrypted on the client side before upload.
Anything uploaded on the IPFS network generates a hash.
This hash is stored on the server. This server is also
running an IPFS daemon to access the IPFS network. When
a file is to be uploaded it is first sent to the server, running
PHP backend, The file is encrypted here and passed on to
the IPFS daemon, which then uploads this file to IPFS
network and returns a hash to refer to the file, which then
gets stored on the server for further reference(upload and
download).
There are provisions to periodically check for data
integrity, storage sharing and a feature of revenue for
sharing storage.
Keywords – Decentralized, peer-to-peer, IPFS, client-side
encryption, cloud storage.
I. INTRODUCTION
We aim to develop a decentralized data storage facility
that can store and retrieve data as and when required.
Any file to be saved online can be locally encrypted then
uploaded on this network. Then the file is broken into
pieces and are stored on different devices on the network,
maintaining 51% redundancy to avoid data loss. To keep
track of each piece we use smart contracts based on the
Blockchain technology.
Decentralisation can be understood as transfer of
authority from any central authority to a pool or group of
nodes. The construct itself has been around for a short
time associated an earlier construct can be paralleled to
the introduction of the web wherever the unfold of
knowledge was democratised. The term is currently being
coined against Blockchain technologies and applications
like Bitcoin and Ethereum that change monetary
transactions and computing power.
Storage is outlined because the retention of recoverable
information on a laptop or alternative electronic system.
we tend to use storage on a usual from the transportable
and computers and it's simply understood from the files
we tend to place onto a USB stick. From the times of
getting to place files on a disc to having the ability to put
files within the ‘cloud’, storage has return a protracted
approach.
A. Decentralized Storage Basics
It is an arrangement of having the capacity to store your
documents without answering on extensive, concentrated
storehouses of information that don't undermine vital
qualities, for example, protection and privacy of your data.
A Decentralized distributed cloud is a decentralized model of
organized online capacity where information is put away on
various PCs (hubs), facilitated by the members participating
in the cloud.
For the decentralize plan to be feasible, the absolute storage
contributed in total must be at any rate equivalent to the
measure of capacity required by end clients. Nonetheless, a
few nodes may contribute less capacity and some may
contribute more. There might be remunerate models to repay
the nodes contributing more.
II. OBJECTIVE
To Create an online file storage system that can act as a
content hosting and sharing platform. This can also be used
an online Drive for storing and retrieving data such as files
and media. This platform serves as a node to access the IPFS
network to store data.
This also includes privacy and data security for the data
stored. Data is encrypted before upload, hence even if
anyone is able to access the hash of the file still the data is
protected with the password which is in the user’s mind.
III. DISTRIBUTED STORAGE TECHNOLOGY
Decentralized and distributed storage is a potential solution
that Blockchain companies are researching and trying to
implement. It is a system that stores data on a distributed
network, containing many private or publicly owned nodes
contributing to the total storage overcoming the problems
of violation of privacy and physical protection of data .
This system can be compared to Torrents and torrenting
software like LimeWare. Decentralized storage networks
operate in a similar manner but with further advanced
cryptography and encryption as well as the added incentive
mechanisms.
A. InterPlanetary File System (IPFS)
The InterPlanetary File System (IPFS) is a peer-to-peer
distributed file system that seeks to connect all computing
devices with the same system of files. In some ways, IPFS is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1642
like the web, but IPFS can be seen as a single BitTorrent
swarm, exchanging objects within one Git repository. In
other words, IPFS provides a high throughput content-
addressed block storage model, with content addressed
hyperlinks. This forms a generalized Merkle DAG, a data
structure upon which one can build versioned file systems,
blockchains, and even a Permanent Web. IPFS combines a
distributed hash table, an incentivized block exchange, and
a self-certifying namespace. IPFS has no single point of
failure, and nodes do not need to trust each other. We'll
use IPFS protocol in our system to store and share files
IV. CONSTRAINTS
The following are the constraints for the proposed
system:-
1) Data processing is a bit slower on IPFS as
compared to centralized systems.
2) Decentralized system will have no control over the
authenticity of data or user.
V. DESIGN
A. Conceptual Design
We are able to create a network where each node shares
its storage adding to a combined pool of storage available
i.e. more nodes in the network, more storage space for
data. Absence of central storage reduces the factor of
unavailability since this network is always available since
each node will be owned by a user who may be located
anywhere in the world and full-fledged failure at all places
is very unlikely. Any Computational load will be shared
across all nodes on the network resulting in reduced load
on all. All data stored is first encrypted locally and then
uploaded making it impossible for other nodes holding
data to access the data without the right Credentials.
A major part of our value proposition is in its unique
architecture. Where most networks implement a single,
standard type of node, we propose a dual solution.
1. Storage Nodes: Anyone can lease additional hard
drive space on their PC. We will utilize that hard
drive space to store little, encoded bits of other
people groups' records. In a perfect world, we
need to boost medium sized capacity nodes.
Enormous server farms would be excessively
unified and rout our main goal.
2. Recovery Nodes: Retrieval nodes are one of a kind
to our system. They are found near the storage
nodes on the system. In any case, recovery nodes
need high data transfer capacity and low
dormancy. They get impetuses on the off chance
that they are the quickest to find and recover a
record for a client. Practically speaking, this
reasonable methods the best recovery nodes will
work on quick associations in high-thickness
populace focuses where numerous storage nodes
work all the while.
As a client, you'll indicate the file you need to transfer. From
that point onward, the encryption calculation scrambles
your file and partitions it into numerous fragments. These
different portions get sent to different focuses on the system
that have your file. So as to review every one of the bits of
your file, you should know the file's hash. Along these lines,
just the file proprietor has the hash so just the file
proprietor can discover, reassemble, and unscramble the
file.
Fig. 1 Decentralized Storage Architecture
B. Collaborative Design
In this project we are going to use decentralized and the
distributed types together and for the internal
communication we will be using PHP.
While storing data in present available methods (data
centers) there may be a situation where the data centre
building itself may be compromised. The datamay get stolen
or destroyed. our system avoids any such kind of problem
with a simple solution of not keeping everything at the same
place. This is where IPFS comes in.
IPFS runs on a peer to peer network. All devices connected
to it( called node ) act as server as well as storage provider.
any file is stored in lots of shards or fragments which are
encrypted and connected to each other of one file. also there
are multiple copies of each shard which ensures
redundancy.All the shards can be called to form the file by
calling the first shard by it’s hash. All shards are found and
assembled and the file is served.
Since computational load for processing requests and
transfers are handled by each node on the network,
resulting in less load for each node. The overall network is
much more efficient and can support large loads.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1643
VI. ADVANTAGES AND DISADVANTAGES
A. Advantages
The following are the advantages of the proposed
decentralized system: -
1) Always available
2) Robust: 51% of the network must be taken down
before the system deactivates which is not
possible
3) Security: AES-256 Encryption
4) Storage: Theoretically infinite storage
5) High efficiency
6) Low workload
7) Redundancy: Distributed storage provides data
distribution and redundancy. Stored on multiple
locations
B. Disadvantages
The following are the disadvantages of the proposed
decentralized system: -
1) Slow: A bit slower than centralized data storage
solutions.
2) Size Limit: Max limit on file size exists i.e. 10GB for
a single file
3) Permanent web: One thing to note here is, any
data uploaded to IPFS is permanently stored
there, until 51% nodes of IPFS are shutdown.
Hence, it is a permanent web.
VII. REQUIREMENT ANALYSIS
A. Hardware
Just a single computing node to serve the contents and
services to the other nodes in the network is required.
B. Software
1. IPFS Daemon
2. PHP Server
3. MySQL Server
C. Working
1) Uploads: The following are the processes or
modules that are currently working as intended: -
● User logs into the network, using authorized
credentials.
● Uploads a file through the provided interfaces.
● PHP server receives the file and is stored in the
server cache
● This is then encrypted by using SHA-256
encryption with the user’s password.
● The server then uploads the file to IPFS.IPFS is
accessed through IPFS Daemon running on
localhost on the same server
● IPFS returns a hash for the uploaded file
● This Hash is stored in MySQL server for later
reference to the files
2) Downloads: The following are the processes or
modules that are currently working as intended: -
● The home page of the application also shows the
uploaded files.
● When the user wants a file he just needs to click the
download button with the particular file name.
● This triggers a “File Fetch” request to the IPFS
Daemon with the stored hash in the MySQL server
for the respective file
● This file is then downloaded on the PHP server
cache and served to the user for download
● Once download is complete the file is deleted from
the server cache.
IX. TECHNOLOGIES USED
The following are the technologies used in the development
of the proposed system: -
1) Database: MySQL
2) Networking Stack: IPFS Daemon for uploading files
to IPFS and XAMPP Server for running PHP and
MySQL
3) PHP: Used in user registration, login, logouts,
upload, download and session tracking.
X. CONCLUSIONS
The biggest benefit of the project is significant decrease in
operating costs. For example, the cost of storing 1TB of data
on AWS is approximately $20. Using the above technologies,
it is possible to bring down the cost of storage
approximately ten times!
Redundancy of data i.e. the data is safe and securely stored
unless 51% of the network goes down or is attacked which
is highly unlikely and extremely tough to do which means
100% safety and security.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1644
Since data is encrypted before uploading, data stored
cannot be accessed by anyone except only the person for
whom it is meant for.
REFERENCES
[1] Protocol Labs. Technical Report: Proof-of-Replication.
2017.
[2] Gregory Maxwell, Proof of Storage to make
distributed resource consumption costly.
https://bitcointalk.org/index.php?topic=310323.0
[3] Giuseppe Ateniese, Randal Burns, Reza Curtmola,
Joseph Herring, Lea Kissner, Zachary Peterson, and
Dawn Song. Provable data possession at untrusted
stores. In Proceedings of the 14th ACM conference on
Computer and communications security, pages 598–
609. Acm, 2007.
[4] B. Cohen. Incentives build robustness in bittorrent. In
Workshop on Economics of Peer-to-Peer systems,
volume 6, pages 68–72, 2003.
[5] medium.com
[6] coincentral.com
[7] cadasta.org
[8] cointelegraph.com
[9] cloudonlinestorage.net
[10] media.vectorzilla.io
[11] www.redmountainmakers.org

More Related Content

What's hot

L018137479
L018137479L018137479
L018137479
IOSR Journals
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
ijceronline
 
Bodleian Library's DAMS system
Bodleian Library's DAMS systemBodleian Library's DAMS system
Bodleian Library's DAMS system
benosteen
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
Luisa Francisco
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
SWAMI06
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
IJET - International Journal of Engineering and Techniques
 
Doc A hybrid cloud approach for secure authorized deduplication
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplicationShakas Technologie
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Editor IJARCET
 
Postponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud MemoryPostponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud Memory
IJARIIT
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 

What's hot (18)

L018137479
L018137479L018137479
L018137479
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
 
Bodleian Library's DAMS system
Bodleian Library's DAMS systemBodleian Library's DAMS system
Bodleian Library's DAMS system
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
paper
paperpaper
paper
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
 
Doc A hybrid cloud approach for secure authorized deduplication
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplication
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
Postponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud MemoryPostponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud Memory
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 

Similar to IRJET- Distributed Decentralized Data Storage using IPFS

Mis cloud computing
Mis cloud computingMis cloud computing
Mis cloud computing
Karan Kukreja
 
The Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksThe Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer Networks
Jessica Deakin
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
Samiksha880257
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
ssuserec8a711
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET Journal
 
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
IRJET Journal
 
The State of Decentralized Storage
The State of Decentralized StorageThe State of Decentralized Storage
The State of Decentralized Storage
CoinGecko
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage system
Zhichao Liang
 
Authenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File SystemsAuthenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File Systems
1crore projects
 
Authenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsAuthenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systems
Pvrtechnologies Nellore
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
Data Deduplication: Venti and its improvements
Data Deduplication: Venti and its improvementsData Deduplication: Venti and its improvements
Data Deduplication: Venti and its improvements
Umair Amjad
 
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
Niraj Tolia
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
dbpublications
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)
Shreyans Jain
 
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics
 
Storage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 NotesStorage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 Notes
Sudarshan Dhondaley
 
decentralized cloud storage and blockchian.pdf
decentralized cloud storage and blockchian.pdfdecentralized cloud storage and blockchian.pdf
decentralized cloud storage and blockchian.pdf
qitchain.net
 
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
CyberLab
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET Journal
 

Similar to IRJET- Distributed Decentralized Data Storage using IPFS (20)

Mis cloud computing
Mis cloud computingMis cloud computing
Mis cloud computing
 
The Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksThe Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer Networks
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
 
The State of Decentralized Storage
The State of Decentralized StorageThe State of Decentralized Storage
The State of Decentralized Storage
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage system
 
Authenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File SystemsAuthenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File Systems
 
Authenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsAuthenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systems
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Data Deduplication: Venti and its improvements
Data Deduplication: Venti and its improvementsData Deduplication: Venti and its improvements
Data Deduplication: Venti and its improvements
 
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)
 
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
 
Storage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 NotesStorage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 Notes
 
decentralized cloud storage and blockchian.pdf
decentralized cloud storage and blockchian.pdfdecentralized cloud storage and blockchian.pdf
decentralized cloud storage and blockchian.pdf
 
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
WHITEPAPER ON Serverless Hosting platform based on Blockchain and by Vivek Ch...
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 

IRJET- Distributed Decentralized Data Storage using IPFS

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1641 DISTRIBUTED DECENTRALIZED DATA STORAGE USING IPFS Vijayalakshmi M1, Hemang Thakur2, Aritra Chattopadhayay3 1Asst. Professor, #CSE Department, SRM Institute of Science & Technology 2RA1511003010284, #CSE Department, SRM Institute of Science & Technology 3RA1511003010378, #CSE Department, SRM Institute of Science & Technology ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – Distributed Decentralized Data Storage is a type of data storage network that depends upon IPFS (Inter Planetary File System)Protocol to save the files. The files are encrypted on the client side before upload. Anything uploaded on the IPFS network generates a hash. This hash is stored on the server. This server is also running an IPFS daemon to access the IPFS network. When a file is to be uploaded it is first sent to the server, running PHP backend, The file is encrypted here and passed on to the IPFS daemon, which then uploads this file to IPFS network and returns a hash to refer to the file, which then gets stored on the server for further reference(upload and download). There are provisions to periodically check for data integrity, storage sharing and a feature of revenue for sharing storage. Keywords – Decentralized, peer-to-peer, IPFS, client-side encryption, cloud storage. I. INTRODUCTION We aim to develop a decentralized data storage facility that can store and retrieve data as and when required. Any file to be saved online can be locally encrypted then uploaded on this network. Then the file is broken into pieces and are stored on different devices on the network, maintaining 51% redundancy to avoid data loss. To keep track of each piece we use smart contracts based on the Blockchain technology. Decentralisation can be understood as transfer of authority from any central authority to a pool or group of nodes. The construct itself has been around for a short time associated an earlier construct can be paralleled to the introduction of the web wherever the unfold of knowledge was democratised. The term is currently being coined against Blockchain technologies and applications like Bitcoin and Ethereum that change monetary transactions and computing power. Storage is outlined because the retention of recoverable information on a laptop or alternative electronic system. we tend to use storage on a usual from the transportable and computers and it's simply understood from the files we tend to place onto a USB stick. From the times of getting to place files on a disc to having the ability to put files within the ‘cloud’, storage has return a protracted approach. A. Decentralized Storage Basics It is an arrangement of having the capacity to store your documents without answering on extensive, concentrated storehouses of information that don't undermine vital qualities, for example, protection and privacy of your data. A Decentralized distributed cloud is a decentralized model of organized online capacity where information is put away on various PCs (hubs), facilitated by the members participating in the cloud. For the decentralize plan to be feasible, the absolute storage contributed in total must be at any rate equivalent to the measure of capacity required by end clients. Nonetheless, a few nodes may contribute less capacity and some may contribute more. There might be remunerate models to repay the nodes contributing more. II. OBJECTIVE To Create an online file storage system that can act as a content hosting and sharing platform. This can also be used an online Drive for storing and retrieving data such as files and media. This platform serves as a node to access the IPFS network to store data. This also includes privacy and data security for the data stored. Data is encrypted before upload, hence even if anyone is able to access the hash of the file still the data is protected with the password which is in the user’s mind. III. DISTRIBUTED STORAGE TECHNOLOGY Decentralized and distributed storage is a potential solution that Blockchain companies are researching and trying to implement. It is a system that stores data on a distributed network, containing many private or publicly owned nodes contributing to the total storage overcoming the problems of violation of privacy and physical protection of data . This system can be compared to Torrents and torrenting software like LimeWare. Decentralized storage networks operate in a similar manner but with further advanced cryptography and encryption as well as the added incentive mechanisms. A. InterPlanetary File System (IPFS) The InterPlanetary File System (IPFS) is a peer-to-peer distributed file system that seeks to connect all computing devices with the same system of files. In some ways, IPFS is
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1642 like the web, but IPFS can be seen as a single BitTorrent swarm, exchanging objects within one Git repository. In other words, IPFS provides a high throughput content- addressed block storage model, with content addressed hyperlinks. This forms a generalized Merkle DAG, a data structure upon which one can build versioned file systems, blockchains, and even a Permanent Web. IPFS combines a distributed hash table, an incentivized block exchange, and a self-certifying namespace. IPFS has no single point of failure, and nodes do not need to trust each other. We'll use IPFS protocol in our system to store and share files IV. CONSTRAINTS The following are the constraints for the proposed system:- 1) Data processing is a bit slower on IPFS as compared to centralized systems. 2) Decentralized system will have no control over the authenticity of data or user. V. DESIGN A. Conceptual Design We are able to create a network where each node shares its storage adding to a combined pool of storage available i.e. more nodes in the network, more storage space for data. Absence of central storage reduces the factor of unavailability since this network is always available since each node will be owned by a user who may be located anywhere in the world and full-fledged failure at all places is very unlikely. Any Computational load will be shared across all nodes on the network resulting in reduced load on all. All data stored is first encrypted locally and then uploaded making it impossible for other nodes holding data to access the data without the right Credentials. A major part of our value proposition is in its unique architecture. Where most networks implement a single, standard type of node, we propose a dual solution. 1. Storage Nodes: Anyone can lease additional hard drive space on their PC. We will utilize that hard drive space to store little, encoded bits of other people groups' records. In a perfect world, we need to boost medium sized capacity nodes. Enormous server farms would be excessively unified and rout our main goal. 2. Recovery Nodes: Retrieval nodes are one of a kind to our system. They are found near the storage nodes on the system. In any case, recovery nodes need high data transfer capacity and low dormancy. They get impetuses on the off chance that they are the quickest to find and recover a record for a client. Practically speaking, this reasonable methods the best recovery nodes will work on quick associations in high-thickness populace focuses where numerous storage nodes work all the while. As a client, you'll indicate the file you need to transfer. From that point onward, the encryption calculation scrambles your file and partitions it into numerous fragments. These different portions get sent to different focuses on the system that have your file. So as to review every one of the bits of your file, you should know the file's hash. Along these lines, just the file proprietor has the hash so just the file proprietor can discover, reassemble, and unscramble the file. Fig. 1 Decentralized Storage Architecture B. Collaborative Design In this project we are going to use decentralized and the distributed types together and for the internal communication we will be using PHP. While storing data in present available methods (data centers) there may be a situation where the data centre building itself may be compromised. The datamay get stolen or destroyed. our system avoids any such kind of problem with a simple solution of not keeping everything at the same place. This is where IPFS comes in. IPFS runs on a peer to peer network. All devices connected to it( called node ) act as server as well as storage provider. any file is stored in lots of shards or fragments which are encrypted and connected to each other of one file. also there are multiple copies of each shard which ensures redundancy.All the shards can be called to form the file by calling the first shard by it’s hash. All shards are found and assembled and the file is served. Since computational load for processing requests and transfers are handled by each node on the network, resulting in less load for each node. The overall network is much more efficient and can support large loads.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1643 VI. ADVANTAGES AND DISADVANTAGES A. Advantages The following are the advantages of the proposed decentralized system: - 1) Always available 2) Robust: 51% of the network must be taken down before the system deactivates which is not possible 3) Security: AES-256 Encryption 4) Storage: Theoretically infinite storage 5) High efficiency 6) Low workload 7) Redundancy: Distributed storage provides data distribution and redundancy. Stored on multiple locations B. Disadvantages The following are the disadvantages of the proposed decentralized system: - 1) Slow: A bit slower than centralized data storage solutions. 2) Size Limit: Max limit on file size exists i.e. 10GB for a single file 3) Permanent web: One thing to note here is, any data uploaded to IPFS is permanently stored there, until 51% nodes of IPFS are shutdown. Hence, it is a permanent web. VII. REQUIREMENT ANALYSIS A. Hardware Just a single computing node to serve the contents and services to the other nodes in the network is required. B. Software 1. IPFS Daemon 2. PHP Server 3. MySQL Server C. Working 1) Uploads: The following are the processes or modules that are currently working as intended: - ● User logs into the network, using authorized credentials. ● Uploads a file through the provided interfaces. ● PHP server receives the file and is stored in the server cache ● This is then encrypted by using SHA-256 encryption with the user’s password. ● The server then uploads the file to IPFS.IPFS is accessed through IPFS Daemon running on localhost on the same server ● IPFS returns a hash for the uploaded file ● This Hash is stored in MySQL server for later reference to the files 2) Downloads: The following are the processes or modules that are currently working as intended: - ● The home page of the application also shows the uploaded files. ● When the user wants a file he just needs to click the download button with the particular file name. ● This triggers a “File Fetch” request to the IPFS Daemon with the stored hash in the MySQL server for the respective file ● This file is then downloaded on the PHP server cache and served to the user for download ● Once download is complete the file is deleted from the server cache. IX. TECHNOLOGIES USED The following are the technologies used in the development of the proposed system: - 1) Database: MySQL 2) Networking Stack: IPFS Daemon for uploading files to IPFS and XAMPP Server for running PHP and MySQL 3) PHP: Used in user registration, login, logouts, upload, download and session tracking. X. CONCLUSIONS The biggest benefit of the project is significant decrease in operating costs. For example, the cost of storing 1TB of data on AWS is approximately $20. Using the above technologies, it is possible to bring down the cost of storage approximately ten times! Redundancy of data i.e. the data is safe and securely stored unless 51% of the network goes down or is attacked which is highly unlikely and extremely tough to do which means 100% safety and security.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1644 Since data is encrypted before uploading, data stored cannot be accessed by anyone except only the person for whom it is meant for. REFERENCES [1] Protocol Labs. Technical Report: Proof-of-Replication. 2017. [2] Gregory Maxwell, Proof of Storage to make distributed resource consumption costly. https://bitcointalk.org/index.php?topic=310323.0 [3] Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security, pages 598– 609. Acm, 2007. [4] B. Cohen. Incentives build robustness in bittorrent. In Workshop on Economics of Peer-to-Peer systems, volume 6, pages 68–72, 2003. [5] medium.com [6] coincentral.com [7] cadasta.org [8] cointelegraph.com [9] cloudonlinestorage.net [10] media.vectorzilla.io [11] www.redmountainmakers.org