4. Multi-User Approval Based
Authentication
A user identity in a system will be authenticated by
the other users in same system
This Photo by Unknown Author is licensed under CC BY-SA
5. Multi-User Permission
Based Access Policy
• A user access policy will have to approve
by other users in the system for each
access request
This Photo by Unknown Author is licensed under CC BY-SA-N
This Photo by Unknown Author is licensed under CC BY-S
6. Limitations of
current multi-
user based
plan
SERVER IS CONTROLLING
THE FLOW
SERVER COMPUTATION
COST INCREASING
NETWORK TRAFFIC IS
INCREASING
10. Inter
Planetary File
System
A protocol and network designed to create a
content-addressable, peer-to-peer method of
storing and sharing hypermedia in a distributed
file system.
“Distributed file system that seeks to connect all
computing devices with the same system of files”.
12. Our Proposed
Multi-User
Model
Multiple Peer to Peer
Authentication based on
shared Hash table (DHT)
IPFS implementation with user
machines as server with
enough redundancy.
Multiple peer to peer
Authentication to get access
token for request .
Server can add register new
user and revoke request hash
with out consensus.
13. Four shared
ledger
User credential hash table (Immutable)
User Auth token ledger (Time expiring)
File Access Token (Time expiring)
FILEID and ACL Ledger (Immutable and
two way encrypted)