Design and Implementation of IPFS Enabled Security Framework for Multimedia Data Files
How to Cite?
Vinodray Thumar, Dr. Saurabh Shah, Dr. Vipul Vekariya, "Design and Implementation of IPFS Enabled Security Framework for Multimedia Data Files," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 334-341, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I1P239
Abstract
Data security is an important aspect of the cloud storage environment. It is highly required to preserve very crucial user data in the cloud. Blockchain technology can become the prominent solution to maintain the privacy and security of data. The blockchain contains transactions in the form of a distributed database of records which are a public ledger for all digital activities or events that have been created and shared among participants. The details of all important data are stored in the form of transactions or blocks in the blockchain. Each activity on the community list is ensured by the consensus of the majority of participants in the process. A blockchain contains a specific and verified record of a single transaction. Confidential and important data files can be stored securely on decentralized storage using the proposed framework so that privacy and confidentiality will be maintained. Due to improved scalability, large data files can be stored in the blockchain. Transaction speed and block generation time are also focused in the proposed framework, which is irrevocable in nature due to the use of blockchain smart contracts and IPFS.
Keywords
Blockchain Technology, Data Security, Distributed Servers, Data Storage, IPFS.
Reference
[1] Biryukov A., Khovratovich D., Pustogarov I. Deanonymisation of clients in bitcoin p2p network, In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. NY, USA (2014) 15–29.
[2] Johnson D., Menezes A., Vanstone S. The elliptic curve digital signature algorithm (ecdsa), International Journal of Information Security 1(1) (2001) 36–63
[3] Eyal I., Sirer EG. Majority is not enough: Bitcoin mining is Vulnerable, In: Proceedings of International Conference on Financial Cryptography and Data Security. Berlin, Heidelberg (2014) 436–454.
[4] Survey on blockchain technologies and related services, Tech. Report, NRI, METI, https://www.meti.go.jp/english/press/2016/pdf/0531_01f.pdf (2016)
[5] Zyskind G., Nathan O.: Decentralizing privacy: Using blockchain to protect personal data. In: Security and Privacy Workshops (SPW), 2015 IEEE. (2015) 180–184.
[6] Jin P., Jong P., Blockchain security in cloud computing: Use cases, Challenges and Solutions, Symmetry 2017, doi:10.3390 9(164) (2017)
[7] Hardjono T., Smith N. Cloud-based commissioning of constrained devices using permissioned blockchains, In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. ACM (2016) 29–36.
[8] Fries, Martin P., Paal, Boris. Smart Contracts, Mohr Siebeck, ISBN 978-3-16-156911-1 (2019).
[9] Buterin, V. A next-generation smart contract and decentralized application platform, white paper (2014).
[10] IPFS: a new peer-to-peer hypermedia protocol, https://ipfs.io (2016)
[11] Vincent T., Using IPFS for distributed file storage systems, https://medium.com/0xcode/using-ipfs-for-distributed-file-storage-systems-61226e07a6f (2020)
[12] Benet J., IPFS-content-addressed versioned, P2P filesystem, https://arxiv.org/pdf/1407.3561.pdf (2014)
[13] Ethereum-wiki, https://github.com/ethereum/wiki/wiki/Patricia-Tree. (2018)
[14] An Introduction to IPFS – ConsenSys – Medium. https://medium.com/@ConsenSys/anintroduction-to-ipfs 9bba4860abd0. (2018)
[15] Wood, G. Ethereum: A secure decentralised generalised transaction ledger, https://ethereum.github.io/yellowpaper/paper.pdf (2014)
[16] Zamfir, V. Introducing casper the friendly ghost Ethereum, https://blog.ethereum.org/2015/08/01/introducing-casper-friendly-ghost (2015)
[17] Ibm blockchain”, http://www.ibm.com/blockchain/ (2016)
[18] Nakamoto S.: Bitcoin: A peer-to-peer electronic cash system, https://bitcoin.org/bitcoin.pdf (2008)
[19] Zyskind G., Nathan O., Decentralizing Privacy: Using blockchain to protect personal data. In: Security and Privacy Workshops (SPW) - 2015 IEEE. (2015) 180–184.
[20] Tim A., Kishore A. Cameron A. Storj: A Decentralized Cloud Storage Network Framework – white paper, https://www.storj.io/storj.pdf (2018)
[21] Ericsson Home Page, Ericsson White Papers –Industrial Blockchain and Data Integrity, https://www.ericsson.com/hyperscale/cloud-infrastructure/data-centric-security/data-integrity-assurance (2018).
[22] N. Prusty, Building Blockchain projects – Develop real-time practical DApps using Ethereum and Java Script, 1st edition, Packt Publishing Ltd, Birmingham, UK. (2017)
[23] G. Zyskind, O. Nathan, A Pentland, Decentralizing Privacy: Using Blockchain to protect personal data, Security and Privacy Workshops (SPW), IEEE Conference Proceedings San Jose, CA, USA, (2015) 180-184.
[24] P. Morgan, Using Blockchain Technology to Prove Existence of a Document, https://bravenewcoin.com/news/using-blockchain-technology-to-prove-existence-of-a-document (2018)
[25] M. Pors, Understanding the IPFS White Paper part 2, https://decentralized.blog/understanding-the-ipfs-white-paper-part-2.html (2017)
[26] Kenny L., The Blockchain Scalability Problem & the Race for Visa-Like Transaction Speed, https://towardsdatascience.com/the-blockchain-scalability-problem-the-race-for-visa-like-transaction-speed-5cce48f9d44 (2019)
[27] XRP: The Best Digital Asset for Global Payments, https://ripple.com/xrp/ ( 2019)