The Security of A Blockchain Based File
The Security of A Blockchain Based File
The Security of A Blockchain Based File
ABSTRACT
Article Info Developing distributed form of file security systems using Blockchain
Volume 8, Issue 5 technology. Based on the idea of cloud storage as it is a leading storage
Page Number : 22-29 technology for huge data storage. Blockchain is one of the trending
technology for decentralized data storage systems that ensures privacy,
Publication Issue : confidentiality, data security, authentication, and integrity. As SDN network
September-October-2021 provides support to have various nodes in the network for the secure
transaction of data from source to destination. Blockchain helps in keeping
Article History track of block data by constructing the gateway to make it immutable. BCFS
Accepted : 01 Sep 2021 refers to Blockchain-Based File System Security in SDN. In the designed
Published: 05 Sep 2021 system, a Web-Based Interface is developed an authorized entity can upload
file data the user’s file is projected to encryption process and the block data is
shared among the various nodes in the network. Along with Unique
Document ID, encrypted random key, and hash data. This hash data value
holds the file path and preserves in the blockchain into their corresponding
block data folders. Detection of node failure across the network an automatic
short path is chosen by the network and detection of an attack based on
entropy value.
Keywords : Blockchain, Data Security, Encryption, Web Based Interface,
authenticated user, Node failure, attack.
Copyright: © the author(s), publisher and licensee Technoscience Academy. This is an open-access article distributed under the
terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use,
22
distribution, and reproduction in any medium, provided the original work is properly cited
Anusha M et al Int J Sci Res Sci Eng Technol, September-October-2021, 8 (5) : 22-29
As per the article [1], The Blockchain was first used in kinds of online services for data storing, sharing,
the cryptocurrency network i.e. Bitcoins. As modifying, and deleting. The CP-ABE (Ciphertext-
cryptocurrency networks prepare a virtual currency Policy Attribute-Based encryption) usage helps to
that is not dependent on any bank to manage the enhance the security of the fine-grained network. Lee,
transactions. This network can handle a huge number Bih-Hwang [3], As data security is the major
of transactions due to the key architecture of challenge the use of Blockchain is one of the security
Blockchain. Data integrity plays a major role in improving factors. Another is increasing security by
Blockchain’s leading edge as data information is encryption process by using AES 256bit, SHA 512bit,
unchangeable in the network. Blockchain technology IDA. HEROKU is one of the kinds of the platform as a
incorporates a list of single linked data which are of service. Which encourages the use of many coding
the form of blocks called Blockchain. A miner is used languages like Node.js, PHP, Java, Python, etc.
to create a set of blocks. In the designed system, a Chaitanya Rahalkar [4], As HyperText Transfer
Web-Based Interface helps to keep track of all owners Protocol is limited. In current world data duplication,
and users data in a SQL database. To enhance the data loss is a major issue. To overcome these securities,
security, accessibility, and integrity of the data SDN integrity-related issues P2P file-sharing systems came
network is used. Data accessibility is approved by the into existence. As the storage of data by the IPSF
owner of the data in a prioritized way for the protocol network is more secure. Data is of the form
corresponding file request. Based on the cloud storage of petabytes. Naizheng SU [5], step up the problems
approach and to secure the data integrity the that are related to centralized cloud storage and
proposed system is implemented using a web-based Blockchain is the best suggestion to solve the issues.
interface to keep track of the data access by The current trends of how sky drives. Google drives
unauthorized users. and dropbox are working in centralized cloud data
storage. Characteristics that influence the usage are
The major contribution of this paper is performance low cost, virtualization, high demand.
of a Web-Based User Interface to trace the data access
by unauthorized users by using the ideal cloud Shubham Desai [6], Blockchain enables all the users
standard methodology in SDN. This mechanism to create a ledger to hold all the transaction details.
provides a service to enhance data protection, data All modified, new, or delete transactions are then
security, privacy, authentication and confidentiality updates into the ledger of the user. Uses SHA and
in the data transaction. md5 algorithms for security purposes. It also uses the
HASBE mechanism to enhance the efficiency and
II. LITERATURE SURVEY
security of the system. Cachin Christian [7], this
paper discusses Blockchain data transaction is
Somanath Tripathy [1], Peer-to-Peer technology
pemissioned or permissionless. As hyperledger allows
helps to enhance the integrity, security, privacy, and
permissioned transactions. Hyperledger is an open-
confidentiality of the data in the network system. The
source platform which permits block data transaction
proposed mechanism uses the method called respect
between trusted entities. Subarna Shakya [8], The
score. It reduces the chance of attacks like RTI, Sybil
major discussion in today’s software-defined network
score attacks. Also provides a new mechanism to the
(SDN) is to increase the data security level. As
operating nodes in the network to enhance the
Blockchain is a distributed ledger data structure
respect score by providing transaction services. Yuke
element similar to linked list but these blocks stores
Liu [2], The centralized cloud services provide all
the hash value of previous blocks for further
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 8 | Issue 5 23
Anusha M et al Int J Sci Res Sci Eng Technol, September-October-2021, 8 (5) : 22-29
transactions. Openstack helps in the logical grouping management. Log Collection and log analysis are
of resources from the cloud storage. It uses SHA, major characteristics to monitor few standards like
Digital Signature algorithms for encryption purposes. SOX, DSS, etc. In [14], a well-known factor that
Blockchain Security over SDN (BSS) is proposed Blockchain technology maintains confidentiality,
which protects data privacy and availability of data certainty, and availability of information. The paper
resources against fraudulent users. Jiasi Weng [9], explores about , the block data is subjected to the
Blockchain-based secure monolithic technique is used crypto hashing process. A hash function stores the
for SDN. As SDN, provides a network for both control variable-length data along with hash values in it. It
plane and data plane With these features, several also uses Digital Signatures for encryption purposes
pitfalls of the traditional network architectures such and generates the private key to fetch the original
as maintenance cost, resource utilization, network data and the comparison between Blockchain with
management, integrity & consistency of information digital signature and Blockchain without a digital
and controller utilization can be effectively avoided as signature is done for performance analysis. Meet Shah
an exposed mode between both control and the data [15], As Blockchain is one of the decentralized storage
planes is present. Ruj, Sushmita [10], This paper, systems. The paper, explains the metamask browser
Includes Blockchain data transactions from source to extensions how the data is divided into blocks, and
destination in the form of blocks. As Block Store uses data transmission to multiple peers in the form of
Blockchain technology which guarantees the blocks. Uses AES encryption standards for encryption
transaction between host and renters. Whether these purposes.
entities are available for the public. As renters can
create, search, modify, delete the data. Indrajeet Bharadwaj [16], By making use of
Blockchain technology for security purposes of all
BhavinKumar Kothari [11], The Internet of Things is single users' data. To prevent data access from
an interconnected network for all computing unauthorized users due to huge loss of data, privacy,
elements. As Blockchain provides a wide area for IoT confidentiality and, security. Sarra Boukria[17],
gadgets and applications. Describes how the Software Defined Networking (SDN) technology
communication and transaction of data take place enhances the network certainty, integrity, and
between various IoT devices and how data is stored reliability of data. The paper talks about, the
on decentralized Blockchain systems by using new communication between various elements of the SDN
technologies of Bluetooth, 4G, etc. Manisha Nehe [12], network and forwarding devices plays a major role.
Data reliability is the major problem in the current The false rules forwarded from the attacker to the
network world. Blockchain plays a major role in Software-Defined Network constituents of the data
security, identity, data transparency, security of data layer are detected.
during a data transaction. As many of us have less
information about how Blockchain works its III. METHODS AND MATERIAL
awareness and adoption. As Digital signature
generates information of data integrity and data The designed interface mechanism includes five
integrity of the signer is discussed. David Janos Feher sections as shown in below fig 1. The user first creates
[13], the paper discusses how authentication will play an account or register on the Web-Based Interface.
a role in the blockchain. Nowadays authentication is a The user details are stored in a database and the user
major issue in the network system. As high-end can access the data only through registered details also
companies make use of Security information event
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 8 | Issue 5 24
Anusha M et al Int J Sci Res Sci Eng Technol, September-October-2021, 8 (5) : 22-29
the data are fetched in the application through a Visual Studio: Visual Studio uses a database where one
register. aspx from the Web-Based Interface. can add any number of databases to make an
application platform as per the requirements. As
Visual Studio is a open-source software.
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 8 | Issue 5 25
Anusha M et al Int J Sci Res Sci Eng Technol, September-October-2021, 8 (5) : 22-29
data for lawful users. The hash value stores the file IV. RESULTS AND DISCUSSION
path. The file data is mapped with the hash value of
the users file and the associated unique Document A. System Designed with Register and login page
name and Document ID then stored in blockchain.
As depicted in fig 3.To access the Web-Based
SDN network is likely to provide support for privacy,
Interface, GUI users have to first sign up on Web-
security, and confidentiality of file data. Network
Based Interface and log in with the relative
controls the transaction between every single node in
registered username and passwords. The interface
each scenario. Below are few lines of code executed in
directs the users to the home page to select the file
a blockchain network when predetermined
to upload when the login is successful.
conditions are true.
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 8 | Issue 5 26
Anusha M et al Int J Sci Res Sci Eng Technol, September-October-2021, 8 (5) : 22-29
D. Designed System with Secret Key Interface Decryptio Asks for Successfull Pass
n of file downloade y displays
Fig.5 shows the secret private key generated to the
d cloud file the fields as
particular file access when the owner grants
and on
permission to the file request and he/she download
encryption expected
the file data. This secret key is then validated and
key file and result.
then he/she can download the file data.
the key
TC value sent
- 04 to the mail
File Select file Successful Pass
forwardin to send
g with
TC recipient
- 05 mail ID
If User ID Display “*” is Fail
Figure 5. Secret private key generated to the
is not message displayed
particular file access
correct “Enter the
TABLE I TC correct user
TEST CASE FOR ALL PHASE - 06 ID”.
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 8 | Issue 5 27
Anusha M et al Int J Sci Res Sci Eng Technol, September-October-2021, 8 (5) : 22-29
the owner of the data the authorized user can access Blockchain-Based Meta-Data IntegrityIEEE
the requested file. The designed system tries to 2019 International Conference on Advances in
resolve the problems related to unauthorized access Computing, Communication and Control
for file data, confidentiality, reliability, and (ICAC3).
dependability. As SDN network plays a major role in [5]. DIAO Zhe, WANG Qinghong, SU Naizheng,
node failure detection for various scenarios and ZHANG Yuhan, “Study on Data Security Policy
attack detection based on entropy values in several Based On Cloud Storage IEEE 2017 3rd
scenarios. International Conference on Big Data Security
on Cloud
VI. FUTURE SCOPE [6]. Shubham Desai, Onkar Deshmukh, Harish
Choudhary, Rahul Shelke ” Blockchain-based
The future scope of the proposed system can be secure data storage and access control system
implemented, using a scheduling algorithm that can using cloud”, IEEE 2019 , ICCUBEA .
include data that could be accessed many times by [7]. Cachin Christian,” Architecture of the
multiple legitimate users. This helps to make sure hyperledger blockchain fabric”, 2016.
the frequently accessed files to the owner of the data [8]. Subarna Shakya, Sadhu Ram Basnet ”
and files accessibility is made easier to the Blockchain Security Over Software Defined
authorized users whenever needed. Centralized Network”. IEEE, 2017
cloud storage can also be implemented with the [9]. Yue Zhang, Weng Jian , ” Secure Software-
backend SDN network for secured data transactions Defined Networking based on Blockchain”,
of the file data and to keep track of attacks to access 2019
the file data by unauthorized users. [10]. Ruj, Sushmita, Anirban Basu , Mohammad
Shahriar Rahman , Shinsaku Kiyomoto “A
VII.REFERENCES Secure Decentralized Storage Framework on
Blockchain” 2018 IEEE International
[1]. Srikanta Pradhan, Sukumar Nandi, Somanath Conference on Advanced Information
Tripathy, “Blockchain-based Security Networking and Applications
Framework for P2P File sharing system”. IEEE (AINA).IEEE,2018
(ANTS) 2018 [11]. BhavinKumar Kothari, Shakthi Mudaliar and
[2]. Yuke Liu,” A Blockchain-based secure cloud Sabestin Nadar, “Securing IoT with
files sharing scheme with fine-grained access Blockchain”, Proceedings of the Fifth
control” IEEE, International conference on International Conference on Inventive
networking and network applications Computation Technologies (ICICT-2020), IEEE
IEEE,2018 2020.
[3]. Lee, Bih-Hwang, Ervin Kusuma Dewi, [12]. Manisha Nehe, “A survey on Data Security
Muhammad Farid Wajdi,”Data security in using Blockchain: Merits, Demerits, and
cloud computing using AES under HEROKU Applications”.IEEE, 2019 International
cloud.” 2018 27th wireless and optical Conference on Recent Advances in Energy-
communication , IEEE. Efficient Computing and Communication
[4]. Chaitanya Rahalkar, Dhaval Gujar, “Content (ICRAECC)
Addressed P2P File System for the Web with [13]. Barnabas Sandor, David Janos Feher, Log File
Authentication and Storage on Blockchain
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 8 | Issue 5 28
Anusha M et al Int J Sci Res Sci Eng Technol, September-October-2021, 8 (5) : 22-29
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 8 | Issue 5 29