To see the other types of publications on this topic, follow the link: IPFS Storage Protocols.

Journal articles on the topic 'IPFS Storage Protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IPFS Storage Protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shamili, Mrs S. Francis. "Enchancing Health Records Security Through Blockchain Protocols." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35084.

Full text
Abstract:
The traditional health record sharing system faces challenges in security, privacy, and efficient sharing. "Sec-Health" protocol, a blockchain-based solution, addresses these issues by integrating advanced cryptographic techniques. Its structured workflow includes setup, storage, sharing, and emergency access phases, ensuring controlled access and data integrity. Through blockchain and IPFS networks, users register securely in the setup phase. Health records are encrypted and stored in the blockchain network during storage. Access in the sharing phase is controlled by cryptographic material, allowing only authorized users. The emergency access phase ensures immediate and legitimate access during critical situations. Patients have dynamic control over their records through access revocation. Overall, Sec-Health offers a dynamic solution that enhances security, privacy, and collaboration in healthcare data management. Keywords: Blockchain, Healthcare, Records, Security
APA, Harvard, Vancouver, ISO, and other styles
2

Chaitanya, A. Krishna, K. Nitish, M. Srinivas, and K. Padmini. "Secure Tweet: Blockchain-Based Social Media Using Web 3.0." ITM Web of Conferences 74 (2025): 02004. https://doi.org/10.1051/itmconf/20257402004.

Full text
Abstract:
Blockchain is a technology that offers novel solutions to the distributed environment. The proposed project develops an IPFS data storage system through blockchain technology to decrease social media’s reliance on central systems Smart contracts like Ganache, MetaMask, Truffle, and Ethereum are used to store metadata of files in blockchain and facilitate transaction on Goerli test network and any peer-to-peer distributed network. This decentralized approach was further powered by Pinata which is data processingoriented, data storage, in addition to insuring a secure chain. The system would offer essential features for users who could tweet and view content and delete information in addition to enhancing security measures and enhancing privacy protocols and entity control capabilities to address traditional system failures.
APA, Harvard, Vancouver, ISO, and other styles
3

Mohanty, Dr Rajnikanth. "BlockShare – Blockchain Based Secure Data Sharing Platform." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46157.

Full text
Abstract:
Abstract - In the rapidly advancing digital era, the requirement for secure, transparent, and reliable data-sharing mechanisms has become increasingly critical across various sectors. Traditional centralized data-sharing models suffer from inherent limitations, including vulnerability to data breaches, unauthorized access, single points of failure, and insufficient transparency in data access and audit trails. These challenges compromise not only the confidentiality and integrity of sensitive data but also erode stakeholder trust in digital systems. To overcome these issues, this paper presents BlockShare, a blockchain-powered, decentralized framework designed to facilitate secure, tamper-proof, and efficient data exchange. BlockShare leverages the foundational principles of blockchain technology—namely decentralization, immutability, and transparency—to enhance the robustness and reliability of data-sharing architectures. The proposed system eliminates central authority dependence by distributing data storage and control across a decentralized ledger, thereby minimizing potential attack vectors and ensuring continuous data availability. To regulate data access and maintain policy enforcement, smart contracts written in Solidity are integrated within the system. These smart contracts autonomously manage permissions and user authentication, ensuring that only verified and authorized parties can access specific datasets, with every action recorded immutably on the blockchain. Moreover, data confidentiality is preserved through the implementation of AES-256 encryption, a widely recognized standard for high-security data protection. Prior to storage, all data is encrypted and then uploaded to a decentralized file system, specifically the InterPlanetary File System (IPFS), which provides enhanced fault tolerance, redundancy, and distributed access. This dual-layered approach—combining blockchain for governance and IPFS for storage—ensures that data remains protected both in transit and at rest. By integrating smart contract-based automation, robust encryption protocols, and distributed storage solutions, BlockShare delivers a scalable and resilient infrastructure for data exchange. The system is particularly applicable in domains requiring stringent data protection and transparency, such as healthcare, finance, legal, and government sectors. Through this innovative approach, BlockShare aims to redefine trust in digital interactions and lay the groundwork for the next generation of secure data-sharing ecosystems. Keywords - Blockchain, Data Sharing, Decentralized Storage, Smart Contracts, Encryption, IPFS, Ethereum, Security, Data Privacy, AES-256, Web3, Authentication, DApp, Decentralization, Access Control.
APA, Harvard, Vancouver, ISO, and other styles
4

Pratap, Aryan. "Personalized and Decentralized Multipurpose Storage Deck Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 3174–79. https://doi.org/10.22214/ijraset.2025.68031.

Full text
Abstract:
In today's digital world, finding a secure, efficient, and versatile way to store data is more important than ever. This paper introduces Ledger Box, a personalized and decentralized multipurpose storage deck that uses blockchain technology to tackle these challenges. Ledger Box combines MetaMask for secure user authentication, InterPlanetary File System (IPFS) for decentralized file storage, and smart contracts to automate and enforce data management policies. The goal is to create a reliable platform where users can store, share, and manage their data with top-notch security, privacy, and ease of access. By harnessing the power of blockchain, Ledger Box ensures that data remains intact and unchangeable, while its personalized features cater to the unique needs of each user. We'll dive into the architecture of Ledger Box, exploring its key components like smart contracts, encryption mechanisms, and user authentication protocols. Our performance evaluations show that Ledger Box can handle various types and volumes of data effectively, making it a promising solution for modern data storage needs. This study adds to the growing research on blockchain applications, offering valuable insights into building secure and user-friendly storage systems
APA, Harvard, Vancouver, ISO, and other styles
5

Sameena Shaik. "A Cutting-Edge Security Solution System for Smart Home by Applying the Intelligent AI And BC Framework to Secure Data." Journal of Information Systems Engineering and Management 10, no. 10s (2025): 649–59. https://doi.org/10.52783/jisem.v10i10s.1454.

Full text
Abstract:
Revolutionary technologies like blockchain and artificial intelligence (AI) have come together due to the fast Internet of Things (IoT) growth. Thanks to these technologies coming together, complex infrastructures like "smart homes," "smart cities," and "smart industries" have become possible to build. While IoT gadgets may provide excellent connection and convenience, they often use insecure conventional network interfaces. These older communication protocols and interfaces may be vulnerable if they aren't securely upgraded and protected. This research has developed a strong framework that utilizes the AI along with blockchain technology capabilities to work with the security concerns related to smart home systems (SHS). To start, the research used an isolation forest (IF) algorithm with random segmentation, anomaly score computation, route length, as well as thresholding phases to get rid of the weird data in a normal dataset for SHS. To further categorize the data as either attack or non-attack, the dataset is then used to train classification algorithms including Catboost, K-nearest neighbors (KNN), support vector machines (SVM), and linear discriminate analysis (LDA). When protecting sensitive information from data manipulation assaults, it is also stored in an interplanetary file system (IPFS). In order to save non-attack data safely, IPFS functions as an onsite storage system; the generated hash is then sent to the immutable register of the blockchain. Different performance metrics were used to assess the proposed framework.
APA, Harvard, Vancouver, ISO, and other styles
6

Ortega, Julio César Úbeda, Jesús Rodríguez-Molina, Margarita Martínez-Núñez, and Juan Garbajosa. "A Proposal for Decentralized and Secured Data Collection from Unmanned Aerial Vehicles in Livestock Monitoring with Blockchain and IPFS." Applied Sciences 13, no. 1 (2022): 471. http://dx.doi.org/10.3390/app13010471.

Full text
Abstract:
Livestock monitoring often requires human supervision to guide farm animals to a specific point and the displacement of workers to the places where these animals are, which is likely to be several kilometers away, thus resulting in a repetitive task that requires a significant amount of time and demands the usage of land vehicles capable of moving swiftly through the countryside. In addition to that, data collection about animal behaviour with such procedures is often insufficient and cannot be shared in a secure enough manner. This paper describes how Using Unmanned Aerial Vehicles (UAVs) tailored for this kind of task, when combined with other protocols and software technologies, can provide a useful to mitigate these issues. To prove this end, a functional prototype has been designed, built and tested, offering the operator accurate monitoring of farm facilities and animals. Additionally, security has been conceived as a cornerstone of the presented system from the very beginning. Not only the communication protocols used for this purpose have built-in security layers, but also InterPlanetary File System (IPFS) and blockchain have been used as the technologies that enhance data storage among peers in a network.
APA, Harvard, Vancouver, ISO, and other styles
7

Pincheira Caro, Miguel Rodrigo, Elena Donini, Massimo Vecchio, and Salil Kanhere. "A Decentralized Architecture for Trusted Dataset Sharing Using Smart Contracts and Distributed Storage." Sensors 22, no. 23 (2022): 9118. http://dx.doi.org/10.3390/s22239118.

Full text
Abstract:
The data economy is based on data and information sharing and tremendously impacts society as it facilitates innovative collaborations and decision-making strategies. Nonetheless, most dataset-sharing solutions rely on a centralized authority that rules data ownership, availability, and accessibility. Recent works have explored the integration of distributed storage and blockchain to enhance decentralization, data access, and smart contracts for automating the interactions between actors and data. However, current solutions propose a smart contract design limiting the system’s scalability in terms of actors and shared datasets. Furthermore, little is known about the performance of these architectures when using distributed storage instead of centralized storage approaches. This paper proposes a scalable architecture called DeBlock for data sharing in a trusted way among unreliable actors. The architecture integrates a public blockchain that provides a transparent record of datasets and interactions, with a distributed storage for data storage in a completely decentralized way. Furthermore, the architecture provides a smart-contract design for a transparent catalog of datasets, actors, and interactions with efficient search and retrieval capabilities. To assess the system’s feasibility, robustness, and scalability, we implement a prototype using the Ethereum blockchain and leveraging two decentralized storage protocols, Swarm and IPFS. We evaluate the performance of our proposed system in different scenarios (e.g., varying the amount and size of the shared datasets). Our results demonstrate that our proposal outperforms benchmarks in gas consumption, latency, and resource requirements, especially when increasing the number of actors and shared datasets.
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmed, Huda A., and Hamid Ali Abed AL-Asadi. "An Optimized Link State Routing Protocol with a Blockchain Framework for Efficient Video-Packet Transmission and Security over Mobile Ad-Hoc Networks." Journal of Sensor and Actuator Networks 13, no. 2 (2024): 22. http://dx.doi.org/10.3390/jsan13020022.

Full text
Abstract:
A mobile ad-hoc network (MANET) necessitates appropriate routing techniques to enable optimal data transfer. The selection of appropriate routing protocols while utilizing the default settings is required to solve the existing problems. To enable effective video streaming in MANETs, this study proposes a novel optimized link state routing (OLSR) protocol that incorporates a deep-learning model. Initially, the input videos are collected from the Kaggle dataset. Then, the black-hole node is detected using a novel twin-attention-based dense convolutional bidirectional gated network (SA_ DCBiGNet) model. Next, the neighboring nodes are analyzed using trust values, and routing is performed using the extended osprey-aided optimized link state routing protocol (EO_OLSRP) technique. Similarly, the extended osprey optimization algorithm (EOOA) selects the optimal feature based on parameters such as node stability and link stability. Finally, blockchain storage is included to improve the security of MANET data using interplanetary file system (IPFS) technology. Additionally, the proposed blockchain system is validated utilizing a consensus technique based on delegated proof-of-stake (DPoS). The proposed method utilizes Python and it is evaluated using data acquired from various mobile simulator models accompanied by the NS3 simulator. The proposed model performs better with a packet-delivery ratio (PDR) of 91.6%, average end delay (AED) of 23.6 s, and throughput of 2110 bytes when compared with the existing methods which have a PDR of 89.1%, AED of 22 s, and throughput of 1780 bytes, respectively.
APA, Harvard, Vancouver, ISO, and other styles
9

Almohana, Albatoul, Iman Almomani, and Walid El-Shafai. "B-UMCS: Blockchain-enabled Unified Medical Consultancy Service." PLOS ONE 19, no. 12 (2024): e0310603. https://doi.org/10.1371/journal.pone.0310603.

Full text
Abstract:
The advent of blockchain technology within the healthcare domain has signified a paradigm shift, transitioning from an emerging trend to an essential infrastructure component that ensures decentralization, transparency, integrity, and persistent availability. Despite its potential, the healthcare sector has not fully capitalized on the vast array of benefits blockchain technology offers. Most existing works utilized blockchain technology within a specific healthcare entity’s services but not among several healthcare organizations. They notably lack the provision for direct communication and knowledge transfer between doctors from different hospitals. Therefore, this paper introduces a pioneering Blockchain-based Unified Medical Consultancy Service (B-UMCS) that leverages blockchain’s robustness to revolutionize telehealth services by (a) alleviating the shortage of medical expertise through facilitating the interconnection of physicians from diverse hospitals and geographical areas onto a consolidated platform, (b) promoting the seamless sharing of medical consultations, electronic health records (EHRs), and expert insights while upholding rigorous security and privacy protocols, (c) integrating the inherent security mechanisms of blockchain with the distributed data storage functionality offered by the Interplanetary File System (IPFS). This work details the B-UMCS’s components, interactions, smart contracts, protocols, algorithms, storage and transmission of EHRs, and their corresponding implementations. The evaluations of the proposed B-UMCS reveal that it secures and facilitates the sharing of EHRs and enables healthcare professionals to collaborate and exchange expertise seamlessly across institutional boundaries. They are additionally ensuring that healthcare providers can offer their knowledge in an efficient and scalable manner. Overall, B-UMCS not only addresses the current challenges in healthcare data security and accessibility but also opens new avenues for collaboration and knowledge sharing among healthcare professionals, ultimately contributing to improving patient care quality.
APA, Harvard, Vancouver, ISO, and other styles
10

Saurav, Jaiswal. "Signature Encryption using Blockchain." International Journal of Engineering and Advanced Technology (IJEAT) 14, no. 2 (2024): 1–5. https://doi.org/10.35940/ijeat.B4555.14021224.

Full text
Abstract:
<strong>Abstract:</strong> A secure, non-corruptible, and distributed database technology working on the concept of hashing and decentralized networks. A blockchain is on peer-to-peer technologies, thus there is no chance of failure. So, when a transaction occurs between two nodes, it is stored in the form of a block using a cryptographic mechanism, which makes it extremely difficult for a third party to corrupt it. This cryptography mechanism is responsible for generating each hash based on the previous hash and recording it along with a nonce. Hence, this makes each transaction that resides in the block linked with the previous transaction. If any of the transactions are breached, all the other blocks on the network will immediately show the affected changes. The banking system in recent days is highly reliable on paper and outworn long processes. It is necessary to have an upgraded system integrated with consistent and trustworthy technology that could overcome fraud and security issues. Blockchain technology can give financial institutes the much-needed edge in technology. So, in this project, we are trying to secure the digitalsignature using SHA 256 encryption and perform a secure transaction over a decentralized banking network. We will be developing the based banking network so that all the sophisticated banks&rsquo;s data is protected and does not reside over a central network. Instead, it gets stored in each node server of the distributed banking network.
APA, Harvard, Vancouver, ISO, and other styles
11

Shah, Khush, Nilesh Kumar Jadav, Sudeep Tanwar, et al. "AI and Blockchain-Assisted Secure Data-Exchange Framework for Smart Home Systems." Mathematics 11, no. 19 (2023): 4062. http://dx.doi.org/10.3390/math11194062.

Full text
Abstract:
The rapid expansion of the Internet of Things (IoT) on a global scale has facilitated the convergence of revolutionary technologies such as artificial intelligence (AI), blockchain, and cloud computing. The integration of these technologies has paved the way for the development of intricate infrastructures, such as smart homes, smart cities, and smart industries, that are capable of delivering advanced solutions and enhancing human living standards. Nevertheless, IoT devices, while providing effective connectivity and convenience, often rely on traditional network interfaces that can be vulnerable to exploitation by adversaries. If not properly secured and updated, these legacy communication protocols and interfaces can expose potential vulnerabilities that attackers may exploit to gain unauthorized access, disrupt operations, or compromise sensitive data. To overcome the security challenges associated with smart home systems, we have devised a robust framework that leverages the capabilities of both AI and blockchain technology. The proposed framework employs a standard dataset for smart home systems, from which we first eliminated the anomalies using an isolation forest (IF) algorithm using random partitioning, path length, anomaly score calculation, and thresholding stages. Next, the dataset is utilized for training classification algorithms, such as K-nearest neighbors (KNN), support vector machine (SVM), linear discriminate analysis (LDA), and quadratic discriminant analysis (QDA) to classify the attack and non-attack data of the smart home system. Further, an interplanetary file system (IPFS) is utilized to store classified data (non-attack data) from classification algorithms to confront data-manipulation attacks. The IPFS acts as an onsite storage system, securely storing non-attack data, and its computed hash is forwarded to the blockchain’s immutable ledger. We evaluated the proposed framework with different performance parameters. These include training accuracy (99.53%) by the KNN classification algorithm and 99.27% by IF for anomaly detection. Further, we used the validation curve, lift curve, execution cost of blockchain transactions, and scalability (86.23%) to showcase the effectiveness of the proposed framework.
APA, Harvard, Vancouver, ISO, and other styles
12

Hussien, Hassan Mansur, Sharifah Md Yasin, Nur Izura Udzir, and Mohd Izuan Hafez Ninggal. "Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage." Sensors 21, no. 7 (2021): 2462. http://dx.doi.org/10.3390/s21072462.

Full text
Abstract:
Blockchain technology provides a tremendous opportunity to transform current personal health record (PHR) systems into a decentralised network infrastructure. However, such technology possesses some drawbacks, such as issues in privacy and storage capacity. Given its transparency and decentralised features, medical data are visible to everyone on the network and are inappropriate for certain medical applications. By contrast, storing vast medical data, such as patient medical history, laboratory tests, X-rays, and MRIs, significantly affect the repository storage of blockchain. This study bridges the gap between PHRs and blockchain technology by offloading the vast medical data into the InterPlanetary File System (IPFS) storage and establishing an enforced cryptographic authorisation and access control scheme for outsourced encrypted medical data. The access control scheme is constructed on the basis of the new lightweight cryptographic concept named smart contract-based attribute-based searchable encryption (SC-ABSE). This newly cryptographic primitive is developed by extending ciphertext-policy attribute-based encryption (CP-ABE) and searchable symmetric encryption (SSE) and by leveraging the technology of smart contracts to achieve the following: (1) efficient and secure fine-grained access control of outsourced encrypted data, (2) confidentiality of data by eliminating trusted private key generators, and (3) multikeyword searchable mechanism. Based on decisional bilinear Diffie–Hellman hardness assumptions (DBDH) and discrete logarithm (DL) problems, the rigorous security indistinguishability analysis indicates that SC-ABSE is secure against the chosen-keyword attack (CKA) and keyword secrecy (KS) in the standard model. In addition, user collusion attacks are prevented, and the tamper-proof resistance of data is ensured. Furthermore, security validation is verified by simulating a formal verification scenario using Automated Validation of Internet Security Protocols and Applications (AVISPA), thereby unveiling that SC-ABSE is resistant to man-in-the-middle (MIM) and replay attacks. The experimental analysis utilised real-world datasets to demonstrate the efficiency and utility of SC-ABSE in terms of computation overhead, storage cost and communication overhead. The proposed scheme is also designed and developed to evaluate throughput and latency transactions using a standard benchmark tool known as Caliper. Lastly, simulation results show that SC-ABSE has high throughput and low latency, with an ultimate increase in network life compared with traditional healthcare systems.
APA, Harvard, Vancouver, ISO, and other styles
13

Dammak, Bouthaina, Mariem Turki, Saoussen Cheikhrouhou, Mouna Baklouti, Rawya Mars, and Afef Dhahbi. "LoRaChainCare: An IoT Architecture Integrating Blockchain and LoRa Network for Personal Health Care Data Monitoring." Sensors 22, no. 4 (2022): 1497. http://dx.doi.org/10.3390/s22041497.

Full text
Abstract:
Over the past several years, the adoption of HealthCare Monitoring Systems (HCS) in health centers and organizations like hospitals or eldery homes growth significantly. The adoption of such systems is revolutionized by a propelling advancements in IoT and Blockchain technologies. Owing to technological advancement in IoT sensors market, innovations in HCS to monitor patients health status have motivated many countries to strength their efforts to support their citizens with such care delivery systems under the directives of a physician who has access to patient’s data. Nevertheless, secure data sharing is a principal patient’s concern to be comfort to use such systems. Current HCS are not able to provide reassuring security policies. For that, one of our focus in this work, is to provide security countermeasures, likewise cost-efficient solution for HCS by integrating storage model based on Blockchain and Interplanetary File Systems (IPFS). Blockchain technology is an emerging solution in pharmaceutical industry and starts to take place for HCS and allows HealthCare providers to track connected devices and control access to shared data, hence protecting patients’ privacy. Furthermore, the addition of Edge and Fog computing has improved HCS to react in real-time and enhance their reliability. A variety of communication protocols can connect sensor devices to edge/Fog layer and the best choice will depend upon connectivity requirements: range, bandwidth, power, interoperability, security, and reliability. Instead, systems efficiency would decline and hurt if communication protocol is inconsistent. LoRa (Long Range) communications technology is emerging as the leader among Low-Power Wide-Area Networks (LPWANs) entering the IoT domain benefiting from many features such as long-range distances and low power consumption. This work proposes LoRaChainCare, an architecture model for HCS which combines the technologies Blockchain, Fog/Edge computing, and the LoRa communication protocol. A real implementation of LoRaChainCare system is presented and evaluated in terms of cost, run time and power consumption.
APA, Harvard, Vancouver, ISO, and other styles
14

Timothy, Arndt, Guercio Angela, and Chae Younghun. "AN EVALUATION OF SECURITY IN BLOCKCHAIN-BASED SHARING OF STUDENT RECORDS IN HIGHER EDUCATION." International Journal of Network Security & Its Applications (IJNSA) 14, no. 3 (2022): 01–09. https://doi.org/10.5281/zenodo.6618591.

Full text
Abstract:
Blockchain has recently taken off as a disruptive technology, from its initial use in cryptocurrencies to wider applications in areas such as property registration and insurance due to its characteristic as a distributed ledger which can remove the need for a trusted third party to facilitate transactions. This spread of the technology to new application areas has been driven by the development of smart contracts &ndash; blockchain-based protocols which can automatically enforce a contract by executing code based on the logic expressed in the contract. One exciting area for blockchain is higher education. Students in higher education are ever more mobile, and in an ever more agile world, the friction and delays caused by multiple levels of administration in higher education can cause many anxieties and hardships for students as well as potential employers who need to examine and evaluate student credentials. Distance learning as a primary platform for higher education promises to open up higher education to a wider range of learners than ever before. Blockchain-based storage of academic credentials is being widely studied due to the advantages it can bring. As with any network-based system, blockchain comes with a number of security and privacy concerns. Blockchain needs to meet several security-related requirements to be widely accepted: decentralization; confidentiality; integrity; transparency; and immutability. Researchers have been busy devising schemes to ensure that such requirements can be met in blockchain-based systems. Several types of blockchain-specific attacks have been identified: 51% attacks; malicious contracts; spam attacks; mining pools; targeted DDoS attacks; and others. Real-world attacks on blockchain-based systems have been seen on cryptocurrency sites. In this paper, we will evaluate the specific privacy and security concerns for blockchain-based systems used for academic credentials as well as suggested solutions. We also examine the issues for academic credentials which are stored &ldquo;off-chain&rdquo; in such systems (as is often the case). In this case, a Distributed File System (DFS) implemented with a peer-to-peer (P2P) architecture is often the choice for the storage of the academic credentials since it matches the decentralized nature of blockchain. Blockchain then contributes much to the usefulness of such a DFS, making it in turn a good match for a P2P DFS such as IPFS.
APA, Harvard, Vancouver, ISO, and other styles
15

Mahesh, Mokale. "Privacy-First Architectures for Cross-Border Media Content Distribution." International Journal of Leading Research Publication 4, no. 6 (2023): 1–11. https://doi.org/10.5281/zenodo.15050964.

Full text
Abstract:
With the rapid globalization of media content distribution, ensuring user privacy while adhering to international regulations is a critical challenge. Cross-border media distribution involves handling user data across multiple jurisdictions, each with its own privacy regulations and compliance requirements. Traditional centralized content distribution models often compromise user privacy due to excessive data collection, exposure to security vulnerabilities, and reliance on third-party intermediaries. As digital media consumption grows, the need for privacy-focused solutions becomes more urgent. Current systems store and process large amounts of user data, creating significant privacy concerns. These concerns range from potential data breaches and unauthorized access to government surveillance and third-party tracking. The reliance on cloud-based infrastructure controlled by major corporations raises additional concerns regarding data sovereignty and user control. Without robust privacy-first architectures, media distribution networks may inadvertently expose sensitive user information, violating regional privacy laws such as the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA) in the U.S., and other global standards. This white paper explores privacy-first architectures that leverage decentralized storage, blockchain-based authentication, and encryption methodologies to enable secure and regulation-compliant media content distribution. We discuss technological advancements such as end-to-end encryption (E2EE), federated identity management, and secure multi-party computation (SMPC), which help mitigate risks related to data exposure and unauthorized access. Additionally, we analyze how edge computing can enhance privacy while improving content delivery performance. Furthermore, we present implementation strategies that include privacy-preserving content recommendation systems, regulatory-aware data routing mechanisms, and the integration of decentralized storage solutions like the InterPlanetary File System (IPFS). By employing these methods, media platforms can deliver personalized user experiences without compromising security or compliance. A real-world case study of a privacy-first streaming platform illustrates the practical application of these concepts. The case study demonstrates how decentralized networks, encryption protocols, and blockchain-based licensing management create a secure, transparent, and scalable solution for media content distribution. By adopting a privacy-centric approach, media content providers can foster user trust, comply with regional data protection laws such as GDPR and CCPA, and enhance the security of digital content distribution. This paper aims to provide a comprehensive framework for building resilient, privacy-first architectures that meet the growing demand for secure and seamless global media access. The proposed solutions emphasize decentralization, cryptographic security, and regulatory compliance to create a sustainable future for digital media distribution.
APA, Harvard, Vancouver, ISO, and other styles
16

Shinde, Smita. "D-Drive: Decentralized Storage Space using Blockchain and IPFS Protocol." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1899–904. http://dx.doi.org/10.22214/ijraset.2023.50478.

Full text
Abstract:
Abstract: Centralized cloud-based storage has received great attention and has been extensively used by many companies in recent years. However, these cloud based storage are not secure because of the involvement of a centralized entity or a third party. On the other hand, there is a need for blockchain based decentralized storage to maximize data privacy and security. This paper proposed D-Drive, an IPFS-based decentralized storage space to solve the problem. D-Drive is a software solution trying to prove that centralized cloud-based storage applications can be decentralized, more secure, and efficient. This paper proposed developing a web-based application that provides a user interface,from which the user can directly share their data or files. Then, the user file is encrypted and stored across a peer-to-peer network using IPFS protocol instead of HTTP protocol and a cryptocurrency will be used as a payment mechanism. D-Drive’s primary objective is to provide secure decentralized storage space.
APA, Harvard, Vancouver, ISO, and other styles
17

Shalom, G. Richa, and Ganesh Rohit Nirogi. "Decentralized Cloud Storage Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 1294–300. http://dx.doi.org/10.22214/ijraset.2022.46810.

Full text
Abstract:
Abstract: Because of its accessibility and ease of use, cloud storage has become the most widely used type of storage on the market in recent years. However, the privacy and data security of cloud storage are at risk. The protection of data security and privacy is the main topic of this essay. We suggest a blockchain-based decentralised storage system. Since blockchain is a distributed peer-to-peer system, any processing node connected to the internet can join and build peers' networks, maximising resource usage. Blockchain protects data security. The user's file is encrypted and shared among a number of network peers in the proposed system utilising the IPFS (Interplanetary File System) protocol. Hashes are generated by IPFS. The path of the file is indicated by the hash value, which is kept on the blockchain. This project is focused on decentralised secure data storage, high data availability, and effective storage resource usage.
APA, Harvard, Vancouver, ISO, and other styles
18

Sanjay Kanth Balachandar. "Blockchain-enabled Data Governance Framework for Enhancing Security and Efficiency in Multi-Cloud Environments through Ethereum, IPFS, and Cloud Infrastructure Integration." Journal of Electrical Systems 20, no. 5s (2024): 2132–39. http://dx.doi.org/10.52783/jes.2555.

Full text
Abstract:
In today's digital landscape, the exponential growth of big data demands secure and efficient processing, particularly in complex multi-cloud environments. This paper proposes an innovative blockchain-enabled data governance framework, revolutionizing data management, processing, and security across diverse cloud infrastructures. The framework integrates cutting-edge technologies, including the Ethereum blockchain, the InterPlanetary File System (IPFS) protocol, and cloud solutions like OpenStack and Red Hat OpenShift. At its core, the framework utilizes Ethereum's robust smart contracts and consensus mechanisms to establish a decentralized and secure data governance model. This ensures data integrity, transparency, and immutability, mitigating risks associated with centralized storage and processing. The IPFS protocol complements blockchain by offering efficient data sharding and retrieval mechanisms, enhancing data accessibility and fault tolerance in distributed cloud environments. Through comprehensive testing and analysis, the proposed framework's value is demonstrated. Performance metrics, including throughput, latency, CPU utilization, and memory utilization, were meticulously evaluated to assess system efficiency and scalability. Results indicate high performance, with Ethereum's Proof of Authority (PoA) consensus mechanism enabling efficient transaction throughput of up to 1000 transactions per second. Additionally, the IPFS protocol exhibits effective data retrieval capabilities, with an average latency of 15 milliseconds for data access operations.
APA, Harvard, Vancouver, ISO, and other styles
19

КРЕНЦІН, МИХАЙЛО, та ЛЕОНІД КУПЕРШТЕЙН. "МЕТОД ЗАХИЩЕНОГО ОБМІНУ ТА ЗБЕРІГАННЯ ФАЙЛІВ У ПІРИНГОВИХ МЕРЕЖАХ". Herald of Khmelnytskyi National University. Technical sciences 337, № 3(2) (2024): 461–66. https://doi.org/10.31891/2307-5732-2024-337-3-69.

Full text
Abstract:
The article proposes a method for secure file exchange and storage in peer-to-peer networks based on the IPFS (InterPlanetary File System) protocol and a linear feedback shift register (LFSR). The use of IPFS provides efficient decentralized data storage with guaranteed integrity due to the use of content-oriented addressing based on hash functions. In IPFS, each file or data block is identified by a unique CID (Content Identifier), which changes with any modification of the content. To increase confidentiality before uploading files to the network, it is proposed to use an encryption method based on a linear feedback shift register (LFSR) and counters. This method provides efficient generation of pseudo-random permutations of the file bytes, which makes it impossible to decrypt it without knowing the key. Encryption using the FLSR is characterized by high speed, ease of implementation, and low requirements for computing resources. This is especially important for peer-to-peer networks, where nodes may have limited performance and unstable connections. The proposed approach eliminates the vulnerability of IPFS associated with the possibility of obtaining file contents based on their CIDs, since even with the presence of an identifier, only encrypted content is available. In addition, the method ensures the confidentiality of the transmitted data, since files are transmitted in encrypted form and can only be decrypted by authorized nodes. The method also provides high performance due to the features of IPFS: files or their fragments (IPLD objects) can be downloaded in parallel from several nodes, which speeds up the transfer of large amounts of data. The method can be used in decentralized storage systems, platforms for secure file exchange, as well as in environments with increased requirements for information security.
APA, Harvard, Vancouver, ISO, and other styles
20

Shibano, Kyohei, Kensuke Ito, Changhee Han, Tsz Tat Chu, Wataru Ozaki, and Gento Mogi. "Secure Processing and Distribution of Data Managed on Private InterPlanetary File System Using Zero-Knowledge Proofs." Electronics 13, no. 15 (2024): 3025. http://dx.doi.org/10.3390/electronics13153025.

Full text
Abstract:
In this study, a new data-sharing method is proposed that uses a private InterPlanetary File System—a decentralized storage system operated within a closed network—to distribute data to external entities while making its authenticity verifiable. Among the two operational modes of IPFS, public and private, this study focuses on the method for using private IPFS. Private IPFS is not open to the general public; although it poses a risk of data tampering when distributing data to external parties, the proposed method ensures the authenticity of the received data. In particular, this method applies a type of zero-knowledge proof, namely, the Groth16 protocol of zk-SNARKs, to ensure that the data corresponds to the content identifier in a private IPFS. Moreover, the recipient’s name is embedded into the distributed data to prevent unauthorized secondary distribution. Experiments confirmed the effectiveness of the proposed method for an image data size of up to 120 × 120 pixels. In future studies, the proposed method will be applied to larger and more diverse data types.
APA, Harvard, Vancouver, ISO, and other styles
21

Dwivedi, Sanjeev Kumar, Ruhul Amin, and Satyanarayana Vollala. "Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET." IEEE/CAA Journal of Automatica Sinica 8, no. 12 (2021): 1913–22. http://dx.doi.org/10.1109/jas.2021.1004225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Merlec, Mpyana Mwamba, and Hoh Peter In. "Blockchain-Based Decentralized Storage Systems for Sustainable Data Self-Sovereignty: A Comparative Study." Sustainability 16, no. 17 (2024): 7671. http://dx.doi.org/10.3390/su16177671.

Full text
Abstract:
In the digital age, data sovereignty has emerged as a critical concern due to the increasing demand for privacy, security, and user control. In this context, decentralized storage infrastructure is reshaping how data are stored and managed, leading the transition from traditional centralized models to a more decentralized and user-driven approach to data sovereignty, known as data self-sovereignty (DSS). This paper presents a systematic comparative analysis of decentralized storage systems, emphasizing their potential to enhance sustainable DSS. By highlighting the integral role of blockchain technology, this study critically examines various decentralized storage platforms, including Arweave, BitTorrent, Dat Protocol, Filecoin, Hypercore Protocol, IPFS, MaidSafe, Sia, Storj, and Swarm. The analysis covers the key architectural features of these systems, their performance metrics, and their contribution to user data sovereignty. This study aims to comprehensively explain how these decentralized storage solutions allow users to maintain complete control over their data, thus offering a viable alternative to traditional centralized storage methods. Therefore, This paper contributes to ongoing data sovereignty research and guides future developments in decentralized storage technologies.
APA, Harvard, Vancouver, ISO, and other styles
23

Belfqih, Hiba, and Abderrahim Abdellaoui. "Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 16. https://doi.org/10.3390/jcp5020016.

Full text
Abstract:
The increasing interconnectivity of devices on the Internet of Things (IoT) introduces significant security challenges, particularly around authentication and data management. Traditional centralized approaches are not sufficient to address these risks, requiring more robust and decentralized solutions. This paper presents a decentralized authentication protocol leveraging blockchain technology and the IPFS data management framework to provide secure and real-time communication between IoT devices. Using the Ethereum blockchain, smart contracts, elliptic curve cryptography, and ASCON encryption, the proposed protocol ensures the confidentiality, integrity, and availability of sensitive IoT data. The mutual authentication process involves the use of asymmetric key pairs, public key registration on the blockchain, and the Diffie–Hellman key exchange algorithm to establish a shared secret that, combined with a unique identifier, enables secure device verification. Additionally, IPFS is used for secure data storage, with the content identifier (CID) encrypted using ASCON and integrated into the blockchain for traceability and authentication. This integrated approach addresses current IoT security challenges and provides a solid foundation for future applications in decentralized IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
24

Bagade, Aryan, and Prof Rupesh C. Jaiswal. "Farm Environmental Data Analyzer using a Decentralised system and R." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1175–82. http://dx.doi.org/10.22214/ijraset.2023.48753.

Full text
Abstract:
Abstract: Data/Web Hosting is a service that lets enterprises or selves present their data on the internet that users can access. The firm providing such services are web/data host. Apart from that, such services require incessant support, and not everyone can afford a particular centralized data host service. The peer-to-peer(P2P) protocol, the Interplanetary file system(IPFS), is augmenting into a legitimate alternative to traditional data and web hosting. This paper put forward a decentralized blockchain IPFS-based interactive manageable model, and the work presents an application and schematic that serves as a Proof of Concept(PoC) of decentralized blockchain technology that can be wielded to create an immutable record of energy and resource usage for further analysis and estimation of yield at a scale. IPFS hosts an immutable record that would be independently verifiable and available in perpetuity. First, having the user connect to the service through an IPFS node, then requesting the user upload their data. Then the data is uploaded, and a CID(Content Identification) and a QR code are returned to the user, who can then compute and visualize the results through the application. This system enables the novel application of decentralized data storage to capture, add and visualize yield and environmental data and track it further down the supply chain.
APA, Harvard, Vancouver, ISO, and other styles
25

Jiang, Yongbo, Gongxue Sun, and Tao Feng. "Research on Data Transaction Security Based on Blockchain." Information 13, no. 11 (2022): 532. http://dx.doi.org/10.3390/info13110532.

Full text
Abstract:
With the increasing value of various kinds of data in the era of big data, the demand of different subjects for data transactions has become more and more urgent. In this paper, a blockchain-based data transaction protection scheme is proposed to realize the secure transaction sharing among data. This paper carries out the following work: by analyzing the existing data transaction models, we find the data security and transaction protection problems, establish a third-party-free data transaction platform using blockchain, protect users’ data security by combining AES and improved homomorphic encryption technology, and upload the encrypted data to the Interplanetary File System (IPFS) for distributed storage. Finally, we use the powerful functions of the IPFS, combined with inadvertent transmission protocol, two-way authentication, zero-knowledge proof, and other security verification for data transactions. The security analysis proves that this scheme has higher security despite the time overhead, and we will continue to optimize the scheme to improve efficiency in the future.
APA, Harvard, Vancouver, ISO, and other styles
26

Muhammad Usman Ashraf. "A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions." Lahore Garrison University Research Journal of Computer Science and Information Technology 5, no. 3 (2021): 15–30. http://dx.doi.org/10.54692/lgurjcsit.2021.0503213.

Full text
Abstract:
Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive survey of the most recent and promising blockchain state-of-the-art methods, the P2P network for data dissemination, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity. Furthermore, we have discussed a detailed comparison of consensus algorithms of Blockchain concerning security. Also, we have discussed the future of blockchain and cloud computing. The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work.
APA, Harvard, Vancouver, ISO, and other styles
27

Jabarulla, Mohamed Yaseen, and Heung-No Lee. "Blockchain-Based Distributed Patient-Centric Image Management System." Applied Sciences 11, no. 1 (2020): 196. http://dx.doi.org/10.3390/app11010196.

Full text
Abstract:
In recent years, many researchers have focused on developing a feasible solution for storing and exchanging medical images in the field of health care. Current practices are deployed on cloud-based centralized data centers, which increase maintenance costs, require massive storage space, and raise privacy concerns about sharing information over a network. Therefore, it is important to design a framework to enable sharing and storing of big medical data efficiently within a trustless environment. In the present paper, we propose a novel proof-of-concept design for a distributed patient-centric image management (PCIM) system that is aimed to ensure safety and control of patient private data without using a centralized infrastructure. In this system, we employed an emerging Ethereum blockchain and a distributed file system technology called Inter-Planetary File System (IPFS). Then, we implemented an Ethereum smart contract called the patient-centric access control protocol to enable a distributed and trustworthy access control policy. IPFS provides the means for decentralized storage of medical images with global accessibility. We describe how the PCIM system architecture facilitates the distributed and secured patient-centric data access across multiple entities such as hospitals, patients, and image requestors. Finally, we deployed a smart contract prototype on an Ethereum testnet blockchain and evaluated the proposed framework within the Windows environment. The evaluation results demonstrated that the proposed scheme is efficient and feasible.
APA, Harvard, Vancouver, ISO, and other styles
28

Mohsan, Syed Agha Hassnain, Abdul Razzaq, Shahbaz Ahmed Khan Ghayyur, Hend Khalid Alkahtani, Nouf Al-Kahtani, and Samih M. Mostafa. "Decentralized Patient-Centric Report and Medical Image Management System Based on Blockchain Technology and the Inter-Planetary File System." International Journal of Environmental Research and Public Health 19, no. 22 (2022): 14641. http://dx.doi.org/10.3390/ijerph192214641.

Full text
Abstract:
Several academicians have been actively contributing to establishing a practical solution to storing and distributing medical images and test reports in the research domain of health care in recent years. Current procedures mainly rely on cloud-assisted centralized data centers, which raise maintenance expenditure, necessitate a large amount of storage space, and raise privacy concerns when exchanging data across a network. As a result, it is critically essential to provide a framework that allows for the efficient exchange and storage of large amounts of medical data in a secure setting. In this research, we describe a unique proof-of-concept architecture for a distributed patient-centric test report and image management (PCRIM) system that aims to facilitate patient privacy and control without the need for a centralized infrastructure. We used an Ethereum blockchain and a distributed file system technology called the Inter-Planetary File System in this system (IPFS). Then, to secure a distributed and trustworthy access control policy, we designed an Ethereum smart contract termed the patient-centric access control protocol. The IPFS allows for the decentralized storage of medical metadata, such as images, with worldwide accessibility. We demonstrate how the PCRIM system design enables hospitals, patients, and image requestors to obtain patient-centric data in a distributed and secure manner. Finally, we tested the proposed framework in the Windows environment by deploying a smart contract prototype on an Ethereum TESTNET blockchain. The findings of the study indicate that the proposed strategy is both efficient and practicable.
APA, Harvard, Vancouver, ISO, and other styles
29

Si, Pengbo, Fei Wang, Enchang Sun, and Yuzhao Su. "BEI-TAB: Enabling Secure and Distributed Airport Baggage Tracking with Hybrid Blockchain-Edge System." Wireless Communications and Mobile Computing 2021 (September 23, 2021): 1–12. http://dx.doi.org/10.1155/2021/2741435.

Full text
Abstract:
Global air transport carries about 4.3 billion pieces of baggage each year, and up to 56 percent of travellers prefer obtaining real-time baggage tracking information throughout their trip. However, the traditional baggage tracking scheme is generally based on optical scanning and centralized storage systems, which suffers from low efficiency and information leakage. In this paper, a blockchain and edge computing-based Internet of Things (IoT) system for tracking of airport baggage (BEI-TAB) is proposed. Through the combination of radio frequency identification technology (RFID) and blockchain, real-time baggage processing information is automatically stored in blockchain. In addition, we deploy Interplanetary File System (IPFS) at edge nodes with ciphertext policy attribute-based encryption (CP-ABE) to store basic baggage information. Only hash values returned by the IPFS network are kept in blockchain, enhancing the scalability of the system. Furthermore, a multichannel scheme is designed to realize the physical isolation of data and to rapidly process multiple types of data and business requirements in parallel. To the best of our knowledge, it is the first architecture that integrates RFID, IPFS, and CP-ABE with blockchain technologies to facilitate secure, decentralized, and real-time characteristics for storing and sharing data for baggage tracking. We have deployed a testbed with both software and hardware to evaluate the proposed system, considering the performances of transaction processing time and speed. In addition, based on the characteristics of consortium blockchain, we improved the practical Byzantine fault tolerance (PBFT) consensus protocol, which introduced the node credit score mechanism and cooperated with the simplified consistency protocol. Experimental results show that the credit score-based PBFT consensus (CSPBFT) can shorten transaction delay and improve the long-term running efficiency of the system.
APA, Harvard, Vancouver, ISO, and other styles
30

Amjad, Sana, Shahid Abbas, Zain Abubaker, Mohammed H. Alsharif, Abu Jahid, and Nadeem Javaid. "Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things." Sensors 22, no. 5 (2022): 1972. http://dx.doi.org/10.3390/s22051972.

Full text
Abstract:
This paper proposes a blockchain-based node authentication model for the Internet of sensor things (IoST). The nodes in the network are authenticated based on their credentials to make the network free from malicious nodes. In IoST, sensor nodes gather the information from the environment and send it to the cluster heads (CHs) for additional processing. CHs aggregate the sensed information. Therefore, their energy rapidly depletes due to extra workload. To solve this issue, we proposed distance, degree, and residual energy-based low-energy adaptive clustering hierarchy (DDR-LEACH) protocol. DDR-LEACH is used to replace CHs with the ordinary nodes based on maximum residual energy, degree, and minimum distance from BS. Furthermore, storing a huge amount of data in the blockchain is very costly. To tackle this issue, an external data storage, named as interplanetary file system (IPFS), is used. Furthermore, for ensuring data security in IPFS, AES 128-bit is used, which performs better than the existing encryption schemes. Moreover, a huge computational cost is required using a proof of work consensus mechanism to validate transactions. To solve this issue, proof of authority (PoA) consensus mechanism is used in the proposed model. The simulation results are carried out, which show the efficiency and effectiveness of the proposed system model. The DDR-LEACH is compared with LEACH and the simulation results show that DDR-LEACH outperforms LEACH in terms of energy consumption, throughput, and improvement in network lifetime with CH selection mechanism. Moreover, transaction cost is computed, which is reduced by PoA during data storage on IPFS and service provisioning. Furthermore, the time is calculated in the comparison of AES 128-bit scheme with existing scheme. The formal security analysis is performed to check the effectiveness of smart contract against attacks. Additionally, two different attacks, MITM and Sybil, are induced in our system to show our system model’s resilience against cyber attacks.
APA, Harvard, Vancouver, ISO, and other styles
31

Ortega, Victor, and Jose F. Monserrat. "Semantic Distributed Data for Vehicular Networks Using the Inter-Planetary File System." Sensors 20, no. 22 (2020): 6404. http://dx.doi.org/10.3390/s20226404.

Full text
Abstract:
Vehicular networks provide means to distribute data among intelligent vehicles, increasing their efficiency and the safety of their occupants. While connected to these networks, vehicles have access to various kinds of information shared by other vehicles and road-side units (RSUs). This information includes helpful resources, such as traffic state or remote sensors. An efficient and fast system to get access to this information is important but unproductive if the data are not appropriately structured, accessible, and easy to process. This paper proposes the creation of a semantic distributed network using content-addressed networking and peer-to-peer (P2P) connections. In this open and collaborative network, RSUs and vehicles use ontologies to semantically represent information and facilitate the development of intelligent autonomous agents capable of navigating and processing the shared data. In order to create this P2P network, this paper makes use of the Inter-Planetary File System (IPFS), an open source solution that provides secure, reliable, and efficient content-addressed distributed storage over standard IP networks using the new QUIC protocol. This paper highlights the feasibility of this proposal and compares it with the state-of-the-art. Results show that IPFS is a promising technology that offers a great balance between functionality, performance, and security.
APA, Harvard, Vancouver, ISO, and other styles
32

Santhi Jeslet, D., and M. Shanmugam. "A Study On Decentralized Web Hosting Using Peer-To-Peer Architecture." Data Analytics and Artificial Intelligence 3, no. 2 (2023): 26–29. http://dx.doi.org/10.46632/daai/3/2/6.

Full text
Abstract:
Traditionally, websites are hosted viacentralized network, where the web servers distribute the website files to the clients. However a server failure can prevent the web applications from being used until the server goes live again. Due to the fact that websites rely entirely on the integrity of a single organization, it enables larger companies or government to decide what content is shown, this put into question the freedom that the internet originally brought. The block chain hosting service, also known as decentralized web hosting, is not controlled by a single organization or a third party organization. The architecture relies on peer-to-peer communication rather than client-to-server communication. Due to the decentralized nature of this system, all clients do not rely on a single server for their data, but instead data is sent directly between the clients across the network. It is possible to achieve this with the help of IPFS and Block chain. IPFS is a protocol for distributed file storage that allows computers to store and serve files in a peer-to-peer network by distributing them across computers and with the block chain technology, it is possible to ensure both authenticity as well as confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
33

N. Sangeeta and Seung Yeob Nam. "Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability." Electronics 12, no. 7 (2023): 1545. http://dx.doi.org/10.3390/electronics12071545.

Full text
Abstract:
Closed-circuit television (CCTV) cameras and black boxes are indispensable for road safety and accident management. Visible highway surveillance cameras can promote safe driving habits while discouraging moving violations. According to CCTV laws, footage captured by roadside cameras must be securely stored, and authorized persons can access it. Footages collected by CCTV and Blackbox are usually saved to the camera’s microSD card, the cloud, or hard drives locally but there are concerns about security and data integrity. These issues may be addressed by blockchain technology. The cost of storing data on the blockchain, on the other hand, is prohibitively expensive. We can have decentralized and cost-effective storage with the interplanetary file system (IPFS) project. It is a file-sharing protocol that stores and distributes data in a distributed file system. We propose a decentralized IPFS and blockchain-based application for distributed file storage. It is possible to upload various types of files into our decentralized application (DApp), and hashes of the uploaded files are permanently saved on the Ethereum blockchain with the help of smart contracts. Because it cannot be removed, it is immutable. By clicking on the file description, we can also view the file. DApp also includes a keyword search feature to assist us in quickly locating sensitive information. We used Ethers.js’ smart contract event listener and contract.queryFilter to filter and read data from the blockchain. The smart contract events are then written to a text file for our DApp’s keyword search functionality. Our experiment demonstrates that our DApp is resilient to system failure while preserving the transparency and integrity of data due to the immutability of blockchain.
APA, Harvard, Vancouver, ISO, and other styles
34

Haddad, Alaa, Mohamed Hadi Habaebi, Fakher Eldin M. Suliman, Elfatih A. A. Elsheikh, Md Rafiqul Islam, and Suriza Ahmad Zabidi. "Generic Patient-Centered Blockchain-Based EHR Management System." Applied Sciences 13, no. 3 (2023): 1761. http://dx.doi.org/10.3390/app13031761.

Full text
Abstract:
Accessing healthcare services by several stakeholders for diagnosis and treatment has become quite prevalent owing to the improvement in the industry and high levels of patient mobility. Due to the confidentiality and high sensitivity of electronic healthcare records (EHR), the majority of EHR data sharing is still conducted via fax or mail because of the lack of systematic infrastructure support for secure and reliable health data transfer, delaying the process of patient care. As a result, it is critically essential to provide a framework that allows for the efficient exchange and storage of large amounts of medical data in a secure setting. The objective of this research is to develop a Patient-Centered Blockchain-Based EHR Management (PCEHRM) system that allows patients to manage their healthcare records across multiple stakeholders and to facilitate patient privacy and control without the need for a centralized infrastructure by means of granting or revoking access or viewing one’s records. We used an Ethereum blockchain and IPFS (inter-planetary file system) to store records because of its advantage of being distributed and ensuring the immutability of records and allowing for the decentralized storage of medical metadata, such as medical reports. To achieve secure a distributed, and trustworthy access control policy, we proposed an Ethereum smart contract termed the patient-centric access control protocol. We demonstrate how the PCEHRM system design enables stakeholders such as patients, labs, researchers, etc., to obtain patient-centric data in a distributed and secure manner and integrate utilizing a web-based interface for the patient and all users to initiate the EHR sharing transactions. Finally, we tested the proposed framework in the Windows environment by compiling a smart contract prototype using Truffle and deploy on Ethereum using Web3. The proposed system was evaluated in terms of the projected medical data storage costs for the IPFS on blockchain, and the execution time for a different number of peers and document sizes. The findings of the study indicate that the proposed strategy is both efficient and practicable.
APA, Harvard, Vancouver, ISO, and other styles
35

Yao, Yue, Xiaomei Zhang, Haomin Hu, Huibin Liu, Rong Huang, and Zejie Wang. "Blockchain-Based Multistage Continuous Authentication for Smart Devices." Applied Sciences 13, no. 23 (2023): 12641. http://dx.doi.org/10.3390/app132312641.

Full text
Abstract:
With the increasing connectivity between multiple smart devices in the Internet of Vehicles, privacy and security have become stringent threats due to unauthorized access. To overcome this issue, designing continuous authentication systems has become an important research topic because of the advantages of continuous monitoring of users after the initial access to the smart devices. Unfortunately, the existing systems are based on a third-party centralized structure, and most of them suffer storage pressure on equipment, thus resulting in significant security hazards and limited performance. In this paper, we propose a multistage continuous authentication system based on blockchain technology and the IPFS, which achieves decentralization and reduces storage pressure. In the first stage of authentication, we adopt Hyperledger Fabric to implement the underlying technical architecture of the blockchain to enhance the security and reliability of identity parameters. The preoutputs of the first-stage authentication are compared against behavioral biometric characteristics stored in the IPFS that aim to accomplish the final authentication. In particular, we use fuzzy extractors to deal with behavioral biometric feature templates, thus solving the privacy problem caused by user information leakage. To evaluate the security of our system, we prove the correctness of the communication protocol and two-way authentication of the scheme using BAN Logic. Furthermore, we use Hyperledger Caliper to analyze the impact of the sending rate of authentication requests on various performance parameters such as throughput, memory, and CPU utilization of the authentication system. Security and experimental results show that: (i) We solve the problem of centralized authentication and can resist replay attacks. (ii) Our scheme can maintain high throughput and effectively reach consensus. Compared to related works, the throughput is improved by 8.6%.
APA, Harvard, Vancouver, ISO, and other styles
36

Zhao, Ruwen, Chuanpei Xu, Zhibin Zhu, and Wei Mo. "A Blockchain-Based Secure Sharing Scheme for Electrical Impedance Tomography Data." Mathematics 12, no. 7 (2024): 1120. http://dx.doi.org/10.3390/math12071120.

Full text
Abstract:
Real-time electrical impedance tomography (EIT) data sharing is becoming increasingly necessary, due to the extensive use of EIT technology in various sectors, including material analysis, biomedicine, and industrial process monitoring. The prevalence of portable EIT equipment and remote imaging technology has led to a predominance of centralized storage, Internet protocol transmission, and certificates from certificate authorities (CA) in telemedicine data. This has resulted in compromised data security, network communication delays, high CA maintenance costs, increased risks of medical data privacy breaches, and low security. Therefore, this paper offers a consortia blockchain-based method for exchanging EIT data that addresses security and integrity concerns during data storage and exchange, while maintaining transparency and traceability. Proprietary re-encryption techniques are employed to guarantee traceability when exchanging anonymous data, enabling precise control over data access. This scheme serves to protect both data and identity privacy, as well as to trace the actual identity of potential malicious users, while also thwarting any coordinated efforts between partially trusted parties and data requesters seeking unauthorized access to confidential information. Additionally, a combination of blockchain and InterPlanetary File System (IPFS) distributed storage technology is utilized to ease the burden of EIT data storage. The feasibility and effectiveness of the proposed solution were validated through a series of experiments, demonstrating its ability to effectively prevent data tampering and misuse, reduce data management costs, and enhance the efficiency and quality of data sharing.
APA, Harvard, Vancouver, ISO, and other styles
37

Tong, Weiming, Luyao Yang, Zhongwei Li, Xianji Jin, and Liguo Tan. "Enhancing Security and Flexibility in the Industrial Internet of Things: Blockchain-Based Data Sharing and Privacy Protection." Sensors 24, no. 3 (2024): 1035. http://dx.doi.org/10.3390/s24031035.

Full text
Abstract:
To address the complexities, inflexibility, and security concerns in traditional data sharing models of the Industrial Internet of Things (IIoT), we propose a blockchain-based data sharing and privacy protection (BBDSPP) scheme for IIoT. Initially, we characterize and assign values to attributes, and employ a weighted threshold secret sharing scheme to refine the data sharing approach. This enables flexible combinations of permissions, ensuring the adaptability of data sharing. Subsequently, based on non-interactive zero-knowledge proof technology, we design a lightweight identity proof protocol using attribute values. This protocol pre-verifies the identity of data accessors, ensuring that only legitimate terminal members can access data within the system, while also protecting the privacy of the members. Finally, we utilize the InterPlanetary File System (IPFS) to store encrypted shared resources, effectively addressing the issue of low storage efficiency in traditional blockchain systems. Theoretical analysis and testing of the computational overhead of our scheme demonstrate that, while ensuring performance, our scheme has the smallest total computational load compared to the other five schemes. Experimental results indicate that our scheme effectively addresses the shortcomings of existing solutions in areas such as identity authentication, privacy protection, and flexible combination of permissions, demonstrating a good performance and strong feasibility.
APA, Harvard, Vancouver, ISO, and other styles
38

Ogata, Keigo, and Satoshi Fujita. "Decentralized Storage with Access Control and Data Persistence for e-Book Stores." Future Internet 15, no. 12 (2023): 406. http://dx.doi.org/10.3390/fi15120406.

Full text
Abstract:
The e-book services we use today have a serious drawback in that we will no longer be able to read the books we have purchased when the service is terminated. One way to solve this problem is to build a decentralized system that does not depend on a specific company or organization by combining smart contracts running on the Ethereum blockchain and distributed storage such as an IPFS. However, a simple combination of existing technologies does not make the stored e-book data persistent, so the risk of purchased e-books becoming unreadable remains. In this paper, we propose a decentralized distributed storage called d-book-repository, which has both access management function and data durability for purchased e-books. This system uses NFTs as access rights to realize strict access control by preventing clients who do not have NFTs from downloading e-book data. In addition, e-book data stored on storage nodes in the distributed storage is divided into shards using Reed–Solomon codes, and each storage node stores only a single shard, thereby preventing the creation of nodes that can restore the entire content from locally stored data. The storage of each shard is not handled by a single node but by a group of nodes, and the shard is propagated to all nodes in the group using the gossip protocol, where erasure codes are utilized to increase the resilience against node departure. Furthermore, an incentive mechanism to encourage participation as a storage node is implemented using smart contracts. We built a prototype of the proposed system on AWS and evaluated its performance. The results showed that both downloading and uploading 100 MB of e-book data (equivalent to one comic book) were completed within 10 s using an instance type of m5.xlarge. This value is only 1.3 s longer for downloading and 2.2 s longer for uploading than the time required for a simple download/upload without access control, confirming that the overhead associated with the proposed method is sufficiently small.
APA, Harvard, Vancouver, ISO, and other styles
39

Taralunga, Dragos Daniel, and Bogdan Cristian Florea. "A Blockchain-Enabled Framework for mHealth Systems." Sensors 21, no. 8 (2021): 2828. http://dx.doi.org/10.3390/s21082828.

Full text
Abstract:
Presently modern technology makes a significant contribution to the transition from traditional healthcare to smart healthcare systems. Mobile health (mHealth) uses advances in wearable sensors, telecommunications and the Internet of Things (IoT) to propose a new healthcare concept centered on the patient. Patients’ real-time remote continuous health monitoring, remote diagnosis, treatment, and therapy is possible in an mHealth system. However, major limitations include the transparency, security, and privacy of health data. One possible solution to this is the use of blockchain technologies, which have found numerous applications in the healthcare domain mainly due to theirs features such as decentralization (no central authority is needed), immutability, traceability, and transparency. We propose an mHealth system that uses a private blockchain based on the Ethereum platform, where wearable sensors can communicate with a smart device (a smartphone or smart tablet) that uses a peer-to-peer hypermedia protocol, the InterPlanetary File System (IPFS), for the distributed storage of health-related data. Smart contracts are used to create data queries, to access patient data by healthcare providers, to record diagnostic, treatment, and therapy, and to send alerts to patients and medical professionals.
APA, Harvard, Vancouver, ISO, and other styles
40

Rak, Maciej, and Marcin Niemiec. "Securing Trading Card Game Assets Using Blockchain Technology." Applied Sciences 14, no. 23 (2024): 11139. http://dx.doi.org/10.3390/app142311139.

Full text
Abstract:
Physical Trading Card Games (TCGs) face inherent challenges, including vulnerability to theft, damage, and counterfeiting. Trading systems primarily depend on third-party marketplaces that collect fees from each trade, without benefiting the game developers. Players also deal with problems associated with shipping, such as high prices, long shipping times, and the risk of counterfeit goods. This paper introduces a blockchain-based solution that decouples card ownership from the physical media, which represents ownership with secure and verifiable digital tokens. The system leverages Ethereum Virtual Machine (EVM), the ERC-1155 standard, and InterPlanetary File System (IPFS) storage, ensuring flexibility, scalability, and cost-efficiency. The adoption of the lazy minting technique minimizes upfront costs for game developers by creating tokens only when acquired by end users. Physical representations of such digital goods can be printed on demand as they remain only a game accessory. The system also provides low-cost exchanges, significantly reducing the financial and logistical burdens associated with the trading of physical assets. Finally, the protocol empowers developers to monetize secondary markets through transaction fees. This approach addresses the limitations of physical card systems and also unlocks new opportunities for innovation and revenue in the TCG ecosystem.
APA, Harvard, Vancouver, ISO, and other styles
41

Fernández-Blanco, Gabriel, Iván Froiz-Míguez, Paula Fraga-Lamas, and Tiago M. Fernández-Caramés. "Design, Implementation and Practical Energy-Efficiency Evaluation of a Blockchain Based Academic Credential Verification System for Low-Power Nodes." Applied Sciences 15, no. 12 (2025): 6596. https://doi.org/10.3390/app15126596.

Full text
Abstract:
The educational system manages extensive documentation and paperwork, which can lead to human errors and sometimes abuse or fraud, such as the falsification of diplomas, certificates or other credentials. In fact, in recent years, multiple cases of fraud have been detected, representing a significant cost to society, since fraud harms the trustworthiness of certificates and academic institutions. To tackle such an issue, this article proposes a solution aimed at recording and verifying academic records through a decentralized application that is supported by a smart contract deployed in the Ethereum blockchain and by a decentralized storage system based on Inter-Planetary File System (IPFS). The proposed solution is evaluated in terms of performance and energy efficiency, comparing the results obtained with a traditional Proof-of-Work (PoW) consensus protocol and the new Proof-of-Authority (PoA) protocol. The results shown in this paper indicate that the latter is clearly greener and demands less CPU load. Moreover, this article compares the performance of a traditional computer and two Single-Board Computers (SBCs) (a Raspberry Pi 4 and an Orange Pi One), showing that is possible to make use of the latter low-power devices to implement blockchain nodes but at the cost of higher response latency. Furthermore, the impact of Ethereum gas limit is evaluated, demonstrating its significant influence on the blockchain network performance. Thus, this article provides guidelines, useful practical evaluations and key findings that will help the next generation of green blockchain developers and researchers.
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Jing, Wenlong Feng, Mengxing Huang, Siling Feng, and Dan Du. "Research on Consensus Algorithm for Intellectual Property Authentication Based on PBFT." Electronics 14, no. 9 (2025): 1722. https://doi.org/10.3390/electronics14091722.

Full text
Abstract:
Traditional intellectual property authentication relies on centralized intermediaries, which makes it difficult to address issues such as forgery, lack of trust, and opaque information. Combined with the characteristics of blockchain, such as decentralization, tampering, and traceability, these challenges can be effectively dealt with. Aiming at the shortcomings of traditional consensus algorithms in intellectual property authentication, such as high communication overhead and low efficiency, the improved PBFT (Practical Byzantine Fault Tolerance) algorithm (MBFT algorithm) is proposed and combined with the distributed database IPFS (Inter Planetary File System) to alleviate the pressure of blockchain data storage and enhance operational efficiency. The algorithm first adopts the evaluation system in the hierarchical mechanism, invokes the Fibonacci series incremental law to update the Score value of the nodes and sort them, and divides the nodes into the classification consensus layer, the consensus confirmation layer, and the supervision layer. Secondly, the Maglev algorithm is used to generate a lookup table and design a classification consensus strategy, which is divided into four consensus groups based on the characteristics of intellectual property categories, namely, the patent authentication consensus group, the trademark authentication consensus group, the copyright authentication consensus group, and the other types of authentication consensus group. Then, the algorithm optimizes the consistency protocol, carries out PBFT consensus once in each of the classification consensus layers and consensus confirmation layers, according to the consensus situation, and realizes the nodes’ dynamic update to ensure the consensus’s accuracy and reliability. The experiments show that the MBFT algorithm performs better in terms of communication complexity and throughput. As the number and size of files increase, the execution time of IPFS progressively lengthens. However, the overall performance still meets the actual demand. Compared with the traditional PBFT, MBFT improves the communication complexity by about 50% or more, the throughput is about 3 times the traditional PBFT, and the scalability and response speed of the system are significantly improved when the number of nodes increases.
APA, Harvard, Vancouver, ISO, and other styles
43

Bran, Estefano, Adrian Alzamora, Bruno Castañeda-Carbajal, José Luis Castillo-Sequera, and Lenis Wong. "Interoperability Blockchain, InterPlanetary File System and Health Level 7 Framework for Electronic Health Records." International Journal of Online and Biomedical Engineering (iJOE) 20, no. 15 (2024): 60–78. https://doi.org/10.3991/ijoe.v20i15.51515.

Full text
Abstract:
Patient medical records and their accurate recording, storage, protection, and access are essential elements to high-quality healthcare. While many parts of the world have moved to traditional digital systems and electronic health records (EHRs), these systems require complex evaluation and large infrastructure investments, lack interoperability, and introduce the constantly-increasing challenges of cyber-attacks and digital security. The aim of this study is to address these challenges through a secure and accessible EHR management system, applied to allergy and family records, based on blockchain technology, the InterPlanetary File System (IPFS) protocol, and the health level 7 (HL7) fast healthcare interoperability resources standard. The proposal was carried out in four phases: (1) blockchain architecture design, (2) blockchain network design, (3) interoperability design, and (4) web application design. A performance evaluation of the system was conducted to determine the throughput and latency metrics. The results presented a maximum medical record reading and writing throughput of approximately eight transactions per second, with a write latency averaging 5,926 ms to 51,836 ms and a reading latency of 4,783 ms to 45,500 ms. With the addition of a survey of 21 patients and 10 healthcare professionals indicating that both groups strongly agree that the system meets the criteria of high-quality healthcare, all study results present a framework that could serve as a model for the adoption of standards-based, accessible, and secure EHR systems.
APA, Harvard, Vancouver, ISO, and other styles
44

Batchu, Sai, Michael J. Diaz, Lauren Ladehoff, Kevin Root, and Brandon Lucke-Wold. "Utilizing the Ethereum blockchain for retrieving and archiving augmented reality surgical navigation data." Exploration of Drug Science 1, no. 1 (2023): 55–63. http://dx.doi.org/10.37349/eds.2023.00005.

Full text
Abstract:
Aim: Conventional techniques to share and archive spinal imaging data raise issues with trust and security, with novel approaches being more greatly considered. Ethereum smart contracts present one such novel approach. Ethereum is an open-source platform that allows for the use of smart contracts. Smart contracts are packages of code that are self-executing and reside in the Ethereum state, defining conditions for programmed transactions. Though powerful, limited attempts have been made to showcase the clinical utility of such technologies, especially in the pre- and post-operative imaging arenas. Herein, we therefore aim to propose a proof-of-concept smart contract that stores intraoperative three-dimensional (3D) augmented reality surgical navigation (ARSN) data and was tested on a private, proof-of-authority network. To the author’s best knowledge, the present study represents a first-use case of the InterPlanetary File Storage protocol for storing and retrieving spine imaging smart contracts. Methods: The content identifier hashes were stored inside the smart contracts while the interplanetary file system (IPFS) was used to efficiently store the image files. Insertion was achieved with four storage mappings, one for each of the following: fictitious patient data, specific diagnosis, patient identity document (ID), and Gertzbein grade. Inserted patient observations were then queried with wildcards. Insertion and retrieval times for different record volumes were collected. Results: It took 276 milliseconds to insert 50 records and 713 milliseconds to insert 350 records. Inserting 50 records required 934 Mbyte (MB) of memory per insertion with patient data and imaging, while inserting 350 records required almost the same amount of memory per insertion. In a database of 350 records, the retrieval function needs about 1,026 MB to query a record with all three fields left blank, but only 970 MB to obtain the same observation from a database of 50 records. Conclusion: The concept presented in this study exemplifies the clinical utility of smart contracts and off-chain data storage for efficient retrieval/insertion of ARSN data.
APA, Harvard, Vancouver, ISO, and other styles
45

Benahmed Daho, A. "CRYPTO-SPATIAL: AN OPEN STANDARDS SMART CONTRACTS LIBRARY FOR BUILDING GEOSPATIALLY ENABLED DECENTRALIZED APPLICATIONS ON THE ETHEREUM BLOCKCHAIN." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIII-B4-2020 (August 25, 2020): 421–26. http://dx.doi.org/10.5194/isprs-archives-xliii-b4-2020-421-2020.

Full text
Abstract:
Abstract. Blockchain is an emerging immature technology that disrupt many well established industries nowadays, like finance, supply chain, transportation, energy, official registries (identity, vehicles, …). In this contribution we present a smart contracts library, named Crypto-Spatial, written for the Ethereum Blockchain and designed to serve as a framework for geospatially enabled decentralized applications (dApps) development. The main goal of this work is to investigate the suitability of Blockchain technology for the storage, retrieval and processing of vector geospatial data. The design and the proof-of-concept implementation presented are both based on the Open Geospatial Consortium standards: Simple Feature Access, Discrete Global Grid Systems (DGGS) and Well Known Binary (WKB). Also, the FOAM protocol concept of Crypto-Spatial Coordinate (CSC) was used to uniquely identify spatial features on the Blockchain immutable ledger. The design of the Crypto-Spatial framework was implemented as a set of smart contracts using the Solidity object oriented programming language. The implemented library was assessed toward Etheruem’s best practices design patterns and known security issues (common attacks). Also, a generic architecture for geospatially enabled decentralized applications, combining blockchain and IPFS technologies, was proposed. Finally, a proof-of-concept was developed using the proposed approach which main purpose is to port the UN/FAO-SOLA to Blockchain techspace allowing more transparency and simplifying access to users communities. The smart contracts of this prototype are live on the Rinkeby testnet and the frontend is hosted on Github pages. The source code of the work presented here is available on Github under Apache 2.0 license.
APA, Harvard, Vancouver, ISO, and other styles
46

Ambarka, Abdou, Tahirou Djara, and Abdou-Aziz Sobabe. "Patient Medical Records: Implementation of a Security Solution Based on the Hyperledger Fabric Blockchain." International Journal of Innovative Technology and Exploring Engineering 12, no. 11 (2023): 20–28. http://dx.doi.org/10.35940/ijitee.k9728.10121123.

Full text
Abstract:
In this paper, we have developed a solution for securing patient medical records based on blockchain. In our approach, we first carried out a comparative study of different blockchains. This comparative study, based on the Ethereum, Corda and Hyperledger Fabric blockchains, enabled us to select Hyperledger Fabric as the development framework for our blockchain. The criteria justifying our choice are essentially: the modularity of the architecture, the variety of programming languages for smarts contracts, the possibility of creating private channels between members of a network, high access control and data confidentiality, and a flexible consensus model. These criteria are crucial as they guarantee both the robustness and flexibility of the network in a shared medical record context. The proposed solution is a decentralized application that exchanges data in a consortium-type blockchain network, with three different organizations in a healthcare pathway: a hospital, a pharmacy and a laboratory. Other organizations can be added to the network taking into account the need to share and secure healthcare information. Our solution uses the IPFS (Interplanetary File System) protocol for distributed document storage, increasing data security and availability. To facilitate exchanges between network nodes, particular emphasis was also placed on the choice of consensus algorithm. First we chose the Solo Orderer algorithm, which uses a single Ordering Service node to process transactions and add them to blocks, and then we used the Kafka orderer algorithm, which offers high scalability and robust resilience in production environments. The choice of these two consensus algorithms enabled us to set up and deploy a blockchain network that stores and secures sensitive data from medical analyses or examinations in a patient's care pathway.
APA, Harvard, Vancouver, ISO, and other styles
47

Abdou, Ambarka. "Patient Medical Records: Implementation of a Security Solution Based on the Hyperledger Fabric Blockchain." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 12, no. 11 (2023): 20–28. https://doi.org/10.35940/ijitee.K9728.10121123.

Full text
Abstract:
<strong>Abstract:</strong> In this paper, we have developed a solution for securing patient medical records based on blockchain. In our approach, we first carried out a comparative study of different blockchains. This comparative study, based on the Ethereum, Corda and Hyperledger Fabric blockchains, enabled us to select Hyperledger Fabric as the development framework for our blockchain. The criteria justifying our choice are essentially: the modularity of the architecture, the variety of programming languages for smarts contracts, the possibility of creating private channels between members of a network, high access control and data confidentiality, and a flexible consensus model. These criteria are crucial as they guarantee both the robustness and flexibility of the network in a shared medical record context. The proposed solution is a decentralized application that exchanges data in a consortium-type blockchain network, with three different organizations in a healthcare pathway: a hospital, a pharmacy and a laboratory. Other organizations can be added to the network taking into account the need to share and secure healthcare information. Our solution uses the IPFS (Interplanetary File System) protocol for distributed document storage, increasing data security and availability. To facilitate exchanges between network nodes, particular emphasis was also placed on the choice of consensus algorithm. First we chose the Solo Orderer algorithm, which uses a single Ordering Service node to process transactions and add them to blocks, and then we used the Kafka orderer algorithm, which offers high scalability and robust resilience in production environments. The choice of these two consensus algorithms enabled us to set up and deploy a blockchain network that stores and secures sensitive data from medical analyses or examinations in a patient's care pathway.
APA, Harvard, Vancouver, ISO, and other styles
48

Liu, Feng, Cheng-yi Yang, Jie Yang, et al. "A hybrid with distributed pooling blockchain protocol for image storage." Scientific Reports 12, no. 1 (2022). http://dx.doi.org/10.1038/s41598-022-07494-9.

Full text
Abstract:
AbstractAs a distributed storage scheme, the blockchain network lacks storage space has been a long-term concern in this field. At present, there are relatively few research on algorithms and protocols to reduce the storage requirement of blockchain, and the existing research has limitations such as sacrificing fault tolerance performance and raising time cost, which need to be further improved. Facing the above problems, this paper proposes a protocol based on Distributed Image Storage Protocol (DISP), which can effectively improve blockchain storage space and reduces computational costs in the help of InterPlanetary File System (IPFS). In order to prove the feasibility of the protocol, we make full use of IPFS and distributed database to design a simulation experiment for blockchain. Through distributed pooling (DP) algorithm in this protocol, we can divide image evidence into recognizable several small files and stored in several nodes. And these files can be restored to lossless original documents again by inverse distributed pooling (IDP) algorithm after authorization. These advantages in performance create conditions for large scale industrial and commercial applications.
APA, Harvard, Vancouver, ISO, and other styles
49

Boghosian, Reyna Der, and Regina Motz. "D-SELI: Proposal for a Distributed Educational Blockchain Network with IPFS." Journal of Technologies Information and Communication 3, no. 1 (2023). http://dx.doi.org/10.55267/rtic/13973.

Full text
Abstract:
In recent years, there has been an increase in the use of blockchain networks in the educational field, with projects such as SELI (Smart Ecosystem for Learning and Inclusion) that have developed blockchain networks to exchange academic certificates and resources. However, storage space is limited in the use of blockchain networks since all transactions are stored in each node, which can lead to space and accessibility problems in centralized blockchain networks. To address this problem, this article proposes modifying the SELI educational blockchain network through the Interdisciplinary File System (IPFS) protocol in a fully distributed blockchain network, D-SELI. The D-SELI proposal seeks to solve the limitation of storage space and accessibility in blockchain networks by incorporating the IPFS protocol. IPFS is a distributed file system that uses a peer-to-peer network to store and share content decentralized, overcoming storage problems on a blockchain network. Implementing IPFS in D-SELI allows educational resources and certificates to be stored in a decentralized manner, eliminating the need to keep all transactions on each node in the network, which reduces the storage load on the nodes and improves accessibility to the data. Furthermore, being a wholly distributed network, data location problems present in centralized blockchain networks are overcome. In summary, this article presents a proposal to modify the SELI educational blockchain network through the use of the IPFS protocol in a fully distributed network (D-SELI) to solve the limitation of storage space and accessibility in blockchain networks, improve the efficiency and scalability of the network in the educational field.
APA, Harvard, Vancouver, ISO, and other styles
50

Barański, Stanisław, Julian Szymański, and Higinio Mora. "Anonymous provision of privacy-sensitive services using blockchain and decentralised storage." International Journal of Information Security 24, no. 3 (2025). https://doi.org/10.1007/s10207-025-01052-w.

Full text
Abstract:
Abstract Lawyers, laboratories, auditors, and banks often need access to sensitive personal data to provide services such as genetic testing, paternity testing, STD testing, credit scoring, or legal advice. Processing such data exposes both service providers (SPs) and users to privacy risks: SPs risk violating laws like the General Data Protection Regulation (GDPR) and the Consumer Protection Act (CPA), while users risk losing their privacy. We observe that personal data is often only needed for logistical purposes like payment or communication and could be provided anonymously if suitable methods existed. To address this, we present a solution that enables services to be delivered without collecting personal data. Our protocol combines anonymous payment methods (e.g., cash, privacy-preserving cryptocurrencies), blockchain for fairness, and distributed content-addressable storage networks to deliver results. Compared to existing approaches, our protocol achieves anonymity under weaker assumptions, supports the transfer of physical materials and conflict resolution, and eliminates the need for customer interaction with a trusted arbiter in conflict-free cases-making it more practical. We analyze the protocol’s fairness and implement a prototype using Ethereum as a message board, Monero for anonymous payments, and Powergate (IPFS/Filecoin) as a decentralized storage solution.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography