Peer to Peer File Sharing by Blockchain Using IOT

Authors(4) :-M. Amirtha Krishnan, C. Gowri Shankar, S. Arvind Raj, A. Ragavan

Hadoop envisioned as the next-generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers. Sender using IBE does not required public key, but directly encrypts message with receiverís identity. Accordingly, receiver obtaining the private key associated with the corresponding identity from Private Key Generator (PKG) is able to decrypt such cipher text. The problem of ensuring the integrity of data storage in Hadoop. The task of allowing a Third-Party Auditor (TPA) to verify the integrity of dynamic data stored in the cloud. Aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. By using IOT layers we can able to track our files or data where it is currently located.

Authors and Affiliations

M. Amirtha Krishnan
Information Technology, Anna University, SKP Engineering College, Tiruvannamalai, Tamil Nadu, India
C. Gowri Shankar
Information Technology, Anna University, SKP Engineering College, Tiruvannamalai, Tamil Nadu, India
S. Arvind Raj
Information Technology, Anna University, SKP Engineering College, Tiruvannamalai, Tamil Nadu, India
A. Ragavan
Information Technology, Anna University, SKP Engineering College, Tiruvannamalai, Tamil Nadu, India

Hadoop- PKG-Cloud Security- Block-Chain-Peer to Peer-IOT.

  1. Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, and Wenjing Lou, Senior Member, IEEE, "Identity-Based Encryption with Outsourced Revocation in Hadoop", IEEE TRANSACTIONS ON COMPUTERS, VOL. 64, NO. 2, FEBRUARY 2015.
  2. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation,"in Advances in Cryptology (CRYPTO’98). New York, NY, USA:Springer, 1998, pp. 137–152.
  3. V. Goyal, "Certificate revocation using fine grained certificate spacepartitioning," in Financial Cryptography and Data Security, S. Dietrichand R. Dhamija, Eds. Berlin, Germany: Springer, 2007, vol. 4886,pp. 247–259.
  4. F. Elwailly, C. Gentry, and Z. Ramzan, "Quasimodo: Efficientcertificate validation and revocation," in Public Key Cryptography(PKC’04), F. Bao, R. Deng, and J. Zhou, Eds. Berlin, Germany:Springer, 2004, vol. 2947, pp. 375–388.
  5. A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryptionwith efficient revocation," in Proc. 15thACMConf. Comput. Commun.Security (CCS’08), 2008, pp. 417–426.
  6. A. Sahai and B. Waters, "Fuzzy identity-based encryption," inAdvances in Cryptology (EUROCRYPT’05), R. Cramer, Ed. Berlin,Germany: Springer, 2005, vol. 3494, pp. 557–557. 7] Malathi, Murugesan, "A Scheme for Checking Data Correctness in the Cloud", International Conference on Information and Network Technology (ICINT 2012). 2013.3. 8]N.Madhuri, T.V.Suneetha, A.Haritha, P.V.S.Lakshmi, "A Protocol for Ensuring Data Integrity in Cloud Environment", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 2013.
  7. XU Chun-xiang, HE Xiao-hu, Daniel Abraha, "Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing", School of Computer Science and Engineering, University of Electronics Science and Technology of China, 2006. 10]
  8. K. Govinda, E.Sathiyamoorthy, "Data Auditing in Cloud Environment using Message Authentication Code", International Conference on Emerging Trends on Advanced Engineering Research (ICETT), 2012. 11]
  9. Miss. M. Sowparnika1, Prof. R. Dheenadayalu2, "Improving data integrity on cloud storage services", International Journal of Engineering Science Invention(ISSN), Volume 2, Issue 2 ,February.

Publication Details

Published in : Volume 3 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 91-94
Manuscript Number : IJSRSET173253
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

M. Amirtha Krishnan, C. Gowri Shankar, S. Arvind Raj, A. Ragavan, " Peer to Peer File Sharing by Blockchain Using IOT, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 2, pp.91-94 , March-April.2017
URL : http://ijsrset.com/IJSRSET173253

Follow Us

Contact Us