Peer to Peer File Sharing by Blockchain Using IOT

Authors

  • M. Amirtha Krishnan  Information Technology, Anna University, SKP Engineering College, Tiruvannamalai, Tamil Nadu, India
  • C. Gowri Shankar  Information Technology, Anna University, SKP Engineering College, Tiruvannamalai, Tamil Nadu, India
  • S. Arvind Raj  Information Technology, Anna University, SKP Engineering College, Tiruvannamalai, Tamil Nadu, India
  • A. Ragavan  Information Technology, Anna University, SKP Engineering College, Tiruvannamalai, Tamil Nadu, India

Keywords:

Hadoop- PKG-Cloud Security- Block-Chain-Peer to Peer-IOT.

Abstract

Hadoop envisioned as the next-generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers. Sender using IBE does not required public key, but directly encrypts message with receiver’s identity. Accordingly, receiver obtaining the private key associated with the corresponding identity from Private Key Generator (PKG) is able to decrypt such cipher text. The problem of ensuring the integrity of data storage in Hadoop. The task of allowing a Third-Party Auditor (TPA) to verify the integrity of dynamic data stored in the cloud. Aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. By using IOT layers we can able to track our files or data where it is currently located.

References

  1. Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, and Wenjing Lou, Senior Member, IEEE, "Identity-Based Encryption with Outsourced Revocation in Hadoop", IEEE TRANSACTIONS ON COMPUTERS, VOL. 64, NO. 2, FEBRUARY 2015.
  2. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation,"in Advances in Cryptology (CRYPTO’98). New York, NY, USA:Springer, 1998, pp. 137–152.
  3. V. Goyal, "Certificate revocation using fine grained certificate spacepartitioning," in Financial Cryptography and Data Security, S. Dietrichand R. Dhamija, Eds. Berlin, Germany: Springer, 2007, vol. 4886,pp. 247–259.
  4. F. Elwailly, C. Gentry, and Z. Ramzan, "Quasimodo: Efficientcertificate validation and revocation," in Public Key Cryptography(PKC’04), F. Bao, R. Deng, and J. Zhou, Eds. Berlin, Germany:Springer, 2004, vol. 2947, pp. 375–388.
  5. A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryptionwith efficient revocation," in Proc. 15thACMConf. Comput. Commun.Security (CCS’08), 2008, pp. 417–426.
  6. A. Sahai and B. Waters, "Fuzzy identity-based encryption," inAdvances in Cryptology (EUROCRYPT’05), R. Cramer, Ed. Berlin,Germany: Springer, 2005, vol. 3494, pp. 557–557. 7] Malathi, Murugesan, "A Scheme for Checking Data Correctness in the Cloud", International Conference on Information and Network Technology (ICINT 2012). 2013.3. 8]N.Madhuri, T.V.Suneetha, A.Haritha, P.V.S.Lakshmi, "A Protocol for Ensuring Data Integrity in Cloud Environment", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 2013.
  7. XU Chun-xiang, HE Xiao-hu, Daniel Abraha, "Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing", School of Computer Science and Engineering, University of Electronics Science and Technology of China, 2006. 10]
  8. K. Govinda, E.Sathiyamoorthy, "Data Auditing in Cloud Environment using Message Authentication Code", International Conference on Emerging Trends on Advanced Engineering Research (ICETT), 2012. 11]
  9. Miss. M. Sowparnika1, Prof. R. Dheenadayalu2, "Improving data integrity on cloud storage services", International Journal of Engineering Science Invention(ISSN), Volume 2, Issue 2 ,February.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
M. Amirtha Krishnan, C. Gowri Shankar, S. Arvind Raj, A. Ragavan, " Peer to Peer File Sharing by Blockchain Using IOT, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 2, pp.91-94 , March-April-2017.