IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET173253                                                     

Peer to Peer File Sharing by Blockchain Using IOT


M. Amirtha Krishnan, C. Gowri Shankar, S. Arvind Raj, A. Ragavan
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Hadoop envisioned as the next-generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers. Sender using IBE does not required public key, but directly encrypts message with receiverís identity. Accordingly, receiver obtaining the private key associated with the corresponding identity from Private Key Generator (PKG) is able to decrypt such cipher text. The problem of ensuring the integrity of data storage in Hadoop. The task of allowing a Third-Party Auditor (TPA) to verify the integrity of dynamic data stored in the cloud. Aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. By using IOT layers we can able to track our files or data where it is currently located.

M. Amirtha Krishnan, C. Gowri Shankar, S. Arvind Raj, A. Ragavan

Hadoop- PKG-Cloud Security- Block-Chain-Peer to Peer-IOT.

  1. Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, and Wenjing Lou, Senior Member, IEEE, "Identity-Based Encryption with Outsourced Revocation in Hadoop", IEEE TRANSACTIONS ON COMPUTERS, VOL. 64, NO. 2, FEBRUARY 2015.
  2. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation,"in Advances in Cryptology (CRYPTO’98). New York, NY, USA:Springer, 1998, pp. 137–152.
  3. V. Goyal, "Certificate revocation using fine grained certificate spacepartitioning," in Financial Cryptography and Data Security, S. Dietrichand R. Dhamija, Eds. Berlin, Germany: Springer, 2007, vol. 4886,pp. 247–259.
  4. F. Elwailly, C. Gentry, and Z. Ramzan, "Quasimodo: Efficientcertificate validation and revocation," in Public Key Cryptography(PKC’04), F. Bao, R. Deng, and J. Zhou, Eds. Berlin, Germany:Springer, 2004, vol. 2947, pp. 375–388.
  5. A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryptionwith efficient revocation," in Proc. 15thACMConf. Comput. Commun.Security (CCS’08), 2008, pp. 417–426.
  6. A. Sahai and B. Waters, "Fuzzy identity-based encryption," inAdvances in Cryptology (EUROCRYPT’05), R. Cramer, Ed. Berlin,Germany: Springer, 2005, vol. 3494, pp. 557–557. 7] Malathi, Murugesan, "A Scheme for Checking Data Correctness in the Cloud", International Conference on Information and Network Technology (ICINT 2012). 2013.3. 8]N.Madhuri, T.V.Suneetha, A.Haritha, P.V.S.Lakshmi, "A Protocol for Ensuring Data Integrity in Cloud Environment", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 2013.
  7. XU Chun-xiang, HE Xiao-hu, Daniel Abraha, "Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing", School of Computer Science and Engineering, University of Electronics Science and Technology of China, 2006. 10]
  8. K. Govinda, E.Sathiyamoorthy, "Data Auditing in Cloud Environment using Message Authentication Code", International Conference on Emerging Trends on Advanced Engineering Research (ICETT), 2012. 11]
  9. Miss. M. Sowparnika1, Prof. R. Dheenadayalu2, "Improving data integrity on cloud storage services", International Journal of Engineering Science Invention(ISSN), Volume 2, Issue 2 ,February.

Publication Details

Published in : Volume 3 | Issue 2 | March-April - 2017
Date of Publication Print ISSN Online ISSN
2017-04-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
91-94 IJSRSET173253   Technoscience Academy

Cite This Article

M. Amirtha Krishnan, C. Gowri Shankar, S. Arvind Raj, A. Ragavan, "Peer to Peer File Sharing by Blockchain Using IOT", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 2, pp.91-94 , March-April-2017.
URL : http://ijsrset.com/IJSRSET173253.php