Secure Information Transfer using Blockchain Architecture
Abstract
Exponential development in blockchain technology has been witnessed through the analysis of bitcoins and another important application called storj2, which involves the concept of a distributed cloud storage. A more efficient application would be to enable file sharing through the concept of Blockchain. This would help in reducing the two-step process of uploading a file to the cloud network or drive and downloading it from the same to a single-step process of just transferring it from a sender to a receiver in a Blockchain network. Even though there are several applications that provide file sharing, it cannot match the one that is based on Blockchain technology in terms of security. Our aim is to enable a secured file sharing application by using a private Blockchain network so that it can be used within small organizations. Here the data is sent by encrypting the file, thereby making sure that none other than the receiver can gain access to the file.
How to cite this article:
Ray S, Bhattacharya A. Secure Information Transfer using Blockchain Architecture. J Engr Desg Anal 2020; 3(2): 55-58.
References
Svein Ølnes and Vestlandsforsking. Beyond Bitcoin. 2016.
MultiChain Private Block Chain-White Paper.
Konstantinos Christidis and Michael Devetsikiotis 2016.
Blockchains and Smart Contracts for The Internet of Things. Understanding Public Key Cryptography [Online] 2005.
Merkle RC. Protocols for public key cryptosystems 1980.
Yli-Huumo J, Ko D, Choi S et al. Where Is Current Research on Blockchain Technology? A Systematic Review 2016.
Wilkinson S, Boshevski T, Brandof J et al. Gordon Hall, Patrick Gerbes, Philip Hutchins, Chris Pollard 2016.
Euro Banking Association report. Crypto Technologies, A major IT innovation and catalyst for change 2015.
Back A, Corallo M, Dashjr L et al. 2014.
Enabling blockchain innovations with pegged sidechains. Secure and Decentralized File TransferApplication Using Blockchain ISSN.
Wood DG. Ethereum: A Secure Decentralised Generalised Transaction Ledger 2014.
Tosin P. Adewumi and Marcus Liwicki Inner For- Loop for Speeding Up Blockchain Mining Optimizing SHA256 in Bitcoin Mining ISSN:1865-0929.
Published
Issue
Section
Copyright (c) 2021 Journal of Engineering Design and Analysis
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
“_______________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
Important
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.