Академический Документы
Профессиональный Документы
Культура Документы
Further these are combined into "abcd" which is here is that both the sender and the receiver
top most root hash. should have multichain framework installed in
Any changes in a single message also results in it.
wrong hash values, and these hash values are 3.1 Environment Setup
compared with hash values of other nodes. If the
values are not same, it assumes that some Consider that the private blockchain for an
tampering has taken place and the transaction educational organization is created initially
will not get confirmed. This maintains with 4 nodes. One is the local host itself, and
consistency as well as security in P2P networks. the other nodes are three instances bought on
AWS and set up in various locations such as
1.2 Multichain Framework Bangalore, US and Europe. With this, we have
Multichain[2] is an open source framework created a private blockchain network by
which allows user to deploy private blockchain connecting the instance using multichain
for any organization. MultiChain supports framework running across the country. It is
Windows, Linux and Mac servers and provides a fully hardware independent and there is no
simple API and Command Line interface. need for any custom or specialized hardware
Multichain solves the related problems of to work with it. Normal laptop or PC is enough
mining, privacy and openness via integrated to conduct the test. It also runs in various cross
management of user permissions. Multichain platforms and supports different operating
is permission based private blockchain. Using systems such as Linux, OSX and Windows.
Multichain framework any number of nodes 3.1.1 Connecting an instance to a private
can join to form a network. blockchain
1.3 Miners in Private Blockchain
Miners play an important role in blockchain
and they are responsible for creating blocks at
each node. There will be two set of block data
out of which one is temporary and the other is
permanent. The temporary blocks are created
immediately when the transaction is initiated.
Once the mining is done, the temporary block
gets linked to permanent block which is the
actual block used by all the nodes. Since Figure 1. Starting the blockchain service
blockchain built is private, mining need not be Once the “genesis” block is found the multichain
very complex and hard like the one performed framework on that particular node starts.
for bitcoins.
The first block is called the "genesis" block
which receives all the permissions initially.
The administrator has to grant the permissions
to the other users joining the network. Any
node in a network can become a miner by
requesting for permission from the admin but
we have set up a network that provides miner
permission for all the nodes present in the
network and to any new node which joins the
network in future so that the transaction can be
confirmed quickly and the files can be
received immediately. The mining concept has
been implemented in a round-robin fashion .
3. Deployment Scenarios
Consider a scenario for creating a private
blockchain for a educational organization. The
Figure 2.Chain information
main condition for a file transfer to take place
ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-4, ISSUE-4, 2017
170
INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR)
ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-4, ISSUE-4, 2017
171
INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR)
.
3.3.1 Modular Design Step 4: At the receivers side the file appears and
Modular design defines the structure of the the receiver can download it from his stream.
overall module. The overall system consists of
the following modules: 3.4 Security levels
1. Encryption/Decryption Various levels of security are provided:
2. Split/Merge Level 0: Encryption of AES key with RSA
3. Hex Encode/Decode allowing file access only by the receiver. Even if
3.3.1 Encryption / Decryption the files are available at all the blocks only the
At the sender's end, the input file is encrypted receiver can access the file. That’s beauty of the
with symmetric cryptographic mechanism blockchain.
called AES+KEY, the keys are randomly Level 1: Equal sized portions of the file are split
generated then the randomly generated keys and encoded with Hex encoding which is will
are encrypted with the Asymmetric be efficient way of sending files in the streams.
cryptographic mechanism RSA(2048). Streams are nothing but blocks here.
3.3.2 File Split/ Merge Level 2: This is the most important level of
The AES encrypted file is split into five equal security and the highest that can ever be
halves. At the receiver each part is decrypted obtained. Block chain network provides the
and then the decrypted parts are merged highest form of security by making sure of the
together. fact that when a file transfer takes place, the
3.3.3 Hex Encoding/ Decoding same has to be confirmed by all the nodes present
Now the split parts are encoded with Hex in the network. All the nodes can surely see that
encoding and then encoded values of five parts a transaction is taking place between the sender
along with the RSA encrypted key will get stored and the receiver. But they can definitely not
on each blocks, created by miners. interfere or tamper the file in anyway. No node
can snoop into the file and see what is being sent.
Step 1: Initially the receiver has to request for the This level of security provides a guarantee that
file by sharing his burn address. only legitimate files can be transferred through
the network. This legitimacy can be confirmed
Step 2: The sender will upload the file with the through the process of mining. Generally in a
receiver’s address. public bitcoin network, miners require the
Step 3: The file uploaded goes through various capability to perform highly intensive and
modules. sophisticated mathematical operations. In this
ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-4, ISSUE-4, 2017
172
INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR)
case, since it is a private blockchain mining is not Blockchain technology, it is still faster and
that complex and hard. Also the more number of secure than SFTP and TOR. In spite of the
miner the faster the file transfer will occur. In a sophisticated methodology involved, the process
file sharing application, miners have to clearly worked out to be much quicker than the
determine who are the actual senders of files and normal file sharing applications which are less
then confirm the transaction that is taking place. secure. From the time taken for file transfer, it is
We have constructed a private block chain even possible to expect blockchain to be an
network with few nodes at different places of the essential technology in shaping tomorrow’s
world and used a mechanism of mining which applications as long as security is perceived to be
takes in any node which joins a block chain the primary concern in the world.
network to be a miner. Like a bitcoin explorer we 4. Proof Of Concept(POC)
also have an explorer to record all the
transactions made. Each transaction contains The security proof of Concept can be measured
values such as size, received time, mined time using a popular packet sniffing tool called
and whether or not the transaction is included in wireshark[17]. When tried with normal FTP file
a block. By default, the transaction is transfer and SFTP the blockchain file transfer is
unconfirmed. In this case the file is split into five much secured. In FTP the username and
equal part so all the five parts has to be passwords are sent in plain text and can be easily
confirmed by the miners only then the receiver seen.
can receive the file. 4.1. Wireshark Sniffing
Level 4: At the receiver's side, to avoid Wireshark[17] is an open source and very
leakage, strong algorithms from cryptography powerful packet analyser.
are implemented. Since the file is encrypted While analyzing the packet it is seen that the
and split, the hackers or intruders cannot get blockchain file transfer doesn’t simply use FTP
access to the original file. It provides protocol. Also the files from the stream can be
maximum integrity as well as security. Even if downloaded using Curl request in Java/PHP.
the file is tampered anywhere in between any Curl is faster and secure than FTP. Also it is
nodes the root hash value will change using the secure and faster than SFTP.
Merkle tree data structure. The root hash will
not match with the original hash and therefore Consider a scenario where a rogue node or
the transaction does not get confirmed and hacker tries to pretend as a legitimate node in a
remains tamper proof. private blockchain and tries to sniff traffic and
decodes the data passed between the nodes. As a
Thus all these levels of security will provide the result a hacker cannot decode the packet and it
most secure form of a file transfer. Even after the seems unbreakable.
implementation of various algorithms that span a
diverse and wide area of cryptography as well as
ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-4, ISSUE-4, 2017
173
INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR)
7. ACKNOWLEDGMENTS
Our thanks to ACM SIGCHI for allowing us to
modify templates they had developed.
8. REFERENCES
[1] KONSTANTINOS CHRISTIDIS AND
MICHAEL DEVETSIKIOTIS (2016).
BLOCKCHAINS AND SMART
CONTRACTS FOR THE INTERNET OF
THINGS[Online].
Available:http://ieeexplore.ieee.org/stamp/sta
mp.jsp?arnumber=7467408
ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-4, ISSUE-4, 2017
175