SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 203
Securing Data in Distributed System using Blockchain and AI
Abhijeet Sontakke1, Aditya Gaikwad1, Neha Ovhal1, Kalyani Nagawade1, Sarita Patil2
1Student, Dept. of Computer Engineering, G. H. Raisoni COE & Management Pune, Maharashtra, India
2Professor, Dept. of Computer Engineering, G. H. Raisoni COE & Management Pune, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In hospitals in developing countries when an
individual with symptoms corresponding to a deadly disease
such as hepatitis, influenza, cancer, etc. is encountered, the
staff can either suggest an expert in that particular field or if
the disease hasn’t been identified, the staff could recommend
the patient to a general physician. Most of the time, the
general physician will subject the patient through a series of
trial and error to identify and eliminate the improbable
disease. This process is a very painful ordeal experienced by
the patient as the doctors try to determine the cause of the
symptoms, one disease medication at a time. This problemhas
largely been overcome by developed countries by a Data
Vendor. This paper analyses all the past workonprovidingthe
security for the data in the network where especially data
brokers are being involved. The best way to provide this is,
introducing of block chains and Artificial intelligence. This
research article analyses past methodologies and evaluate
them to introduce a newer version of maintaining data
integrity in network.
Key Words: Block chain, Artificial intelligence,Intrusion
detection system, Network threats, Access control
mechanism.
1. INTRODUCTION
Data and its security have been paramount since the day
human beings started accumulating it. Since the earliest
stone age era, humans have evolved to process the
information around us byvarioussensoryinputsreceivedby
different sensory organs. This has led to the development of
various arts such as paintings, music, textures, etc. This
thirst for the unknown has made us go into space and
advance a significant amount in technology over the years.
All of this data created needs to be stored somewherewhere
it cannot be modified or destroyed, as these are valuable
lessons learned throughout the lifetime of an individual or a
group which can help the species to grow forward. This has
led to the humans collecting and storing a lot of data on
various different topics and was accelerated due to the
invention of the printing press at which allowed the
information to take the form of books that could retain it for
a very long time.
Another revolution in the storage, retrieval, and access of
data happened when the internet was conceived. Electronic
storage was already invented by then but the internetadded
another element to this as the internet allowed the various
computers and computing devices all over the world to
connect to each other and share information. This was
designed to facilitate the exchange of information between
the researchers over a large distanceto eliminatetheneedto
be physically present at the location to utilize the resources.
Due to its initial success, the internet was opened to the
public and various different services that used the internet
as the backbone started flourishing.
The internet started growing exponentially with a lot more
users and machines being connected every day. People
started using the platform more and more and this led to an
increased number of users interacting online. With social
media and educational portals, the internet grew to
astronomical sizes and the data being produced every day
grew to a massive size. With the growthofdata andtheusers
online, it created a nourishing environment for people to
learn and share valuable skills and information all over the
world. The major drawback of open access to everyone on
the internet was that there are also some individuals with
malicious intent that can ruin the experience of another
person purely for personal gain.
A lot of users on the internet have valuable and sensitive
personal information that is stored in the databases and
various organizations to have their internal data that is
confidentially stored electronically. This increases the
likelihood of an attacker gaining access to this information
that would lead to compromised security as well as a huge
loss for the organization. This is problematic as there are no
alternatives for storage and the convenience offered by the
database. Therefore, there is an utmost need to provide a
mechanism for controlling the access to the sensitive data
through which only the trusted employees and other
members of the organization can access the data, based on
their hierarchy.
This brings forth the blockchain paradigm, being proposed
by a group of scientists in the late 1990s the technique was
initially developed for use in a digital notary as it is an
excellent choice for tamper-proofing a document. The
paradigm was largely unused until it was utilized for the
creation of the world’s first cryptocurrency.Duetoitsstrong
tamper-proof and distributed nature, it is an apt choice for a
cryptocurrency. The blockchain is one of the most secure
applications and is capable of providingveryhighsecurityto
the data stored and can, therefore, be utilized in an
application to safeguard the data and provide an efficient as
well as an effective access control mechanism for the
sensitive data of an organization.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 204
This paper dedicates section 2 for analysis of past work as
literature survey and section 3 concludes the paper with
feasible statement of the literature study.
2. LITERATURE SURVEY
This section of the literature survey eventually revealssome
facts based on thoughtful analysis of many authors work as
follows.
S. Yu states that due to rapid pace of technology and the
introduction of Internet of Things or IoT, there has been a
swift increase in the number of intelligent devices being
connected to the internet. These devices are capable of
generating a large amount of data due to the fact that it is
connected and is interacting with the internet. A large
number of devices generate equally large amount of data
which cannot be processedefficiently.Therefore,theauthors
propose an effective technique based on blockchain thatcan
provide a low-cost alternative to create economic value for
the IoT data generated. A major drawback of this
methodology is that it has the potential to be misused by
uploading large amounts of malicious data.
R. Wang elaborates on the foundation of network security
construction which is the PKI or The Public Key
Infrastructure. The researchers also commented on the
reliability and the robust security offered by the blockchain
platform. Therefore, the authors amalgamated both the
methodologies to strengthen the Public Key Infrastructure
by a permissioned blockchain that converts the PKI into a
privacy-aware PKI. This is crucial as the implementationofa
permissioned blockchain also improves the efficiency of the
configuration and certificate application. The major
drawback is that this technique has been a very specialized
approach towards the blockchain paradigm.
C. Ehmke explains that the innovative paradigm of
Blockchain has been popular and has seen extensive usage
recently. The blockchain was utilized for financial
applications and that is how it gained immense popularity
and limelight. The blockchain was readily picked up by a
plethora of researchers and implemented in various
different fields, which has greatly helped in bringing
increased security to numerous applications. Due to the fact
that the blockchain paradigm requires a user of the
blockchain to download the wholechaintogainanoverview.
To ameliorate this effect, the authors have implemented a
scalable and lightweight blockchain protocol.
R. Wang introduces the video surveillance system as an
irreplaceable tool that can be used to efficiently manage and
survey big cities. When a video surveillance system is
installed it can easily transmit environment information
remotely, this is highly useful as the person does not need to
travel long distances and physically be present in the
location for the management. Due to a large-scaleincrease in
the monitoring standards with the inclusion of IoT and real-
time monitoring, it is susceptible to attacks. Therefore, the
authors developed a system for video surveillance based on
permissioned blockchains and Convolutional Neural
Networks for a seamless and secure system. A Major
drawback in the system is that large scale testing of the
System has not been performed and will be done in the
upcoming researches.
J. Lou states that there has been a lack of a key management
feature in the Named Data Networking, which is utilized to
name each and every object by the producer and also
digitally sign it. There are some disadvantages of the
conventional approach such as lack of trust between the
sites as well as the high chances of failure observed in the
centralized architecture if the main nodefails.Therefore, the
authors in this paper propose an efficient key management
scheme based on blockchainfortheNamedData Networking
paradigm. The blockchain increases the trust between the
sites as well as the decentralizedarchitectureishighlyuseful
in overcoming failure.Thedrawback oftheproposedscheme
is that it has not been evaluated extensively for its feasibility
in reducing the NDN cache pollution.
S. Wang explains that therehasbeena veryfastdevelopment
of cryptocurrency in recent years, which has led to detailed
scrutiny of the paradigm. This has uncovered a lot of
irregularities in the paradigm such as the Smart Contracts
that have been the cause of “The DOA Attack” which has
resulted in a huge loss. Therefore, the authors have
presented a comprehensive and systematic review of the
smart contracts in the blockchain paradigm. The authors
have presented a six-layer architecture for smart contracts
for increasing the security of the system. The authors have
not implemented a formal verification which can provide
confidence.
Y. Xu introduces the concept of decentralized storage that is
based on the blockchain framework.Theblockchainisoneof
the most innovative concepts that can be used to design a
highly secure decentralized framework. The authors have
proposed section blockchain protocol, which aims to
eliminate the storage problem that is encountered incertain
devices. The proposed methodology is highly resilient to
failure due to the decentralizedarchitecture,aswell as,ithas
the ability to withstand heavy loads and optimization
gracefully due to the implementation of the Blockchain
paradigm.
M. Marchesi in his keynote speech details the rapid
development and ongoing researches going on in the field of
blockchain. This is due to the increased attention to this
paradigm and increased demand in this sector. The author
indicates that this increased pressure on a nascent
framework has led to an increase in security lapses that are
evident in the various different incidents on the Ethereum
platform and the cryptocurrency exchanges.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 205
That being said the speaker also highlighted the immense
opportunities that can be utilized by using the blockchain
paradigm such as the Blockchain tokens that can be used to
implement a reward and penalty-based scheme for
developers.
A. Maksutov elaborates on the paradigm of Blockchain and
its uses. The authors have proposed an innovative concept
for the detection and identification of various money
laundering schemes that use the blockchain framework for
their nefarious activities. The proposed methodology has
been used to deanonymizing the transactions and tracking
the coin join transactions, which allows the authors to
evaluate user participation. All of this information is used to
determine if the transactions are being fraudulentorused to
launder money.
F. Wessling states that the addition of blockchain to existing
platforms is problematic as it is different from building the
applications from scratch by incorporating the Blockchain
into the application. The authors determine the amount of
blockchain required for various different implementations,
this is done by analyzing the attributes of blockchainsuchas
anonymous, trustless and immutable, etc. The authors have
outlined the various different processes that utilize various
different elements of the blockchain technology that can be
implemented based on the specific application and use case
of the application.
J. Wang explains that most of the applications based on
crowd sensing gather a huge amount of data by using
pervasive smartphone users to provide the data.Butmost of
the time the users are not compensated enough for their
contribution to the system. Therefore, the authors have
presented an innovativeframework fora privacy-preserving
reward and penalty scheme that rewards the users for
contributing to the large data sensing paradigm using the
trustless and secure blockchain. The major drawback of this
paper has been that the authors have not discussed the
solutions for a possible collusion attack.
S. Pandey introduces the benefits of utilizing the Blockchain
paradigm for its security and decentralizedarchitecture.The
author states that there has been a jump in the number of
researches is going on in this field and there has been
increased interest in implementing the blockchain
framework to make existing systems resilientandsecure. To
this effect, the authors have formulated an ingenious and
practical simulation tool for planning,stability,anddesignof
the systems and applications as well as networks in a
blockchain environment. TheBlockSIMisanopensource and
comprehensive solution for all the Blockchain simulation
needs. The major drawback is that the authors have not
modeled the internet latency that would affect the accuracy
of the simulation.
3. SYSTEM OVERVIEW DIAGRAM
4. CONCLUSION
In this paper there have been some related works that have
utilized the Public health record database and techniques to
achieve various different approaches and to identify their
flaws and shortcomings. There have been various
methodologies that have been proposed by a plethora of
authors each offering a unique technique to Public Health
Record management. This has influenced our approach
drastically and helped and enabled us to propose a secure
and efficient Public Health Record management system that
uses the Blockchain Paradigm. The Blockchainisuseddueto
its inherent nature of being resilient to changes and
tampering, this is utilized to provide an effective Access
control Mechanism that can help restrict the leakage of
valuable sensitive data of the patients in the Public Health
Records. The methodology discussedwill beimplemented in
the upcoming researches.
REFERENCES
[1] S. Yu, K. Lv, Z. Shao, Y. Guo. J. Zou and b. Zhang, “A High-
Performance Blockchain Platform for Intelligent Devices”,
1st IEEE International Conference on Hot Information-
Centric Networking, HotICN, 2018.
[2] R. Wang et al, “A Privacy-Aware PKI System Based on
Permissioned Blockchains”, IEEE 9th International
Conference on Software Engineering and Service Science
(ICSESS), 2018.
[3] C. Ehmke, F. Wessling and C. Friedrich, “Proof-of-
Property – A Lightweight and Scalable Blockchain Protocol”,
ACM/IEEE 1st International Workshop on EmergingTrends
in Software Engineering for Blockchain, 2018.
[4] R. Wang et al, “A Video Surveillance System Based on
Permissioned Blockchains and Edge Computing”, IEEE
International Conference on Big Data and Smart Computing,
BigComp, 2019.
[5] J. Lou, Q. Zhang, Z. Qi and K. Lei, “A Blockchain-based key
Management Scheme for Named Data Networking”,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 206
Proceedings of 2018 1st IEEE International Conference on
Hot Information-Centric Networking, HotICN 2018.
[6] S. Wang L. Ouyang et al, “Blockchain-Enabled Smart
Contracts: Architecture, Applications, and Future Trends”,
IEEE Transactions on Systems, Man, and Cybernetics:
Systems, 2019.
[7] Y. Xu, “Section-Blockchain:AStorageReducedBlockchain
Protocol, the Foundation of an Autotrophic Decentralized
Storage Architecture”, 23rd International Conference on
Engineering of Complex Computer Systems (ICECCS), 2018.
[8] M. Marchesi, “Why Blockchain Is Important for Software
Developers, and Why Software Engineering Is Importantfor
Blockchain Software”, International Workshop on
Blockchain Oriented Software Engineering (IWBOSE),2018.
[9] A. Maksutov et al, “Detection of Blockchain Transactions
Used in Blockchain Mixer of Coin Join Type”, IEEE
Conference of Russian Young Researchers in Electrical and
Electronic Engineering (EIConRus), 2019.
[10] F. Wessling et al, “How Much Blockchain Do You Need?
Towards a Concept for BuildingHybridDAppArchitectures”,
ACM/IEEE 1st International Workshop on EmergingTrends
in Software Engineering for Blockchain, 2018.
[11] J. Wang et al, “A Blockchain-based Privacy-Preserving
Incentive Mechanism in Crowdsensing Applications”, IEEE
Access, 2018.
[12] S. Pandey et al, “BlockSIM: A practical simulation tool
for optimal network design, stability, and planning”, IEEE
International Conference on BlockchainandCryptocurrency
(ICBC), 2019.

More Related Content

PDF
Smart city landscape
PDF
A Novel Security Approach for Communication using IOT
PDF
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PDF
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
PDF
March 2022 - Top 10 Read Articles in Network Security and Its Applications
PDF
November 2021 - Top 10 Read Articles in Network Security & Its Applications
PDF
Novel authentication framework for securing communication in internet-of-things
PDF
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
Smart city landscape
A Novel Security Approach for Communication using IOT
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
March 2022 - Top 10 Read Articles in Network Security and Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
Novel authentication framework for securing communication in internet-of-things
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...

What's hot (20)

PDF
December 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
Recent trends in cloud computing articles
PDF
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
PDF
509286-Aki_Koivu-Review
PDF
Io t security_review_blockchain_solutions
DOCX
Chapter 3.docx
PDF
Big Data and Information Security
PPTX
First line of defense for cybersecurity : AI
PDF
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
PDF
IoT and the implications on business IT architecture and security
PDF
A survey on secure communication protocols for io t systems
PDF
Security and Privacy in IoT and Cyber-physical Systems
PDF
Internet of Things IoT Anytime Anywhere Anything Connectivity
PDF
IRJET - A Study on Smart Way for Securing IoT Devices
PDF
October 2020 - Top Read Articles in Network Security & Its Applications
PDF
March 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
PDF
January 2021 - Top 10 Read Articles in Network Security & Its Applications
PDF
October 2021: Top 10 Read Articles in Network Security and Its Applications
PPTX
IoT.ppt
December 2021: Top 10 Read Articles in Network Security and Its Applications
Recent trends in cloud computing articles
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
509286-Aki_Koivu-Review
Io t security_review_blockchain_solutions
Chapter 3.docx
Big Data and Information Security
First line of defense for cybersecurity : AI
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IoT and the implications on business IT architecture and security
A survey on secure communication protocols for io t systems
Security and Privacy in IoT and Cyber-physical Systems
Internet of Things IoT Anytime Anywhere Anything Connectivity
IRJET - A Study on Smart Way for Securing IoT Devices
October 2020 - Top Read Articles in Network Security & Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
January 2021 - Top 10 Read Articles in Network Security & Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
IoT.ppt
Ad

Similar to IRJET -Securing Data in Distributed System using Blockchain and AI (20)

PDF
Deep Learning and Big Data technologies for IoT Security
PDF
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
PDF
BEE – Blockchain Enabled Election System
PDF
IRJET - Development of Cloud System for IoT Applications
PPTX
Internet of Things
PDF
IRJET - Securing Aadhaar Details using Blockchain
PDF
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
PDF
The Web 3.0 Portal with Social Media and Photo Storage application
PDF
Authentication and Tracking of Government Benefits Using Blockchain
PDF
final.pdf
DOCX
NIS.docx
PDF
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
PDF
Fundamental Concept of Internet of Things
PDF
E-Toll Payment Using Azure Cloud
PDF
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
PDF
Futuristic Research Trends And Applications Of Internet Of Things 1st Edition...
PDF
Blockchain based News Application to combat Fake news
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
PDF
Authentication system with Decentralized chat app
PPTX
IOTCYBER
Deep Learning and Big Data technologies for IoT Security
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
BEE – Blockchain Enabled Election System
IRJET - Development of Cloud System for IoT Applications
Internet of Things
IRJET - Securing Aadhaar Details using Blockchain
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
The Web 3.0 Portal with Social Media and Photo Storage application
Authentication and Tracking of Government Benefits Using Blockchain
final.pdf
NIS.docx
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
Fundamental Concept of Internet of Things
E-Toll Payment Using Azure Cloud
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Futuristic Research Trends And Applications Of Internet Of Things 1st Edition...
Blockchain based News Application to combat Fake news
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
Authentication system with Decentralized chat app
IOTCYBER
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Artificial Intelligence
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
web development for engineering and engineering
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Digital Logic Computer Design lecture notes
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Current and future trends in Computer Vision.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Construction Project Organization Group 2.pptx
PPT
Mechanical Engineering MATERIALS Selection
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
UNIT 4 Total Quality Management .pptx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Artificial Intelligence
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
web development for engineering and engineering
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
bas. eng. economics group 4 presentation 1.pptx
CH1 Production IntroductoryConcepts.pptx
Digital Logic Computer Design lecture notes
R24 SURVEYING LAB MANUAL for civil enggi
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Internet of Things (IOT) - A guide to understanding
Model Code of Practice - Construction Work - 21102022 .pdf
Current and future trends in Computer Vision.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Construction Project Organization Group 2.pptx
Mechanical Engineering MATERIALS Selection
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
UNIT 4 Total Quality Management .pptx

IRJET -Securing Data in Distributed System using Blockchain and AI

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 203 Securing Data in Distributed System using Blockchain and AI Abhijeet Sontakke1, Aditya Gaikwad1, Neha Ovhal1, Kalyani Nagawade1, Sarita Patil2 1Student, Dept. of Computer Engineering, G. H. Raisoni COE & Management Pune, Maharashtra, India 2Professor, Dept. of Computer Engineering, G. H. Raisoni COE & Management Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In hospitals in developing countries when an individual with symptoms corresponding to a deadly disease such as hepatitis, influenza, cancer, etc. is encountered, the staff can either suggest an expert in that particular field or if the disease hasn’t been identified, the staff could recommend the patient to a general physician. Most of the time, the general physician will subject the patient through a series of trial and error to identify and eliminate the improbable disease. This process is a very painful ordeal experienced by the patient as the doctors try to determine the cause of the symptoms, one disease medication at a time. This problemhas largely been overcome by developed countries by a Data Vendor. This paper analyses all the past workonprovidingthe security for the data in the network where especially data brokers are being involved. The best way to provide this is, introducing of block chains and Artificial intelligence. This research article analyses past methodologies and evaluate them to introduce a newer version of maintaining data integrity in network. Key Words: Block chain, Artificial intelligence,Intrusion detection system, Network threats, Access control mechanism. 1. INTRODUCTION Data and its security have been paramount since the day human beings started accumulating it. Since the earliest stone age era, humans have evolved to process the information around us byvarioussensoryinputsreceivedby different sensory organs. This has led to the development of various arts such as paintings, music, textures, etc. This thirst for the unknown has made us go into space and advance a significant amount in technology over the years. All of this data created needs to be stored somewherewhere it cannot be modified or destroyed, as these are valuable lessons learned throughout the lifetime of an individual or a group which can help the species to grow forward. This has led to the humans collecting and storing a lot of data on various different topics and was accelerated due to the invention of the printing press at which allowed the information to take the form of books that could retain it for a very long time. Another revolution in the storage, retrieval, and access of data happened when the internet was conceived. Electronic storage was already invented by then but the internetadded another element to this as the internet allowed the various computers and computing devices all over the world to connect to each other and share information. This was designed to facilitate the exchange of information between the researchers over a large distanceto eliminatetheneedto be physically present at the location to utilize the resources. Due to its initial success, the internet was opened to the public and various different services that used the internet as the backbone started flourishing. The internet started growing exponentially with a lot more users and machines being connected every day. People started using the platform more and more and this led to an increased number of users interacting online. With social media and educational portals, the internet grew to astronomical sizes and the data being produced every day grew to a massive size. With the growthofdata andtheusers online, it created a nourishing environment for people to learn and share valuable skills and information all over the world. The major drawback of open access to everyone on the internet was that there are also some individuals with malicious intent that can ruin the experience of another person purely for personal gain. A lot of users on the internet have valuable and sensitive personal information that is stored in the databases and various organizations to have their internal data that is confidentially stored electronically. This increases the likelihood of an attacker gaining access to this information that would lead to compromised security as well as a huge loss for the organization. This is problematic as there are no alternatives for storage and the convenience offered by the database. Therefore, there is an utmost need to provide a mechanism for controlling the access to the sensitive data through which only the trusted employees and other members of the organization can access the data, based on their hierarchy. This brings forth the blockchain paradigm, being proposed by a group of scientists in the late 1990s the technique was initially developed for use in a digital notary as it is an excellent choice for tamper-proofing a document. The paradigm was largely unused until it was utilized for the creation of the world’s first cryptocurrency.Duetoitsstrong tamper-proof and distributed nature, it is an apt choice for a cryptocurrency. The blockchain is one of the most secure applications and is capable of providingveryhighsecurityto the data stored and can, therefore, be utilized in an application to safeguard the data and provide an efficient as well as an effective access control mechanism for the sensitive data of an organization.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 204 This paper dedicates section 2 for analysis of past work as literature survey and section 3 concludes the paper with feasible statement of the literature study. 2. LITERATURE SURVEY This section of the literature survey eventually revealssome facts based on thoughtful analysis of many authors work as follows. S. Yu states that due to rapid pace of technology and the introduction of Internet of Things or IoT, there has been a swift increase in the number of intelligent devices being connected to the internet. These devices are capable of generating a large amount of data due to the fact that it is connected and is interacting with the internet. A large number of devices generate equally large amount of data which cannot be processedefficiently.Therefore,theauthors propose an effective technique based on blockchain thatcan provide a low-cost alternative to create economic value for the IoT data generated. A major drawback of this methodology is that it has the potential to be misused by uploading large amounts of malicious data. R. Wang elaborates on the foundation of network security construction which is the PKI or The Public Key Infrastructure. The researchers also commented on the reliability and the robust security offered by the blockchain platform. Therefore, the authors amalgamated both the methodologies to strengthen the Public Key Infrastructure by a permissioned blockchain that converts the PKI into a privacy-aware PKI. This is crucial as the implementationofa permissioned blockchain also improves the efficiency of the configuration and certificate application. The major drawback is that this technique has been a very specialized approach towards the blockchain paradigm. C. Ehmke explains that the innovative paradigm of Blockchain has been popular and has seen extensive usage recently. The blockchain was utilized for financial applications and that is how it gained immense popularity and limelight. The blockchain was readily picked up by a plethora of researchers and implemented in various different fields, which has greatly helped in bringing increased security to numerous applications. Due to the fact that the blockchain paradigm requires a user of the blockchain to download the wholechaintogainanoverview. To ameliorate this effect, the authors have implemented a scalable and lightweight blockchain protocol. R. Wang introduces the video surveillance system as an irreplaceable tool that can be used to efficiently manage and survey big cities. When a video surveillance system is installed it can easily transmit environment information remotely, this is highly useful as the person does not need to travel long distances and physically be present in the location for the management. Due to a large-scaleincrease in the monitoring standards with the inclusion of IoT and real- time monitoring, it is susceptible to attacks. Therefore, the authors developed a system for video surveillance based on permissioned blockchains and Convolutional Neural Networks for a seamless and secure system. A Major drawback in the system is that large scale testing of the System has not been performed and will be done in the upcoming researches. J. Lou states that there has been a lack of a key management feature in the Named Data Networking, which is utilized to name each and every object by the producer and also digitally sign it. There are some disadvantages of the conventional approach such as lack of trust between the sites as well as the high chances of failure observed in the centralized architecture if the main nodefails.Therefore, the authors in this paper propose an efficient key management scheme based on blockchainfortheNamedData Networking paradigm. The blockchain increases the trust between the sites as well as the decentralizedarchitectureishighlyuseful in overcoming failure.Thedrawback oftheproposedscheme is that it has not been evaluated extensively for its feasibility in reducing the NDN cache pollution. S. Wang explains that therehasbeena veryfastdevelopment of cryptocurrency in recent years, which has led to detailed scrutiny of the paradigm. This has uncovered a lot of irregularities in the paradigm such as the Smart Contracts that have been the cause of “The DOA Attack” which has resulted in a huge loss. Therefore, the authors have presented a comprehensive and systematic review of the smart contracts in the blockchain paradigm. The authors have presented a six-layer architecture for smart contracts for increasing the security of the system. The authors have not implemented a formal verification which can provide confidence. Y. Xu introduces the concept of decentralized storage that is based on the blockchain framework.Theblockchainisoneof the most innovative concepts that can be used to design a highly secure decentralized framework. The authors have proposed section blockchain protocol, which aims to eliminate the storage problem that is encountered incertain devices. The proposed methodology is highly resilient to failure due to the decentralizedarchitecture,aswell as,ithas the ability to withstand heavy loads and optimization gracefully due to the implementation of the Blockchain paradigm. M. Marchesi in his keynote speech details the rapid development and ongoing researches going on in the field of blockchain. This is due to the increased attention to this paradigm and increased demand in this sector. The author indicates that this increased pressure on a nascent framework has led to an increase in security lapses that are evident in the various different incidents on the Ethereum platform and the cryptocurrency exchanges.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 205 That being said the speaker also highlighted the immense opportunities that can be utilized by using the blockchain paradigm such as the Blockchain tokens that can be used to implement a reward and penalty-based scheme for developers. A. Maksutov elaborates on the paradigm of Blockchain and its uses. The authors have proposed an innovative concept for the detection and identification of various money laundering schemes that use the blockchain framework for their nefarious activities. The proposed methodology has been used to deanonymizing the transactions and tracking the coin join transactions, which allows the authors to evaluate user participation. All of this information is used to determine if the transactions are being fraudulentorused to launder money. F. Wessling states that the addition of blockchain to existing platforms is problematic as it is different from building the applications from scratch by incorporating the Blockchain into the application. The authors determine the amount of blockchain required for various different implementations, this is done by analyzing the attributes of blockchainsuchas anonymous, trustless and immutable, etc. The authors have outlined the various different processes that utilize various different elements of the blockchain technology that can be implemented based on the specific application and use case of the application. J. Wang explains that most of the applications based on crowd sensing gather a huge amount of data by using pervasive smartphone users to provide the data.Butmost of the time the users are not compensated enough for their contribution to the system. Therefore, the authors have presented an innovativeframework fora privacy-preserving reward and penalty scheme that rewards the users for contributing to the large data sensing paradigm using the trustless and secure blockchain. The major drawback of this paper has been that the authors have not discussed the solutions for a possible collusion attack. S. Pandey introduces the benefits of utilizing the Blockchain paradigm for its security and decentralizedarchitecture.The author states that there has been a jump in the number of researches is going on in this field and there has been increased interest in implementing the blockchain framework to make existing systems resilientandsecure. To this effect, the authors have formulated an ingenious and practical simulation tool for planning,stability,anddesignof the systems and applications as well as networks in a blockchain environment. TheBlockSIMisanopensource and comprehensive solution for all the Blockchain simulation needs. The major drawback is that the authors have not modeled the internet latency that would affect the accuracy of the simulation. 3. SYSTEM OVERVIEW DIAGRAM 4. CONCLUSION In this paper there have been some related works that have utilized the Public health record database and techniques to achieve various different approaches and to identify their flaws and shortcomings. There have been various methodologies that have been proposed by a plethora of authors each offering a unique technique to Public Health Record management. This has influenced our approach drastically and helped and enabled us to propose a secure and efficient Public Health Record management system that uses the Blockchain Paradigm. The Blockchainisuseddueto its inherent nature of being resilient to changes and tampering, this is utilized to provide an effective Access control Mechanism that can help restrict the leakage of valuable sensitive data of the patients in the Public Health Records. The methodology discussedwill beimplemented in the upcoming researches. REFERENCES [1] S. Yu, K. Lv, Z. Shao, Y. Guo. J. Zou and b. Zhang, “A High- Performance Blockchain Platform for Intelligent Devices”, 1st IEEE International Conference on Hot Information- Centric Networking, HotICN, 2018. [2] R. Wang et al, “A Privacy-Aware PKI System Based on Permissioned Blockchains”, IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), 2018. [3] C. Ehmke, F. Wessling and C. Friedrich, “Proof-of- Property – A Lightweight and Scalable Blockchain Protocol”, ACM/IEEE 1st International Workshop on EmergingTrends in Software Engineering for Blockchain, 2018. [4] R. Wang et al, “A Video Surveillance System Based on Permissioned Blockchains and Edge Computing”, IEEE International Conference on Big Data and Smart Computing, BigComp, 2019. [5] J. Lou, Q. Zhang, Z. Qi and K. Lei, “A Blockchain-based key Management Scheme for Named Data Networking”,
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 206 Proceedings of 2018 1st IEEE International Conference on Hot Information-Centric Networking, HotICN 2018. [6] S. Wang L. Ouyang et al, “Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends”, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019. [7] Y. Xu, “Section-Blockchain:AStorageReducedBlockchain Protocol, the Foundation of an Autotrophic Decentralized Storage Architecture”, 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), 2018. [8] M. Marchesi, “Why Blockchain Is Important for Software Developers, and Why Software Engineering Is Importantfor Blockchain Software”, International Workshop on Blockchain Oriented Software Engineering (IWBOSE),2018. [9] A. Maksutov et al, “Detection of Blockchain Transactions Used in Blockchain Mixer of Coin Join Type”, IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2019. [10] F. Wessling et al, “How Much Blockchain Do You Need? Towards a Concept for BuildingHybridDAppArchitectures”, ACM/IEEE 1st International Workshop on EmergingTrends in Software Engineering for Blockchain, 2018. [11] J. Wang et al, “A Blockchain-based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications”, IEEE Access, 2018. [12] S. Pandey et al, “BlockSIM: A practical simulation tool for optimal network design, stability, and planning”, IEEE International Conference on BlockchainandCryptocurrency (ICBC), 2019.