Abstract: There is a distributed ledger system known as the block chain, in which transactions between nodes are recorded in the ledger. A new block chain address is shared by nodes connected to the blockchain. Transactions are organised into blocks, each of which contains information on the transactions that have occurred since the block was created. Every block contains information on the sender, receiver, the previous exchange in the hash configuration, and the current transaction. Mining nodes running a consensus agreement mechanism verify and add blocks to the block chain. An application for general-purpose use based on an attribute-based access control approach has also been demonstrated. The system's high level of openness will be appreciated by both users and resource owners. The strategies proposed worked well in a case study of autonomous digital libraries. Larger comprehension and greater demand for changing requirements are the results of improved intelligence in the processing and transportation of data under a transaction, which is made possible by Blockchain in networks, as well as increasing demand for changing needs. According to a poll conducted by a third-party communication service provider, data consumers are increasingly relying on digital content such as images, movies, and real-time streaming. So the current infrastructure must be dynamically redesigned so that it can adapt to changing market conditions as they arise. Internally, this alteration is linked to the locations where the data can be viewed on the Internet, as well as the manner in which it is shared or made available. There is also a built-in communication address on the data line, which can be used to identify the information that is being conveyed. 5 claims & 4 Figures
Description: Field of Invention
One of these systems is the Blockchain technology. It is common practise to use the Blockchain as a "trail-to-trace" tool for tracing down transactions. This includes Bitcoin, which has become the most talked-about word of the millennium: The usage of an unpresidential currency of any nation is used to bind the currency of the recipient nation or country to the rules of the unpresidential currency of that nation or country. Larger comprehension and greater demand for changing requirements are the results of improved intelligence in the processing and transportation of data under a transaction, which is made possible by Blockchain in networks, as well as increasing demand for changing needs.
Background of the Invention
According to the authors, a patient-centric healthcare data sharing paradigm is more efficient than present systems. Patients control who has access to their personal data under the PCHR approach. Enigma's decentralised computing architecture balances anonymity, compute, and data storage to achieve privacy and scalability. The platform separates data into unintelligible bits, and each node gets one. Unlike the blockchain, it does not require every node to replicate and compute data. However, an external blockchain supervises the system, restricts access, and serves as an immutable record of occurrences. Third-party administrators can now be eliminated utilising Zyskind and colleagues' blockchain technology. As a result, consumers may now select who has access to their data. The technique worked by storing encrypted data off-chain and storing a pointer to it on the Bitcoin network. The system's blockchain component is in charge of data sharing and querying. In this case, Medical Rec is a blockchain-based medical records access control solution. Medrec leverages Ethereum technology to create its own coin by altering the mining process. To encourage medical stakeholders to join the system and verify transactions, the platform uses a mining process that pays miners. Xia and colleagues devised an architecture for transporting electronic medical data housed in cloud repositories. It is built on a permissioned blockchain, so only allowed users can access it, and their cryptographic keys must be verified first. Based on the design of our blockchain, it is lightweight and scalable.
[WO2017090041A1] is method for executing cryptographically secure transactions in a network with a public ledger, which includes associating at least a first proposed transaction with a public keys smart contract and associating at least a second transaction in said network with a cryptographically secure transaction.
[US20170011460A1] Secure buying and selling system that conducts protection transactions on a disbursed blockchain ledger. Cryptographic wallets are presented to customers, letting them get admission to a peer-to-peer community of computing nodes wherein the disbursed blockchain ledger is administered. The securities made to be had thru the community may be right away saved at the blockchain ledger. Smart contracts may be used to switch securities among customers and to make sure that each one transaction is compliant with regulatory requirements and different constraints.
[US20150379510A1] The implementation of block chain infrastructure for information switch allows a brand new magnificence of commercial enterprise techniques that permit for the safety of private statistics even as imparting get entry to to actionable information and setting up a honest and obvious marketplace for information manufacturers and information consumers via using redundant dispensed ledgers of transactions on peer to look networks.
Summary of the Invention
The fundamental purpose of this thesis and research is to design and create an intelligent P2P file-sharing infrastructure within a Blockchain framework. Since its inception in the early 2000s, the Internet has grown dramatically and now incorporates practically every element of networking and communication. Propose an Internet of Things (IoT) architecture that is interconnected with the Blockchain in order to secure devices from tampering threats. In order to securely share data while respecting the privacy of its users, the Inter Planetary File System and Block Chain will be used in conjunction. In order to detect malicious nodal behaviour in an IoT network, a block chain-based system model has been developed. BS, GH, and simple nodes make up the network participants. The DEEC-GA protocol is used to select the GH. Nodes are added to the group by the group leader and a smart contract is executed by the GH. BS and GH keep track of all communications in the form of transactions, which are thereafter available to the public. It is BS's responsibility to publish smart contracts and sensor data processing. BS keeps track of every transaction, including the Group Head ID and location, in its own database. The BS data can only be accessed by the GH node using its private key if it has been granted access. As an arrangement mechanism, Proof of Work (PoW) is used to approve the exchange at GH and BS. The GH node runs the smart contract, authenticates basic nodes, identifies and removes dead nodes and misbehaving nodes, and validates the transaction.
The system's architecture involves customers, suppliers, and distributors. The Consortium Block Chain Network now has two nodes. The IPFS system generates a hash index that is maintained by the Data Manager and Admin Nodes. It talks with other block chain members and processes their requests. It retrieves data from IPFS and provides it to the requester. The three layers are perception, block chain network, and application. The perception layer delivers raw drug data collected by a QR code reader. The Block Chain Network Layer includes the Manufacturer, Retailer, Logistics, Supplier, Distributor, Consumer, Admin, and Data Manager Nodes. This layer provides application layer services to users.
Brief Description of Drawings
Figure 1: Architecture of Smart contracts
Figure 2: System architecture based on block chain
Figure 3: internal system flow of proposed method
Figure 4: Proposed Network Topology Architecture
Detailed Description of the Invention
The blockchain connects the entity requesting access to a resource to the entity maintaining it. The system has two main components. For the first component, permissioned blockchains are employed to store and query access control attributes. A permissioned blockchain uses smart contracts to keep data secure and track access control. The three main smart contracts are PIP, PAP, and PDP. PIP's JavaScript Object Notation data format stores user and resource attributes as JSON. Aside from checking for write conflicts and changing characteristics, the PIP is also in charge of maintaining the database. There's also a PAP contract that is responsible for keeping policies up to date and maintaining them. Multiple PAPs run by various organisations can be included into the system. A single PAP can still distribute the trust and accountability of these access policies because to the openness provided by this method. An access decision is made based on the PDP contract's evaluation of policies.
There are three digital library service providers in this scenario. For the sake of their registered users, libraries A and B are interested in integrating their services. Setting up a consortium is the first step in the process. Once the network configuration has been established, channel 1 will be set up automatically. It's a peer contribution. ABAC system chaincodes will be deployed on both peers and defined on Channel 1. Only Channel 1 members will have access to the ledger. Fabric membership service allows for granular network access. This diagram depicts the application's current network topology. Peers (org1 and org2) connect the two organisations via Channel 1. (peer0.org1 and peer0.org2). I've tested it with two different services. Three orderer nodes can arrange rafts (ordered 0, orderer 1, orderer 2). In Raft, one out of three nodes can fail. Kafka is built on two orderer nodes (orderer 0 and orderer 1). The fundamental purpose of this thesis and research is to design and create an intelligent P2P file-sharing infrastructure within a Blockchain framework. Since its inception in the early 2000s, the Internet has grown dramatically and now incorporates practically every element of networking and communication.
Propose an Internet of Things (IoT) architecture that is interconnected with the Blockchain in order to secure devices from tampering threats. In order to securely share data while respecting the privacy of its users, the Inter Planetary File System and Block Chain will be used in conjunction. The system's architecture involves customers, suppliers, and distributors. The Consortium Block Chain Network now has two nodes. The IPFS system generates a hash index that is maintained by the Data Manager and Admin Nodes. It talks with other block chain members and processes their requests. It retrieves data from IPFS and provides it to the requester. The three layers are perception, block chain network, and application. The perception layer delivers raw drug data collected by a QR code reader. The Block Chain Network Layer includes the Manufacturer, Retailer, Logistics, Supplier, Distributor, Consumer, Admin, and Data Manager Nodes. This layer provides application layer services to users.
According to a poll conducted by a third-party communication service provider, data consumers are increasingly relying on digital content such as images, movies, and real-time streaming. So the current infrastructure must be dynamically redesigned so that it can adapt to changing market conditions as they arise. Internally, this alteration is linked to the locations where the data can be viewed on the Internet, as well as the manner in which it is shared or made available. There is also a built-in communication address on the data line, which can be used to identify the information that is being conveyed.
As an arrangement mechanism, Proof of Work (PoW) is used to approve the exchange at GH and BS. The GH node runs the smart contract, authenticates basic nodes, identifies and removes dead nodes and misbehaving nodes, and validates the transaction. The system's architecture involves customers, suppliers, and distributors. The Consortium Block Chain Network now has two nodes. The IPFS system generates a hash index that is maintained by the Data Manager and Admin Nodes. It talks with other block chain members and processes their requests. It retrieves data from IPFS and provides it to the requester. The three layers are perception, block chain network, and application. The perception layer delivers raw drug data collected by a QR code reader. The Block Chain Network Layer includes the Manufacturer, Retailer, Logistics, Supplier, Distributor, Consumer, Admin, and Data Manager Nodes. This layer provides application layer services to users.
Figure 1 explain the set of smart contracts which are used to secure the data before sharing
Figure 2 depicts the details of the smart contracts that have been deployed. I've used Hyperledger Fabric as the blockchain technology to address these issues. There must be at least two endorsing nodes from separate organisations in the blockchain. Smart policies are carried out by these nodes. The systems represented in figure 3 would be the clients of this system. Figure 4 represents the network topology used in proposed system.
5 Claims & 4 Figures , Claims:
The scope of the invention is defined by the following claims:
Claim:
1. The Secure file sharing using the Blockchain technology and Smart Contracts writing comprising the steps of
a) When it comes to data storage in the Block Chain, IPFS is used.
b) Gas consumption is used to monitor the transaction and execution costs of the Smart Contract functions such as the deployment of nodes, the authentication of nodes, user enrollment, user exit, and the deletion of users.
c) Data trust is a new concept that forces data users to be transparent about how they share and reuse their personal data.
d) Data trust comprises legal, ethical, governance, and organisational factors, as well as technical criteria.
2. The Secure file sharing using the Blockchain technology and Smart Contracts as claimed in claim1, The IPFS system generates a hash index that is maintained by the Data Manager and Admin Nodes. It talks with other block chain members and processes their requests. It retrieves data from IPFS and provides it to the requester.
3. The Secure file sharing using the Blockchain technology and Smart Contracts as claimed in claim1, Gas consumption is used to monitor the transaction and execution costs of the Smart Contract functions such as the deployment of nodes, the authentication of nodes, user enrollment, user exit, and the deletion of users.
4. The Secure file sharing using the Blockchain technology and Smart Contracts as claimed in claim1, Data trust is a new concept that forces data users to be transparent about how they share and reuse their personal data.
5. The Secure file sharing using the Blockchain technology and Smart Contracts as claimed in claim1, Data trust comprises legal, ethical, governance, and organisational factors, as well as technical criteria.
| # | Name | Date |
|---|---|---|
| 1 | 202241025428-REQUEST FOR EARLY PUBLICATION(FORM-9) [30-04-2022(online)].pdf | 2022-04-30 |
| 2 | 202241025428-FORM-9 [30-04-2022(online)].pdf | 2022-04-30 |
| 3 | 202241025428-FORM FOR SMALL ENTITY(FORM-28) [30-04-2022(online)].pdf | 2022-04-30 |
| 4 | 202241025428-FORM 1 [30-04-2022(online)].pdf | 2022-04-30 |
| 5 | 202241025428-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [30-04-2022(online)].pdf | 2022-04-30 |
| 6 | 202241025428-EVIDENCE FOR REGISTRATION UNDER SSI [30-04-2022(online)].pdf | 2022-04-30 |
| 7 | 202241025428-EDUCATIONAL INSTITUTION(S) [30-04-2022(online)].pdf | 2022-04-30 |
| 8 | 202241025428-DRAWINGS [30-04-2022(online)].pdf | 2022-04-30 |
| 9 | 202241025428-COMPLETE SPECIFICATION [30-04-2022(online)].pdf | 2022-04-30 |