Conference PaperPDF Available

IPFS-Blockchain-based Authenticity of Online Publications

Authors:

Abstract and Figures

In this paper, we propose a solution to provide originality and authenticity of published and posted freely online digital content such as books, music, and movies. Our solution utilizes a blend of newly emerging technologies that prima-ry include (InterPlanetary File System) IPFS and blockchain smart contracts. IPFS is used to store digital content with a high integrity and global accessibility to all, and Ethereum smart contract is used to govern, manage, and provide trace-ability and visibility into the history of digital content from its origin to the latest version, in a manner that is decentralized and globally accessed with high integrity, resiliency, and transparency. In the paper, our solution is focused on online book publication, but the solution can be a framework that can be easily extendible and adoptable for, to other digital and multimedia content. The full code of our smart contract is provided, with discussion on implementation and testing of its key functionalities.
Content may be subject to copyright.
IPFS-Blockchain-based Authenticity of Online
Publications
Nishara Nizamuddin, Haya R. Hasan, Khaled Salah
Department of Electrical and Computer Engineering
Khalifa University of Science, Technology and Research
Abu Dhabi, UAE
{nishara.nizamuddin,haya.hasan,khaled.salah}@kustar.ac.ae
Abstract. In this paper, we propose a solution to provide originality and authen-
ticity of published and posted freely online digital content such as books, music,
and movies. Our solution utilizes a blend of newly emerging technologies that
primary include (InterPlanetary File System) IPFS and blockchain smart con-
tracts. IPFS is used to store digital content with a high integrity and global acces-
sibility to all, and Ethereum smart contract is used to govern, manage, and pro-
vide traceability and visibility into the history of digital content from its origin to
the latest version, in a manner that is decentralized and globally accessed with
high integrity, resiliency, and transparency. In the paper, our solution is focused
on online book publication, but the solution can be a framework that can be easily
extendible and adoptable for, to other digital and multimedia content. The full
code of our smart contract is provided, with discussion on implementation and
testing of its key functionalities.
Keywords: Ownership Authenticity, Originality, Online Publishing, Blockchain,
Ethereum, Smart Contracts.
1 Introduction
The Internet and the digital era have unleashed the unique access to information.
With the increased ease in information access and sharing, the authenticity of freely
posted and published digital materials is always questionable. The authenticity of digi-
tal content is a major challenge for today’s online book publishing industry, and digital
content in general, as those of multimedia, movies, music, etc. Digital content, available
on the internet, during its lifetime can be modified, copied, reproduced, translated into
different languages, re-published, and reformatted. There is an immense need for an
appropriate authenticity with the ability to trace and track the publication history of
posted online material to the original author, writer, or artist, with high degree of trust,
credibility, and integrity.
2
In practice, a hardcopy manuscript of a book or newspaper article can be printed,
scanned, digitized, and translated into different languages—resulting in multiple ver-
sions of the original manuscripts which were published by different publishing entities
or individuals. That is, digital content available across various resources such as online
journals, e-books, and websites can indeed be subjected to illegitimate alteration that
ultimately leads to tainted information access. Also, there is a lack of a strict audit to
ensure that the digital book is verifiable, complete and accurate. While e-book is col-
lated and printed from diverse sources, the authenticity and integrity of digital asset is
at stake.
Problem Statement. To date, there exists a lack of authenticity and integrity of dig-
ital content made available online. Freely posted and published online digital contents
are not tampered-proof and their publication history cannot be easily tracked in a cred-
ible, trusted, open, and decentralized manner. As shown in Figure 1, a book can be
published, and re-published by different publishing entities, and thus producing multi-
ple versions of the original book. The book is originally written by the author which
can be made available to public users via various resources such as handwritten manu-
script, physical print media, e-books and Internet sources. The credibility of a digital
document cannot be checked at any point as the publishers are not accountable for the
content published. Furthermore, the readers are totally unaware about the accuracy and
authenticity of the available e-book. Typical readers usually accept the online versions
of digital manuscripts despite being tampered with.
Figure 1 shows the traditional way of public readers accessing digital assets of e-
books from available resources. The original work of the author undergoes various
stages of publication process before it reaches the end user i.e., the readers. Typically,
author writes the book and chooses a main publisher to submit his original work. The
main publisher is granted the publishing permission from the author. Figure 1 illustrates
the scenario where secondary publishers (P
1
, P
2
…P
n
) request for publishing permission
in different versions from the main publisher. The main publisher P grants permission
to the requesting publishers upon agreeing to the terms and conditions are accepted by
both the parties. The same book can have many editions and versions with different
versions being translated in many languages. In today’s book publishing industry, a
certain online book version cannot be traced back to an original author, as information
is usually defragmented and not available to all readers to verify and examine the au-
thenticity and originality of published content.
3
Fig. 1. Production of different versions of an online book through various publishers
Blockchain is a newly emerging and disruptive technology that can be key in provid-
ing a solution to authenticity of digital materials. Blockchain is the underlying technol-
ogy of the cryptocurrency bitcoin, but now is seen as a distributed ledger that can be
accessed globally by anyone to verify stored data and content, with high integrity, re-
siliency, credibility, and above all traceability [1]. All of this is done in de-centralized
manner and without intermediaries. Later, Ethereum smart contracts provided the abil-
ity to upload and execute code that carries out business logic to the blockchain [2,3].
The smart contract code resides on a blockchain as multiple functions with unique ad-
dresses that can be called by any user of the blockchain.
Blockchain, however is an expensive medium for data storage, especially for large
data and digital content. For efficient storage of large data and content, we propose
using IPFS file system. IPFS stands for Inter-Planetary File System [4], which is a dis-
tributed, decentralized file system and a platform to store data and files with high in-
tegrity and resiliency. Fundamentally, IPFS is a peer-to-peer, open source, content ad-
dressable globally distributed file system that can be used for storing and sharing large
volume of files with high throughput. Our proposed solution makes use of both block-
chain smart contracts and IPFS, whereby the digital contents are stored on the IPFS and
the IPFS hashes are stored into the blockchain smart contracts to provide traceability
and authenticity. Specifically, the hash generated on storing the documents to IPFS, can
be stored in the smart contracts effectively and documents can be accessed using the
hash. If there is any change in the content of the digital document, the hash changes, to
show that the original content was modified and altered.
In this paper, we propose a combined IPFS-blockchain-based solution to solve the
authenticity and originality of digital content posted freely on the Internet. In the paper
we show how this problem can be solved for online published books, but our solution
can be extended and adopted for, to other digital and multimedia content. We show how
4
our solution has the ability to trace and track the digital content, with its different pub-
lished versions, back to the certified true copy created by the original author. The main
contributions of this paper can be summarized as follows:
We propose an IPFS-blockchain-based solution and framework for providing
authenticity of published online books and digital content. Our solution provides
decentralized storage and governance with different versions of the original
book being stored, tracked, and traced with high integrity, and resiliency.
We present and discuss the system design and architecture, along with sequence
diagrams to illustrate the interactions among participants which include author,
main publishers, secondary publishers, and readers.
We provide the full code of the smart contract, and discuss key implementation
and testing details to demonstrate the proper operations and functionality of the
overall system.
The remainder of this paper is organized as follows. Section 2 summarizes the re-
lated work. Section 3 presents our proposed solution for improving authenticity of
online books. Section 4 describes key aspects of the implementation and testing of the
smart contract. Section 5 concludes the paper.
2 Related Work
In this section, we provide a brief background on the existing approaches found in the
literature related to authenticity and originality of books in the publishing industry us-
ing blockchain technology. Ericsson [5] proposes a blockchain-based system for track-
ing the origin of digital assets. It is by converting the digital content and books into a
binary file and to store the hash on blockchain. This hash is stored generally with an
identifier for the owner. The paper focusses on the idea that ownership can be verified
by checking the integrity of digital assets at any point of time. This is achieved through
the verification by a centralized unit for security of digital documents such as Security
Operations Center (SOC) to estimate the legitimacy of digital assets. But the system
itself deviates from the decentralized concept as it operates in the presence of a central-
ized security unit and has a precarious state for breach of integrity. Moreover the file
storage is done on a centralized server which can be a single point of failure, corruption,
hacking or compromise.
Gaetani et al [6] propose a verification ID which can be used for blockchain-based
authenticity of digital assets. This ID is inherently a digital block on the blockchain that
can be used for verification of the e-document. That is, whenever an ID is added to the
blockchain, an identification certifying service combines the public key with the
owner’s ID and transfers the ownership of the private key to the user. A blockchain
centered handshake mechanism is employed to ensure authenticity of the e-document.
But this method suffers detrimental effect as it is purely based on the trust factor on the
requesting entity. As the identity of the requesting body is not always reliable in the
5
digital world, the system is not stable enough to provide a secure storage and access of
documents online.
The author in [7] proposes a blockchain-based model for publishing online books
and for providing integrity of the digital document. The author achieves authorship by
storing the book/file hash and the owner’s name in pairs. The author argues that by
storing the hash of the file and the block timestamp as pairs, integrity of the docu-
ment/file can be proved. If the content of the file was modified, then its hash will
change, and the smart contract won’t be able to access the file, therefore proving that
the file content was modified. Sun et al. [8] describes a framework for evaluating the
trust issues when storing online documents in decentralized networks.
In this paper,
authors present a framework to quantitatively measure trust, model trust propagation,
and defend trust evaluation systems against malicious attacks. This system was used to
secure adhoc routing and support to unmask malicious node in a decentralized environ-
ment but is not yet implemented as a real-world application.
The authors in [9] propose a blockchain-based personal data management system to
ensure that document owners have complete authority over their asset. This model fea-
tures a blockchain-based automated online document access control system thereby
eliminating trust in a third party. Blockchain and off–blockchain storage is combined
to construct a management platform which precedes to trust based computing. But the
work does not describe about the feasibility of storing larger files. Morgan [10] presents
the idea of using blockchain technology to prove the existence of a document using the
timestamping concept. The author discusses a method where the document is presented
to a site which in turn converts the document into a cryptographic hash. The hash gen-
erated represents the content of the document. If the original document is presented,
same hash will be generated, notifying that the document is authentic. However, if there
is any modification of content, the newly generated hash will not match with the previ-
ous hash. The legitimacy of the document can be verified, but this system is not focused
about the authority of the owner on his/her document.
Acronis Notary system described in [11] is a blockchain-based notary service which
aims at providing a solution for timestamping digital documents. As blockchain is a
very expensive storage medium for storing large documents, the proposed approach is
to send file hashes to the Notary service. This service calculates hash value, based on
the received file hashes and saves the new hash obtained, on the Ethereum network. A
verification certificate is provided specifying the technical details of the document.
Whenever the document is reflected in user interface, it is shown as ‘notarized’ or ‘cer-
tified’ by Acronis. By doing so, the system gives an assurance to the user that the online
document is identical to the original version, on a bit-by-bit basis. This method supports
providing notarization for document authenticity and a certification that an e-book ex-
isted at some point of time in the chain. But it doesn’t clearly state about the author’s
rights to claim the ownership of digital book in the decentralized environment.
6
3 Proposed Solution
Our solution is based on using IPFS and smart contracts of Ethereum blockchain. IPFS
is used to store the digital content (of the e-book or multimedia files) in a decentralized,
distributed manner that is publicly and globally accessible by all through the use of
IPFS hashes. This IPFS hash is used by the smart contract of Ethereum blockchain to
ensure integrity, originality, and authenticity. The hash value remains the same if the
content of the document or e-book remains intact. If there is an alteration of content
during the publication stages, the IPFS hash for the book changes, and would then not
match the hash stored within the smart contract. Therefore, each participating entity can
track back, and verify the accuracy and history of e-books being stored in the file system
and be assured that the book accessed is a legitimate copy of the author’s work.
3.1 System Architecture and Design
Figure 2 illustrates the overall system architecture and design for automating the online
books authenticity, originality, and integrity using IPFS and Ethereum smart contracts.
The proposed solution uses smart contracts to trigger events that are logged to notify
the participating parties to keep track of events and transaction details. The figure high-
lights the interactions of the smart contract with main participants that include author,
main publisher P, secondary and other publishers, and readers. The participants of the
smart contract can be summarized as follows:
Fig. 2. An overview of the system architecture for automating the online books authenticity using
IPFS and Ethereum smart contracts.
Author: The author or artist is the person who owns the IP and original work of the
book or digital content. The author creates the smart contract and provides permis-
sion for one or more publishers to publish his digital content. The main publisher is
also involved in validating and notarizing the book content presented to it by the
7
publishers. The publisher gets to upload the content on IPFS, only if the notarization
by author is successful. The author also maintains the original hash of the book.
Publisher: The publisher is the entity which obtains permission from the author to
publish the manuscript content in various sources such as web pages, printed books
and e-books. The main responsibility of a publisher is to maintain the digital content
intact as presented by author. /Also, a publisher uploads the digital content to IPFS
and the IPFS hash is stored in the smart contract with the author’s validation and
verification.
Other and Secondary Publishers: A book can be translated into different languages
and can have different versions or editions produced by different publishers who
produced the book in agreement with the original author or with the main publisher.
Readers: Readers are those who request access for legitimate digital books. The
smart contract provides the readers with trace back functionality to verify the origi-
nality of the book. The readers can access the history of notarizations regarding the
originality, authenticity, and integrity of the book.
In our proposed solution, the author initially writes the book, creates the contract
which includes key attributes about the book to include book title, original hash of the
book and author details. Offline, a main publisher seeks publishing permission from the
author after finalizing publishing terms. The publisher, then requests for an approval
from the original author before uploading the book to IPFS, which returns a hash. The
author then examines the stored IPFS file (with the given IPFS hash) to the original
content submitted to the main publisher. The author concludes that the digital manu-
script is uncorrupted and attests the publisher copy. The author has a list of books he
attested, and also the publishers have a list of book versions attested by them.
Readers or other secondary publishers can also request for content validation history,
to know about authenticity of digital manuscript. Once the book is made available on
the IPFS, a reader or a secondary publisher can request for history of validation proof.
This can be needed to make sure that the document has the notarization of the main
publisher from whom publishing permission was granted and the attestation of the orig-
inal author who validated for the main publisher to publish the content. The smart con-
tract has the ability to display the list of attestations for that the e-book along with the
address of the requesting entity, address of the publisher who provided access for the
document and the address of the original author. The validation history helps to track
and trace back the history of attestation provided for the digital documents.
4 Implementation and Testing
Our smart contract was implemented and tested using Remix IDE http://re-
mix.ethereum.org. In this section, we provide the implementation details and focus
primarily on testing the correct interaction and functionality among system participants.
8
Remix IDE offers rich features that make it possible to test and debug smart contracts
prior to deploying them.
4.1 Implementation Details
The code was written in Solidity using the web browser-based IDE, Remix. There are
three entities participating in the contract, author, publisher, readers / secondary pub-
lishers. Each of the entities has an Ethereum address and can participate by calling
functions within the smart contract at certain time stamps. Figure 3, illustrates the mes-
sage sequence diagram for granting publishing permission with a successful attestation
and a failed attestation by author. It shows the interaction between publisher, author
and smart contract.
Fig. 3. Message sequence diagram showing scenarios of successful validation and a failed vali-
dation.
Figure 4 represents the message sequence diagram for successful and failed trace back
of validation history between the requesting readers or secondary publishers, main pub-
lisher and the author. Figure 4 illustrates the flow of
traceBackHistory()
function
and events
ValidationHistorySuccess
and
FailedValidationHistory
on
successful and failed trace back history of attestations respectively.
9
Fig. 4. Message sequence diagram showing scenarios of successful validation trace back and a
history of failed validation trace back.
Next, we show the important code snippets of our smart contract
.
The smart contract
code is available at
Github
To track the state of publishers and their approval results we
use mapping, which represents a key-value pair. We also maintain a mapping to record
a list of approvals by author and the hash provided by publishers during attestation
process. Figure 5 shows mapping where every Ethereum address points to the address
of publishers who submitted request for approval and hashes provided by publishers.
Figure 5 also shows a mapping which consists of a list of books approved by authors
and a mapping consisting of state of publishers.
Fig.5. Mapping of publishers and books attested by author
1
.
Figure 6 represents constructor
OnlineBooksAuthenticity()
which shows that au-
thor is the owner of contract. It comprises of initialization such as the
authorName
,
bookInformation
and most importantly consists of the original book hash. The state
of contract initially is
NotReady
. The author creates the contract and executes the
Cre-
ateContract()
1
function and invokes
ContractCreated
event.
10
Fig.6. Constructor of the smart contract
OnlineBooksAuthenticity()
code
1
Figure 7 demonstrates the
requestApproval()
function for publisher requesting at-
testation from the author. At this stage, the state of the contract is
Created
and the
publisher state will be
ReadyToSubmit
. The publisher state changes to
Submitted-
ForApproval
and the contract state changes to
WaitingToProvideApproval
. The
event
RequestedForApproval
is triggered and the publisher waits for the approval
results (True/False) from the author.
Fig.7. Smart contract function for publisher requesting attestation from author
1
In this paper, we have considered two scenarios based on the approval results provided
by the author for every publisher requesting an attestation or validation before upload-
ing the book to IPFS. We have considered two other scenarios based on the attestation
history results requested by either readers / secondary publisher. The four scenarios are
as follows:
1. If the book validation results i.e.
provideApprovalResult ()
is “True”, the
transaction is successful, and the smart contract directs the publisher to upload
the authentic book to the IPFS and the book is now freely available for readers
to access.
2. If
provideApprovalResult()
yields “False”, the author does not approve
the online book content as the hash submitted by publisher while requesting for
attestation does not match the original hash of the book which is stored in smart
contract. The change in hash clearly indicates, that the original content was
changed / modified. The author triggers an event soliciting the publisher to
amend the content as per original document and to resubmit for attestation.
3. If the attestation history trace back i.e.
traceBackHistory()
is successful,
the list of attestation made for the book is provided to requesting entity.
4. When
traceBackHistory()
is a failure, it indicates that the book accessed
is not validated and hence the requesting entity is provided with the detail that
the book is not an authentic work of author.
4.2 Testing and Validation
In this section, we test the correctness of the interaction among participants, and the
correct functionality of the overall system. Testing of the smart contract ensured that
the flow of the contract followed the correct sequence, validations and refusals of e-
book submitted were tested correctly and the attestation history tack back functionality
11
executed correctly. In this paper, the smart contract is tested for 4 different scenarios.
Figure 8 shows the various testing scenarios carried out. The first test group is on the
approval from author to publish the book. It is further classified for testing two scenar-
ios – Validation success and Failed Validation. The second test group represents readers
or secondary publishers requesting for attestation history details. Test case 2 has two
scenarios: Successful traceability, and Failed traceability. All the test cases are dis-
cussed in detail in the next subsection.
Fig. 8. Smart contract testing scenarios
4.2.1 Test Case 1
Firstly, we test the smart contract for a successful validation scenario. For testing pur-
pose, we consider the Ethereum address of the author to be
0xca35b7d915458ef540ade6068dfe2f44e8fa733c,
the addresses of publishers
who submit the request for attestation or validation to be
0x14723a09acff6d2a60dcdf7aa4aff308fddc160c
for Publisher1 and
0x4b0897b0513fdc7c541b6d9d7e929c4e5364d2db
for Publisher2. We tested,
as shown in Figure 9, the case when the publisher request for a validation to publish
from the author. The event
RequestedForApproval
is triggered and Publisher1 waits
for the author to attest its content.
Fig. 9. Logs showing event
RequestedForApproval
triggered
1
The original hash of the book is
“QmXgm5QVTy8pRtKrTPmoWPGX-
NesehCpP4jjFMTpvGamc1p”.
Firstly, we test for the scenario of successful attesta-
tion/ validation of book by the author with Publisher1. Upon successful attestation,
events
PermissionGrantedToPublish
and
ValidationSuccess
are triggered and
Publisher1 is granted the permission to upload the book on IPFS. Figure 10 shows the
scenario of successful validation provided to Publisher1 by author.
12
Fig.10. Logs showing a successful attestation
1
4.2.2 Test Case 2
Secondly, we test the smart contract for the scenario of a failed validation with Pub-
lisher2. The validation fails because of change in hash provided by Publisher2 while
requesting attestation to publish. The author refuses approval and asks Publisher2 to
resubmit the document after making the necessary amendment. We tested a case, where
Publisher2 submitted a different hash value -
QmYh1A5qcUXXAxE-
PaVmY7Frgw6rGwyUqE5uc71ThtuoAUM”
. Figure 11 shows that the approval failed,
and the author recommends for amendment of content before resubmitting for attesta-
tion again. Events
FailedApproval
and
ReviseContent
are invoked to notify Pub-
lisher2 to amend the book content.
Fig.11. Logs showing a validation failure with events
FailedApproval
&
ReviseContent
triggered
1
4.2.3 Test Case 3
Next, we tested for successful traceability of the attestation history of the document
with a reader whose Ethereum address is
0x583031d1113ad414f02576bd6afabfb302140225.
The reader requests to
13
prove that the document is the original work of the author and has a notarization proof.
Figure 12 represents the scenario where the validation history of the document is ob-
tained successfully displaying the address of Publisher1 from whom the reader obtained
book access, the address of the original author. Event
ValidationHistorySuccess
is triggered and the smart contract assures the reader that the received copy is a legiti-
mate work. The logs also show that the book was initially attested by author and the
readers can confirm that the received book is authentic.
Fig. 12. Logs showing event
ValidationHistorySuccess
triggered to show the content val-
idation history of the book
1
4.2.4 Test Case 4
Lastly, we test for the scenario of attestation trace back failure with
0xdd870fa1b7c4700f2bd7f44238821c26f7392148,
the
address of the second-
ary publisher who requests for attestation history trace back from another publisher
0x583031d1113ad414f02576bd6afabfb302140225.
Figure 13 shows the testing
results. Event
FailedValidationHistory
is invoked as the attestation is not done
by the actual author. This event indicates that the online book requested by the second-
ary publisher is not attested by the Publisher2 to whom the request for validation history
was made.
14
Fig.13. Logs showing event
FailedValidationHistory
invoked
1
5 Conclusion
In this paper, we have proposed a solution to solve the originality and authorship au-
thenticity of freely published and posted online books and documents using IPFS and
Ethereum smart contracts. Our solution is focused on authenticity of online books, but
the solution in terms of architecture, design, sequence diagram, logics, smart contract
code, and overall aspects are generic enough to be easily extended and used to provide
the originality and authenticity, as well as integrity, to all other forms of digital assets.
We implemented and verified the functionalities of the smart contract code using Remix
IDE. As a future work, we plan to deploy the smart contracts on the real IPFS and
Ethereum network and develop frontend Decentralized Applications (DApps) with dif-
ferent views to authors, main publishers, secondary publishers, and readers.
References
1. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system”. (White paper).
2. K. Toyoda et al., “A Novel Blockchain-
Based Product Ownership Management System
(POMS) for Anti-
Counterfeits in The Post Supply Chain, “in IEEE Access, vol. PP, no.99, pp.
1-1.
3. ‘Ethereum’, http://www.ethdocs.org/en/latest/introduction/what-is-ethereum.html/, last
ac-
cessed 20 December 2017.
4. M. Pors, “Understanding the IPFS White Paper part 2”, https://decentralized.blog/understand-
ing-the-ipfs-white-paper-part-2.html, last accessed 2018/3/18.
5. Ericsson Home Page, Ericsson White Papers – “Industrial Blockchain a
nd Data Integrity”,
https://www.ericsson.com/hyperscale/cloud-infrastructure/data-centric-security/data-integ-
rity-assurance, last accessed 2018/2/16.
6. E. Gaetani , L Aniello, R Baldoni , F Lombardi , A Margheri, and V Sassone,” Blockchain
-
based Database to Ensure Data Integrity in Cloud Computing Environments”, 1
st
Italian Con-
ference on Cyber Security, ITASEC17, pp 146-155, Venice, Italy (2017).
7. N. Prusty, “Building Blockchain projects Develop real-
time practical DApps using Ethereum
and JavaScript”, 1st edition, Packt Publishing Ltd, Birmingham, UK (2017).
15
8. Y. Sun, Z.
Han, W Yu, K.J.R Liu,”A trust evaluation framework in distributed networks: Vul-
nerability analysis and defense against attacks,” INFOCOM 2006. 25th IEEE International
Conference on Computer Communications. Proceedings, pp1-13, Spain (2006).
9. G. Zyskind, O.
Nathan, A Pentland, “Decentralizing Privacy: Using Blockchain to protect
personal data”, Security and Privacy Workshops (SPW), 2015 IEEE Conference Proceedings,
pp 180-184, San Jose, CA, USA (2015).
10. P. Morgan, “Using Blockchain Technology to Prove Exi
stence of a Document”, https://brave-
newcoin.com/news/using-blockchain-technology-to-prove-existence-of-a-document/ last ac-
cessed 2018/2/20.
11. Acronis Inc.
, “Acronis Notary: a new way to prove data authenticity via blockchain”,
https://www.acronis.com/en-us/articles/data-protection, last accessed 2018/2/21.
... Centralized systems, where a single provider stores and controls user data, create massive data silos that are attractive targets for attackers, as evidenced by numerous large-scale breaches [5]. Organizations offering hosted identity management are able to register who does business with whom, which has serious privacy consequences [43]. Federated systems, which allow users to log in to third-party services using an established identity (e.g., "Log in with Google"), offer convenience but still rely on a few powerful identity providers, perpetuating issues of data control and privacy [26,31]. ...
... • Data Storage: uPort uses the InterPlanetary File System (IPFS), a distributed file system, to store identity attributes off-chain [43]. The uPort registry, a smart contract, stores a hash pointing to the user's data on IPFS. ...
Research
-The management of digital identity is a cornerstone of the modern internet, yet existing systems present significant challenges. Centralized and federated models, while widely adopted, create single points of failure, expose users to large-scale data breaches, and limit individual control over personal information. Blockchain, the distributed ledger technology (DLT) that powers cryptocurrencies, has emerged as a foundational technology for a new paradigm: Self-Sovereign Identity (SSI). This model seeks to place the user in complete control of their digital credentials. This paper provides a comprehensive review of the current landscape of blockchain-based identity management systems. We analyze the foundational concepts, including Decentralized Identi-fiers (DIDs) and Verifiable Credentials (VCs), and examine the archi-tectures of prominent platforms such as uPort, Sovrin, and ShoCard. We evaluate the primary benefits, such as enhanced user control and privacy, and critically assess the significant challenges, including scala-bility, usability, governance, and regulatory compliance. The paper concludes by identifying open questions and future directions for research, highlighting the transformative potential and remaining hurdles for the widespread adoption of blockchain-based identity.
... This research [22] highlights a significant gap in the literature regarding effective methods for verifying the authenticity and integrity of digital content, particularly in tracking publication histories and preventing information tampering. The proposed solution addresses these challenges by integrating IPFS and smart contracts on the Ethereum blockchain. ...
Article
Full-text available
The Moroccan Ministry of Justice aims to improve the operation of public justice services and judicial processes by embarking on a digital transformation of the Moroccan justice system, given the large volume of data flows and the complexity of their processing and dispersion. The legal exchange of data is a reality that must be assessed on the assiduity, but it presents several challenges, including the integrity and security of data exchanged between independent parties, which limits the originality of the data and is difficult to confirm. Using the possibility of blockchain technology in decentralization, the Ministry of Justice can manage the demand to change data and knowledge in an extremely secure and transparent way. This document proposes a system based on blockchain and IPFS technology to provide transparency and control over the information exchange process, automate the legal process for road traffic accident victims, and the exchange remuneration data between parties.
... When a smart contract is deployed, it will be running on an Ethereum Virtual Machine (EVM) and is stored on the blockchain network and it can be executed automatically with high security and speed without intermediation costs. IPFS is a peer-to-peer, open-source, content-addressable, globally distributed file system that enables high throughput storage and shares large volumes of data [16]. It is based on distributed hash table technology (DHT). ...
Article
Full-text available
Several countries including Thailand currently face a phenomenon of population aging as a consequence of a combination of increasing life expectancy and a low birthrate. As people age, they may require doctor appointments more often to treat illness or for regular health checkup. This is challenging for some families since caregivers need to work and do not have time to take their parents or senior relatives to go to a medical center. In this research, a framework of a sharing economy platform for a senior transportation service, particularly focusing on the service to a medical center, is proposed and evaluated through the prototype system as a proof-of-concept. Decentralized technology in the form of blockchain, smart contract, and interplanetary file system (IPFS) are integrated with the proposed platform to tackle the challenges of transparency and trust with reviews of the provided service. The study results indicate that a hybrid architecture between a centralized and decentralized system is feasible for the proposed sharing economy platform and the emerging technology of decentralized technology has a great potential to drive the future development of a service review system.
... pon an blockchain network, but simply upon a decentralized network (p.30). In the blockchain context, Dapps consist of a backend, smarts contracts interacting with the blockchain, and a frontend interface including images, videos, and photos, hostable on decentralized storage networks such as IPFS (Interplanetary Files System) (Voshmgir, 2020;p.30;Nizamuddin et al., 2018). Lastly, the term cryptocurrencies depicts software enabling decentralized and disintermediate online transactions using distributed ledger or blockchain technology (Hsieh et al., 2018). Lee characterizes cryptocurrencies by the absence of government or third party monitoring exchanges, a purely digital exchange and a decentralized netw ...
Article
Blockchain technology, an institutional innovation, has been a growing research area in recent years, especially within the information system literature. If it brings along opportunities for entrepreneurs, there is no such thing as a theory of blockchain ventures yet. Blockchain technology drives the emergence of unprecedented types of ventures, with varying degrees of decentralization, both from an infrastructural and organizational perspective. However, there is no consistency regarding the definitions and labels used to refer to blockchain ventures. This paper proposes a definition of blockchain ventures and provides a typology distinguishing four ideal types of blockchain ventures. Our findings reveal that blockchain ventures do not inherently entail either organizational or infrastructural decentralization. They contribute to a better understanding of the diverse nature of blockchain ventures and their implications.
... Users were allowed to share particular data with trusted peers. Nizamuddin et al. (2018) proposed a method for guaranteeing the originality and authenticity of written and uploaded free digital material, such as music, movies, and novels. This approach makes use of a variety of cutting-edge innovations, namely the IPFS (InterPlanetary File System) and blockchain smart contracts. ...
Conference Paper
In education, any technology, including artificial intelligence and data science, is now used. Like the Blockchain technology, which was developed some time ago. It can also be used in education, where we need our data to be secure and immutable. One educational procedure that can be improved with Blockchain technology is the generation, maintenance, and verification of transcripts. Some research has been done on this topic. The majority of the implementations completed to date have been pilot projects. However, large-scale implementation is required to validate its feasibility. This can help us achieve our goal of reducing the use of fake degrees because blockchain is extremely useful in the verification of transcripts due to its features. This system can be used in the Confidential Intellectual Property Information System because the logic is similar but not identical. The university will issue the transcripts to the students, and the students will then be able to view and download their transcripts using their credentials. Every student will have their own personal hash, which they can share with other universities to ensure that the transcript is not a forgery. It will make the verification process more efficient. The advantage of this system will be that if a student loses his/her transcript, he/she does not need to go to the school and then go through all the steps for the reissue purpose. Here IPFS plays significant role for providing decentralized storage and generating file hash through which the transcript will be accessible to him/her at any time. For optimization, Blockchain with integration of IPFS can give us more benefits as compared to using only blockchain because of large memory usage by transcripts.
Article
Full-text available
For more than a decade now, RFID (Radio Frequency IDentification) technology has been quite effective in providing anti-counterfeits measures in the supply chain. However, the genuineness of RFID tags cannot be guaranteed in the post supply chain since these tags can be rather easily cloned in the public space. In this paper, we propose a novel POMS (Product Ownership Management System) of RFID-attached products for anti-counterfeits that can be used in the post supply chain. For this purpose, we leverage the idea of Bitcoin’s blockchain that anyone can check the proof of possession of balance. With the proposed POMS, a customer can reject the purchase of counterfeits even with genuine RFID tag information, if the seller does not possess their ownership. We have implemented a proof-of-concept experimental system employing a blockchain-based decentralized application platform, Ethereum, and evaluated its cost performance. Results have shown that, typically, the cost of managing the ownership of a product with up to six transfers is less than US$1.
Article
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
Understanding the IPFS White Paper part 2
  • M Pors
M. Pors, "Understanding the IPFS White Paper part 2", https://decentralized.blog/understanding-the-ipfs-white-paper-part-2.html, last accessed 2018/3/18.
Industrial Blockchain and Data Integrity
  • Page Ericsson Home
Ericsson Home Page, Ericsson White Papers -"Industrial Blockchain and Data Integrity", https://www.ericsson.com/hyperscale/cloud-infrastructure/data-centric-security/data-integrity-assurance, last accessed 2018/2/16.
Building Blockchain projects -Develop real-time practical DApps using Ethereum and JavaScript
  • N Prusty
N. Prusty, "Building Blockchain projects -Develop real-time practical DApps using Ethereum and JavaScript", 1st edition, Packt Publishing Ltd, Birmingham, UK (2017).
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
  • Y Sun
  • Z Han
  • K J Yu
  • Liu
Y. Sun, Z. Han, W Yu, K.J.R Liu,"A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pp1-13, Spain (2006).
Using Blockchain Technology to Prove Existence of a Document
  • P Morgan
P. Morgan, "Using Blockchain Technology to Prove Existence of a Document", https://bravenewcoin.com/news/using-blockchain-technology-to-prove-existence-of-a-document/ last accessed 2018/2/20.
Acronis Notary: a new way to prove data authenticity via blockchain
  • Acronis Inc
Acronis Inc., "Acronis Notary: a new way to prove data authenticity via blockchain", https://www.acronis.com/en-us/articles/data-protection, last accessed 2018/2/21.