Avoiding Data Piracy in Artworks using Blockchain
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 3
Abstract
With the tremendous development of internet, we can share any media from anywhere in the world. This paved the way for data sharing illegally “ pirated versions of data shared among persons. In our proposed system, the original data (use case taken “ Song) will be embedded with a hash value (SHA-256) and then deployed to Inter Planetary File System (IPFS) and shared through Ethereum Blockchain, enabling deployed data unaltered. The IPFS returns a 46-bit length hash for each of the file being upload. Usage of Ethereum blockchain ensures each and every transaction cryptographically hashed and logged. Also, the data deployed on IPFS sharable but with hidden hash identity for each of it, which is not known by the person who gets that data. The owner of the original data thus shares the data and will be having the log maintaining hash identity for each of the person to whom the data owner shares. The IPFS storage enables Peer to Peer (P2P) data transfer through decentralized network. The person will be given the IPFS hash to download the data. When the data if pirated is known to the owner, he computes the hash value from the pirated version and identifies the person pirated that data and avoids sharing data to that person next time Arun Kumar G | Hariharan A | Ms D Sasikala"Avoiding Data Piracy in Artworks using Blockchain" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11244.pdf http://www.ijtsrd.com/engineering/computer-engineering/11244/avoiding-data-piracy-in-artworks-using-blockchain/arun-kumar-g
FPGA Implementation of Real Time Video Edge Detection by Using Different Filter
As another innovation created based on picture and video handling, moving item following and perceiving is one of the essential research subjects in application fields, for example, PC vision, mechanical autonomy and vid...
Design and Implementation of a Web-Based Prisons Management and Police Investigation System
Information Technology (IT) has cut across all the areas of our society. In the light of this, I studied the Management Information System for Nigerian Prisons Service, Afara, Umuahia, Abia State with the aim of developi...
A Study on Security in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) present myriad application opportunities for several applications such as precision agriculture, environmental and habitat monitoring, traffic control, industrial process monitoring and co...
Investigating the Designs of Wind Turbine Blades
The performance of a wind turbine is always a matter of discussions and the topic has been a keen interest to be researched and present more efficient solutions to the evident problems. The performance depends on so many...
Proton Beam Therapy for Prostate Cancer An Overview
Patients diagnosed with localized prostate cancer have many curative treatment options including several forms of advanced conformal Radiotherapy. Proton radiation is one such radiation treatment modality and, due to its...