2022
DOI: 10.3390/s22145100
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Private File Storage-Sharing Method Based on IPFS

Abstract: Under the current national network environment, anyone can participate in publishing. As an important information resource, knowledge files reflect the workload of publishers. Moreover, high-quality knowledge files can promote the progress of society. However, pirated inferior files have the opposite effect. At present, most organizations use centralized servers to centrally manage the knowledge files released by users. In addition, it is necessary to introduce an untrusted third party to examine and encrypt t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(11 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…In Mantey et al ( 1 ), the authours used a private IPFS network ( 4 ) and a permissioned blockchain in their system. To summarize their approach, EHR is stored in the decentralized P2P storage, and patients control access to their EHR through immutable blockchain.…”
Section: Discussionmentioning
confidence: 99%
“…In Mantey et al ( 1 ), the authours used a private IPFS network ( 4 ) and a permissioned blockchain in their system. To summarize their approach, EHR is stored in the decentralized P2P storage, and patients control access to their EHR through immutable blockchain.…”
Section: Discussionmentioning
confidence: 99%
“…However, the system did not take into account the change of some privileges of users in the future or their suspension. [19] This study included the proposal of a group of applications in which the blockchain can be crucial as a notary, as this application relied on the blockchain in the process of issuing certificates associated with files as a guarantee of the existence of these files first, and then confirming their integrity and non-tampering, as well as determining ownership accurately. In the blockchain and based on cryptographic hashes file to provide proof of publication, it is possible to establish a new level of notary time stamping.…”
Section: Blockchainmentioning
confidence: 99%
“…Therefore, by exploiting smart contract compatibility, the implementation of a private IPFS with defined trusted parties in a permissioned manner is the most secure, as in DAC. This approach is similar to the one in the paper [137], with some changes that users have the opportunity to erase or modify their off-chain stored data from the database. Therefore, the execution component is supplemented with a data management component to implement the necessary functionalities.…”
Section: Analysis 81 Data Managementmentioning
confidence: 99%