CFP last date
22 July 2024
Reseach Article

An Approach to Storing and Sharing Digitally Signed Documents using IPFS

by Pratham H. Sunnal, Prajodh Pragath Sunder, Pralhad P. Teggi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 29
Year of Publication: 2023
Authors: Pratham H. Sunnal, Prajodh Pragath Sunder, Pralhad P. Teggi
10.5120/ijca2023923039

Pratham H. Sunnal, Prajodh Pragath Sunder, Pralhad P. Teggi . An Approach to Storing and Sharing Digitally Signed Documents using IPFS. International Journal of Computer Applications. 185, 29 ( Aug 2023), 17-22. DOI=10.5120/ijca2023923039

@article{ 10.5120/ijca2023923039,
author = { Pratham H. Sunnal, Prajodh Pragath Sunder, Pralhad P. Teggi },
title = { An Approach to Storing and Sharing Digitally Signed Documents using IPFS },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2023 },
volume = { 185 },
number = { 29 },
month = { Aug },
year = { 2023 },
issn = { 0975-8887 },
pages = { 17-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number29/32875-2023923039/ },
doi = { 10.5120/ijca2023923039 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:21.970989+05:30
%A Pratham H. Sunnal
%A Prajodh Pragath Sunder
%A Pralhad P. Teggi
%T An Approach to Storing and Sharing Digitally Signed Documents using IPFS
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 29
%P 17-22
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There is a long and hectic process involved in getting the documents verified by the higher-ups and the documents undergo a series of changes and modifications before getting the final approval. Our proposed system provides a secure way to exchange, verify, modify, and comment out the changes performed on the document. The process begins with the creation of a digital document by a user. The document is then encrypted and stored on the IPFS. The user can then share the document with other authorized parties by using their unique ID’s. When a party receives the document, they can verify its authenticity and contents using the cryptographic hash of the document stored on the IPFS. If the document meets their requirements, they can then sign and encrypt it using their private key. The signed document is then stored on the IPFS and made available to other authorized parties.

References
  1. “#What Is Ipfs.” IPFS Docs, n.d. https://docs.ipfs.tech/concepts/what-is-ipfs/.
  2. Krishnan, Armin (2020). "Blockchain Empowers Social Resistance and Terrorism Through Decentralized Autonomous Organizations". Journal of Strategic Security. 13 (1): 41–58. doi:10.5038/1944-0472.13.1.1743.
  3. Interplanetary file system (2023) Wikipedia. Wikimedia Foundation. Available at: https://en.wikipedia.org/wiki/InterPlanetary_File_System.
  4. “Reading Your Face: How Does Facial Recognition Work?” ARATEK, n.d. https://www.aratek.co/news/how-does-facial-recognition-work.
  5. Asraa Ahmed, Taha Hasan, Firas A. Abdullatif, Mustafa S. T, Mohd Shafry Mohd Rahim (2019). "A Digital Signature System Based on Real Time Face Recognition". IEEE 9th International Conference on System Engineering and Technology (ICSET 2019), 7 October 2019, Shah Alam, Malaysia. 2 (2): 17-24.doi: 10.1109/ICSEngT.2019.8906410.
  6. Bo Fu, et al. “A Dynamic Resource Management Scheme for Content-Based P2P Networks: A Case Study of IPFS”. IEEE Access, 9:75515-75526, 2021.
  7. Yasmeen shaher Alslman and Anas Abu Taleb, “Exchanging Digital Documents Using Blockchain Technology”, Jordan, 2021.
  8. Aastha Chowdhary, Shubham Agrawal and Dr. Bhawana Rudra, “Blockchain based Framework for Student Identity and Educational Certificate Verification”, India, 2021.
  9. Nikita I. Chesnokov, Denis A. Korochentsev, Larissa V. Cherckesova, Olga A. Safaryan, Vladislav E. Chumakov, Irina A. Pilipenko, “Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation”, Russia, 2020.
  10. Anastacio Antolino Hernández, Juan Carlos Olivares Rojas, “Management of digital documents with encrypted signature, through the use of centralized PKI, and distributed using blockchain for a secure exchange”, Mexico, 2019.
  11. R. P. Pasupulati and J. Shropshire, "Analysis of centralized and decentralized cloud architectures," SoutheastCon 2016, Norfolk, VA, USA, 2016, pp. 1-7, doi: 10.1109/SECON.2016.7506680.
  12. IvanOnTech. “Interplanetary File System Explained - What Is Ipfs?” Moralis Academy, December 16, 2021. https://academy.moralis.io/blog/interplanetary-filesystem-explained-what-is-ipfs.
  13. Doan, Trinh Viet, Vaibhav Bajpai, Yiannis Psaras, and Jörg Ott. "Towards decentralised cloud storage with IPFS: Opportunities, challenges, and future directions." arXiv preprint arXiv:2202.06315 (2022).
  14. Benet, Juan. "Ipfs-content addressed, versioned, p2p file system." arXiv preprint arXiv:1407.3561 (2014).
  15. IvanOnTech. “Interplanetary File System Explained - What Is Ipfs?” Moralis Academy, December 16, 2021. https://academy.moralis.io/blog/interplanetary-filesystem-explained-what-is-ipfs.
  16. Faundez-Zanuy, Marcos. "Biometric security technology." IEEE Aerospace and Electronic Systems Magazine 21, no. 6 (2006): 15-26.
  17. Silicon Mechanics five advantages of IPFS and how to achieve them. Available at: https://www.siliconmechanics.com/news/5-advantages-of-interplanetary-filesystem.
  18. Garcia, A. (2023) What is biometric authentication? Klippa. Available at: https://www.klippa.com/en/blog/information/biometric-authentication/.
  19. Rastogi, Neha. “Biometrics Technology and Its Scope in Future.” Engineers Garage, n.d. https://www.engineersgarage.com/biometrics-technology-and-itsscope-in-future/.
  20. “Patent, #8220;System, and, Method, Digitally, Signing, Documents, Using, Biometric, Data, in, a, Blockchain, or, PKI, #8221;” PatentPC. @PatentPC, January 6, 2023. https://www.patentpc.com/blog/patent-for-system-and-method-fordigitally-signing-documents-using-biometric-data-in-a-blockchain-or-pkius10516538b2.
  21. Editor. “Non-Functional Requirements: Examples, Types, How to Approach.” AltexSoft. AltexSoft, February 12, 2020. https://www.altexsoft.com/blog/nonfunctional-requirements/.
  22. “Why Python Is the Best Programming Languages for Web Development.” Probytes Web Development Company, June 11, 2018. https://www.probytes.net/blog/python-web-development/.
  23. “Introduction to Flask.” Introduction to Flask - Python for you and me 0.5.beta1 documentation, n.d. https://pymbook.readthedocs.io/en/latest/flask.html.
  24. Cobb, Michael. “What Is the RSA Algorithm? Definition from Searchsecurity.” Security. TechTarget, November 4, 2021. https://www.techtarget.com/searchsecurity/definition/RSA.
  25. Rebecca. “RSA Encryption Explained – Everything You Need to Know.” History, March 3, 2023. https://history-computer.com/rsa-encryption/.
  26. Frankel, Sheila, Rob Glenn, and Scott Kelly. The AES-CBC cipher algorithm and its use with IPsec. No. rfc3602. 2003.
  27. Ch Sekhar, P Sai Meghana (2020). "A Study on Backpropagation in Artificial Neural Networks". Asia-Pacific Journal of Neural Networks and Its ApplicationsVol.4, No.1 (2020), pp.21-28. doi: 10.21742/AJNNIA.2020.4.1.03
  28. Pradeep. “Building Your First Neural Network with Tensorflow – Deep Learning 2.” The Geek's Diary. The Geeks Diary, March 24, 2023. https://thegeeksdiary.com/2023/03/24/building-your-first-neural-network-withtensorflow-deep-learning-2/.
  29. “Blockchain - Elliptic Curve Cryptography.” GeeksforGeeks. GeeksforGeeks, November 17, 2022. https://www.geeksforgeeks.org/blockchain-elliptic-curvecryptography/.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Signature IPFS Algorithm Elliptical curve digital signature algorithm.