2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2020
DOI: 10.1109/icccnt49239.2020.9225483
|View full text |Cite
|
Sign up to set email alerts
|

Decentranet - An Ethereum, Proxy Re-Encryption and IPFS Based Decentralized Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…One of the earlier works on social media is the paper by [3] Yash Ranka, Jainam Bagrecha, Kavish Gandhi, Bhargav Sarvaria, Prof. P. M. Chawan named "A Survey on File Storage & Retrieval using Blockchain Technology" which aims to solve the problems of decentralized data storage, limiting data access and preventing data redundancy using peer-to-peer network storage combined with blockchain technology. The proposed technology stack for this includes the Ethereum [9] swarm [10] for storing, distributing and storing data across the network, the Ethereum whisper [11] protocol for host information sharing access, and various Asymmetric encryption. algorithm and data compression algorithm for managing confidential information and for recording information.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…One of the earlier works on social media is the paper by [3] Yash Ranka, Jainam Bagrecha, Kavish Gandhi, Bhargav Sarvaria, Prof. P. M. Chawan named "A Survey on File Storage & Retrieval using Blockchain Technology" which aims to solve the problems of decentralized data storage, limiting data access and preventing data redundancy using peer-to-peer network storage combined with blockchain technology. The proposed technology stack for this includes the Ethereum [9] swarm [10] for storing, distributing and storing data across the network, the Ethereum whisper [11] protocol for host information sharing access, and various Asymmetric encryption. algorithm and data compression algorithm for managing confidential information and for recording information.…”
Section: Literature Surveymentioning
confidence: 99%
“…They conclude the article by stating that while DOSN can resolve some privacy concerns from centralized OSNs, introduces new problems and challenges such as instant messaging and real-time information sharing. [9] Van-Duy Pham et al Compare centralized and decentralized storage systems. The 's main focus is on the deficiencies of the central system, such as points of failure and privacy concerns.…”
Section: Literature Surveymentioning
confidence: 99%