0% found this document useful (0 votes)
25 views7 pages

RR 1

The document discusses the development of a decentralized secure messaging application using blockchain technology, which eliminates the risks associated with centralized servers. It highlights the advantages of peer-to-peer networks for communication, ensuring data security and reliability. The proposed system aims to enhance user privacy and data integrity while addressing the limitations of traditional messaging applications.

Uploaded by

0447.ankit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views7 pages

RR 1

The document discusses the development of a decentralized secure messaging application using blockchain technology, which eliminates the risks associated with centralized servers. It highlights the advantages of peer-to-peer networks for communication, ensuring data security and reliability. The proposed system aims to enhance user privacy and data integrity while addressing the limitations of traditional messaging applications.

Uploaded by

0447.ankit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

e-ISSN: 2582-5208

International Research Journal of Modernization in Engineering Technology and Science


( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 [Link]
DECENTRALIZED SECURE MESSAGING APPLICATION USING
BLOCKCHAIN TECHNOLOGY
Shweta Dnyaneshwar Bagade*1, Prof. (Dr) N.R. Wankhade*2
*1Master Of Computer Engineering, Department Of Computer Engineering, Nashik,
Maharashtra, India.
*2Head Of Computer Department (HOD), Late G N Sapkal College Of Engineering, Nashik,
Maharashtra, India.
DOI : [Link]
ABSTRACT
Decentralized Operation make use of peer-to-peer networks, this ensures that no network failure can do due to
central node failure. Block chain serves as an unalterable ledger which allows messaging to take place in a
decentralized manner. A decentralized operation for communication and resource sharing is need in present’s
world, where keeping data on a centralized server can be unsafe and expensive experience. With the help of
various consensus, we can apply different ways to share resources and communicate. Together with Block
chain and Decentralized Applications, we can produce a secure and dependable messaging application that
overcomes the draw backs of traditional messaging applications. In decentralized systems, the objects at the
different situations frequently differ. Each position controls only a subset of the decision variables but is
affected by the opinions made at the other levels.
Keywords: Decentralize System, Peer To Peer, Block Chain,Messaging, Chat.
I. INTRODUCTION
In Decentralized Structure there’s no centralized server for conversation. Clients communicate directly with
other client or clients. By allowing the chat clients to discover and establish connections with one another,
unless the physical network hardware or else power supply is interrupted, there will be no disruption of
communications between users. The index table is updated regularly across all clients or peers. When a
consumer receives disconnected from the network the access from the index table gets deleted instantly. The
communication among the peers is direct, which does not require any centralized server. Thus failure of a client
will not disrupt communication with other independent clients. The application is independent of any failures
or disruption of any of its client or user.
As all of us know, traditional chat applications are centralized i.e., all the data is stored on a centralized server.
Therefore major problem of this structure is, if the central server fails then whole network collapses. For
example, WhatsApp server stored all the data on a central server, if in case that server is destroyed then there
can be a loss of user data, or they can even leak the user information stored on the server. To overcome this,
our project makes the use of decentralized Application approach (dApps). In our application all the user data is
stored on a block which is connected to other blocks forming a chain. As the name suggests, a decentralized
application does not have a centralized server.
It is basically a peer-to-peer network. Also the data that is stored in block is almost impossible to view as a very
secure encryption and hashing functions (256 bits) are used. Also is a hacker tries to make changes to the
information in block then, he/she will have to make changes to all the copies of that block on whole block chain
network and that can be quite impossible. Though block are on all nodes, they cannot access the information in
it, only the person for whom the information if can access it. P2P applications are distributed systems without
any central control, where all the peers are equivalent in functionality. Recent surveys show that P2P
applications generate a high percentage of traffic on the Internet.

[Link] @International Research Journal of Modernization in Engineering, Technology and Science


[1548]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 [Link]

II. LITURATURE REVIEW


Several industries are also pursuing Decentralized-based technology solutions to improve efficiency,
streamline business processes and build trust between parties with little or no knowledge of each other. A
peer-to-peer chat system on the other hand aims at replacing the centralized server with a distributed server
residing at every user device. Paper [1] proposed a research summarizes and put forward the concept of chat
application using blockchain can be more useful for the co-operate users as most of the chat applications are
not be able to view chat history in [Link] proper implementation of smart contract, encryption, hashing,
and multifactor authentication more secure platform can be created. Paper [2] and paper [4] proposed the P2P
features and the need for privacy, data sec Such P2P decentralized systems have gone up significant adherence
now-a-days because it is more secure and scalable. Paper [3] proposed an Overview of Blockchain Technology:
Architecture, Consensus.
By Considering paper [5] peer to peer reference architecture is [Link] [6] proposed a more applications of
the blockchain like Supply chain management , Improved record keeping [Link] Based Approaches
are use to Improving Data Security in Message Communication between ACT and Aircraft using Private
Decentralized. This paper has provided a roadmap of solutions to address the aforementioned issues
concerning data storage and communication using Decentralized-Based approaches by presenting an overview
of the different phases of communication between the Flight and ACT.
In recent years Decentralized becomes more and more growing technology that provides real solutions to
common problems. As it has become the best technology, most of the chat applications also getting use it. Few
applications like DUST, [Link], E-CHAT. TELEGRAM. and SYLO, etc. Most of the chat applications use in
organizations such as Microsoft teams, Skype for business and WhatsApp business API is still not implemented
with Decentralized technology.
DUST - Decentralized-based message application that uses public Decentralized (Ethereum). This app has a
strong focus on privacy and security with several features. The main feature of this application is the timed
message deletion where your message self destructed after a given time.
E-Chat - This app is more than a simple messenger program that has built using Ethereum Decentralized. E chat
can also process Ethereum transactions and comes equipped with a multi-coin cryptocurrency wallet.
Skype for business currently not available private Decentralized technology to manage the organization's
communication.
Microsoft Teams - Currently unavailable private Decentralized technology.

[Link] @International Research Journal of Modernization in Engineering, Technology and Science


[1549]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 [Link]

III. METHODOLOGY
The whole idea of this proposed application is to avoid a centralized system (registration, login and buddy list)
as that found in Skype (Baset and Schulzrinne, 2006; Azab et al., 2012). Using Skype, during registration, user
profile will be stored in a centralized database and one can use the credential to login at anytime and anywhere
as preferred. This certainly provides certain level of robustness although the question arises as to how secure
the centralized database can be to prevent from attacks. Recently, a study on decentralized system was
proposed but only for the purposed of improving the buddy list (Kundu, 2012). The idea was about developing
a robust index system using distributed hash table for decentralized chat application. An indexing system is
responsible for storing IP address and port of all users once they joined the chat. Users initialize their user
B. To cater some of these problems, in our proposed application, we come out with the following principle
ideas:
• Pure P2P architecture with no centralized server, peers’ profiles is managed locally by user
• User registrations are done among themselves and therefore, multiple registrations are needed for
communicating with different users
• User login is done on each peer basis and it follows a two- way authentication protocol
• Message is encrypted prior exchanging between two or more peers

[Link] @International Research Journal of Modernization in Engineering, Technology and Science


[1550]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 [Link]
Another important feature of any chat application would be buddy listing. In this application, during
initialization process, the system reads through the buddy list from local hash table and automatically
determines their (device) availabilities by contacting them based on the IP address and port number of their
devices. However, it could also be the case that someone else is on the device, for that we have an
authentication procedure which makes use of username and password. Furthermore, message exchange is only
allowed after peers have authenticated to each other. Unlike Skype, when user initializes the application.
 USER WILL SHARE HIS/HER PUBLIC KEY
 USER WILL ENTER FRIEND’S PUBLIC KEYINTO PRIVATE KEY FIELD AND CONNECT
 AFTER CONNECTION THEY CAN CHAT

BLOCK DIAGRAM-

IV. ALGORITHM
Algorithm for setup of PEER connection
Step 1: Start
Step 2: Create own peer connection
Step 3: When peer id is ready go to step 3.
Step 4: If peer == null display message received null id from peer connection and set new peer id to last peer
else go to Step 3.
Step 5: last peer==new peer

[Link] @International Research Journal of Modernization in Engineering, Technology and Science


[1551]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 [Link]
Step 6: Display peer id as Public Key
Step 7: End
Algorithm for making connection between two user
Step 1: Start
Step 2: Accept public key
Step 3: Check public key is already open or not
Step 4: If connection is open print “Already connected to another client” Else save connection
Step 5: Get connection ready for new connection with another user.
Step 6: If client refreshes (Inactive) i.e. Connection = null go to step 7
Step 7: Display message Client closed please refresh
Step 8: End
Main System Algorithm
Step 1: Start
Step 2: When application opens, set peer to null.
Step 3: create message object with author with it’s peer id and time
Step 4: Set status Disconnected by default after refreshing theapplication
Step 5: Set reconnect button and go for initialization function.
Step 6: Setup for a new peer connection for chatting
Step 7: Create a new peer connection and get its id [Link]
Step 8: Check that id is pre-defined or not if it’s not thendefine to null else set last peer id = new peer id
Step 9: Display Peer in in public key option as public key
Step 10: check that peer connection is already open if it is then alert “Another client already connected” Else
save connection
Step 11: Get connection ready with another client
Step 12: On peer connection close set status to connectionclosed
Step 13: Call when peer connection Is established conn = open Step 14: add message from input box to step 15
Step 15: Print message in message container in the format liketime+ author span+ message
Step 16: Click on send button from enter key to send messageto another client through peer connection
Step 17: End
V. RESULTS AND DISCUSSION
Login and Registration Page:

[Link] @International Research Journal of Modernization in Engineering, Technology and Science


[1552]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 [Link]

 User Friendly: Usability is the ease of use and learn ability of a human-made object such as a tool or device.
In software engineering, usability is the degree to which a software can be used by specified consumers to
achieve quantified objectives with effectiveness, efficiency, and satisfaction in a quantified context of use.
 Private Chat
 Interactive voice response
 Public chat,
 Health care, Military
 Telephony and other domains
In Proposed system currently user can not send or receive Photos or any media file, Also user can not chat
particular user only, So future scope of our system will be Add media sendingor Receiving Module also. Or Make
a chatroom for particular User also.
VI. CONCLUSION
In this project, we are developing an application that makes use of blockchain in a very efficient way.
Blockchain has shown its potential for transforming traditional industry. Also, by eliminating the centralized
approach, we can assure the safety and availability of data and communication. Decentralized applications tend
[Link] @International Research Journal of Modernization in Engineering, Technology and Science
[1553]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 [Link]
to make the interaction between two people more efficient and simple. The chatting process nowadays have a
mediating node, while our software does not have any mediating device/node i.e., every person is connected by
peer-to-peer network.
ACKNOWLEDGEMENTS
I am Shweta Dnyaneshwar Bagade very great thankful to our guide and also HOD Sir Prof. (Dr.) N. R. Wankhade,
Computer Department and library, Late G. N. Sapkal College of Engineering for guidance and advice which
helped to improve the present Paper and for Project and giving valuable suggestions to improve project
performance and the paper.
VII. REFERENCES
[1] U. P. Ellewala, W.D.H.U Amarasena, H.V. sachini Lakmali, L.M.K. senanayaka, [Link], -- Secure
messaging platform based on Blockchain IEEE 2020.
[2] Peer-To-Peer Networks by Geoffrey Fox
[3] Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang, ―An Overview of
Blockchain Technology: Architecture, Consensus, and Future Trends‖, 2017 IEEE 6th International
Congress on Big Data.
[4] S. Nakamoto, ―Bitcoin: A peer-to-peer electronic cash system,‖ 2008. [Online]. Available:
[Link]
[5] Atul singh and Mads Haahr From Distributed systems Group: “Peer-to- Peer Reference Architecture”
[6] G. Foroglou and A.-L. Tsilidou, ―Further applications of the blockchain,‖ 2015.
[7] G. W. Peters, E. Panayi, and A. Chapelle, ―Trends in cryptocurrencies and blockchain technologies: A
monetary theory and regulation perspective,‖ 2015. [Online]. Available:
[Link] 2646618
[8] B. W. Akins, J. L. Chapman, and J. M. Gordon, ―A whole new world: Income tax considerations of the
bitcoin economy,‖ 2013. [Online]. Available: [Link]
[9] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, ―Hawk: The blockchain model of cryptography
and privacypreserving smart contracts,‖ in Proceedings of IEEE Symposium on security and Privacy
(SP), San Jose, CA, USA, 2016, pp. 839–858.
[10] Y. Zhang and J. Wen, ―An iot electric business model based on the protocol of bitcoin,‖ in Proceedings
of 18th International Conference on Intelligence in Next Generation Networks (ICIN), Paris, France,
2015, pp.184–191.

[Link] @International Research Journal of Modernization in Engineering, Technology and Science


[1554]

You might also like