<<

Journal of Interdisciplinary Cycle Research ISSN NO: 0022-1945

Decentralized Framework for

Rohan Pawar, Mrunmayi Bhat, Shrikrushna Chavan, Darshan Kokadwar

Department of Computer Engineering

Marathwada Mitra Mandal’s Institute Of Technology (MMIT),

Lohgaon,Pune 47

Mr. (U L.Tupe)

Abstract a large, relatively open and often rapidly-evolving group of users; it divides work between Crowdsourcing is a process where an individual or an participants to achieve a cumulative result. organization utilizes the talent pool present over the Internet to accomplish their task(s). These platforms technology is defined as the technology offer numerous advantages such as reduced cost, that plays as a role of distributed ledger in which better quality, and lower task completion time. To transactions are made in digital manner and at the execute tasks efficiently, with the worker pool same time these transactions are recorded, verified, available on the platform, task posters rely on the and validated throughout the network of nodes without reputation managed and maintained by the platform. the approval of central authority.. The most important Usually, reputation management system works on feature is the , which ensures that there ratings provided by the task posters. Such reputation is no individual resource that control the whole systems are susceptible to several attacks as users or system. All participating nodes of the system can use the platform owners, with malicious intents, can all their resources to prevent the many-to-one traffic jeopardize the reputation system with fake reputations. flows, which eventually succeed in dealing with A blockchain based approach for managing various problem raised to single point failure and decreases the crowdsourcing steps provides a promising direction to delay. The decentralized system makes sure that the manage reputation system. We propose a system is robust and scalable. crowdsourcing platform where each step of crowdsourcing process is managed as transactions in Motivation Blockchain. This helps in establishing better trust in the platform users and addresses various attacks which ● Crowd sourcing allows performing more are possible on a centralized crowdsourcing platform. quickly than a single employee. ● Provide an efficient way of work. Keywords: Blockchain, Crowdsourcing, centralized, ● We are making crowd sourcing for maintain the security and transparency between the AES algorithm. requester and the worker.

Introduction

A block-chain is a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that any involved record cannot be altered retroactively, without the alteration of all subsequent blocks. Crowdsourcing is a sourcing model in which individuals or organizations obtain goods and services, including ideas and finances, from

Volume XII, Issue VI, June/2020 Page No:966 Journal of Interdisciplinary Cycle Research ISSN NO: 0022-1945

Related Work records accessibility, tamper proofing, and resistance Literature survey is the most important step in any to man-in-the-middle attacks. [4] kind of research. Before start developing we need to study the previous papers of our domain which we are working and on the basis of study we can predict or In this paper, distributed incentive mechanism based generate the drawback and start working with the block chain which can eliminate the security issues reference of previous papers. caused by a `trustful' center. In the distribute crowd In this section, we briefly review the related work on crowdsourcing and their different techniques. sensing system, the sensing data qualities are evaluated via the EM algorithm and contributions are quantized via mutual information by miners. We use a In this paper, the author propose a block-chain enable signcryption method to prevent miners and other well-organized records collection and secure sharing adversaries from violating users' privacy. The scheme combining Ethereum block-chain and deep signcryption mechanism saves computing costs reinforcement-learning (DRL) to create a dependable compared to operating sequentially of the signature and safe environment. In this scheme, DRL is used to attain the highest amount of collected information, and encryption. In addition, we use the node block-chain technology is usedto assure safety & cooperation based privacy protection mechanism reliability of information sharing. [1] which makes users' privacy to be hidden in group to deal with the impersonation attacks in the open and transparent blockchain. In the future, we will analyze In this paper, temporal shadow is used in which allow the possibility and discuss solutions of collusion to access the eHealth record in secure way. This attacks between an anonymity group and miners, system is patient centric, it allows the patient to access the medical history. The temporal blockchain is used between miners and the server and between users and to store the anonymous health information. The miners. Due to limited time and paper space, we will temporal value is generated based on the previous hash display the security experiment and more theoretical value, random value and timing. The start time, end analysis in our future work. [5] time and in-between time are considered for the timing. The user can access the patient record by This paper proposed a new data sharing scheme giving the temporal hash signature. [2] primarily based on blockchain technology. Users can Blockchain’s specific inherent characteristics, such as manage their records and recognize the information being collected about them and the way to use it with enhanced integrity and tamper proof operation (mainly out trusting any third party. However, the scheme did attributed to the maintenance of the “ledger” in a not consider the possibility of the enterprise itself distributed manner), on how they can increase the tampering with records. [6] performance of a novel crowd-sourcing platform. Especially, the use cases of EUNOMIA are presented, ZebraLancer can facilitate a large variety of incentive where the creation of a P2P network with reputation mechanisms to realize the fair exchange between the mechanisms between the peers manages, by using crowdshared data and their corresponding rewards, Blockchain as a , to enhance the performance without the involvement of any third-party arbiter. of the system and to meet the requirements of modern Moreover, it shows the practicability to resolve two professionals. [3] natural tensions in the use-case of the decentralized crowdsourcing atop open blockchain: one between the data confidentiality and the blockchain transparency, In this paper, we propose a product traceability system and the other one between the participants’ anonymity based totally on blockchain technology, in which all product transferring histories are continuously and their accountability. [7] recorded in a distributed ledger by the usage of smart contracts and a chain is formed that can trace back to This paper presents a trustless crowd-intelligence the supply of the products. Our machine has apparent ecosystem based on the common decentralization decentralized characteristics, which appreciably feature of mobile edge computing and blockchain reduces the possibility of privately tampering with technology. Its reward-penalty model provides a data inside enterprises. Our system is characterised by flexible way to align the interests of three

Volume XII, Issue VI, June/2020 Page No:967 Journal of Interdisciplinary Cycle Research ISSN NO: 0022-1945

stakeholders. It expands the applications of crowd- Proposed Method intelligence to crowdsourcing and domains. What is more, it can make use both of human In this we are using 3 modules i.e. Requester and beings and machines as workers to solve the worker Worker and Authority. shortage problem. [8] Module 1 – Authority:- Authority view Requester This paper highlights the difference between the Profile and verifies then accept the request. Same as conventional supply chain and IoT integrated do with worker. blockchain based supply chain. The problems faced by the automotive industries, pharmaceutical industries, Module 2 - Requesters:- Requesters can post the task food industries, and retail industries by using the to the system and Get the accurate result. conventional supply chain as well as the solutions to the problems provide the blockchain based systems in Module 3- Worker:- Worker receive the post and do those industries. It was observed that the IoT their work and sent to the requester integrated blockchain based supply chain system able

to remove the problem and make the system more efficient and trustworthy. Finally a case study has been Verification proposed on seafood industry supply chain and the benefits of integrating block chain into the network. This paper will help the industry people to know the benefits of blockchain based supply chain system and Upload encrypted query try to implement in real life to get better result. [9]

In this paper, a decentralized fair payment scheme based on blockchain technology. The payment system Processing based on trusted third party by using the smart contract technology of ethereum. In order to prevent the trusted third party from reaching the bottleneck due to the excessive visits of users, the decentralized payment Complete task scheme is realized through the interaction between the client node and the cloud storage server node. On the one hand, based on the smart contract under ethereum Fig.1 Get solution/resultFlow diagram blockchain, the system solves the problem of fairness of payment under malicious circumstances and the

opaque payment process in traditional payment, and the payment process is traceable. On the other hand, Architecture the system weakens the attacks that occur on the client to some extent by combining our fair payment scheme Requester post tasks, they need to initialize the with deduplication. This paper shown that the cost of making a payment to a cloud storage server by a client examining rules and send to communication is minimal. Drawback of this paper is that the platform. decentralized structure is not complete. [10] Through blockchain Workers, will receive the task Problem Statement and fetch the query which is upload by the requester. After finishing tasks in deadline, they post the They may receive the task but not submit solutions message to the communication platform. on time, which could discourage requesters from participating in the crowdsourcing system. In In blockchain miners will verify the users that the user particular, they may deny the low-quality solution is authorized or not. Miners will maintain the whole because there does not exist a third party to audit it, distributed ledger of various users. which is a trust problem.

Volume XII, Issue VI, June/2020 Page No:968 Journal of Interdisciplinary Cycle Research ISSN NO: 0022-1945

Ciphertext ←AES Encrypt (password, key)

Output (ciphertext)

Decryption:

Key ← salt – time

for as much tolerance given time

if key = get_time

key ← salt + time

plaintext ←AES Decrypt (ciphertext, key)

end if

end for Fig.2 System Architecture output (plaintext) Algorithm

1. Advanced Encryption Standard 2. SHA-1(Secure Hash Algorithm) 1) Input: Secure Hashing Algorithms, also known as SHA, are 2) 128 bit /192 bit/256 bit input(0,1) a family of cryptographic functions designed to keep data secured. It works by transforming the data using 3) secret key(128 bit)+plain text(128 bit). a hash function an algorithm that consists of bitwise operations, modular additions, and compression 4) Process: functions. The hash function then produces a fixed 5) 10/12/14-rounds for-128 bit /192 bit/256 bit input size string that looks nothing like the original. These algorithms are designed to be one-way functions, 6) Xor state block (i/p) meaning that once they’re transformed into their 7) Final round:10,12,14 respective hash values, it’s virtually impossible to transform them back into the original data. A 8) Each round consists : sub byte, shift byte, mix common application of SHA is to encrypting columns, add round key. passwords, as the server side only needs to keep track of specific user’s hash value, rather than the actual 9) Output: password.

10) cipher text(128 bit) Steps are followed:

1. Sender feeds a plaintext message into SHA-l algorithm and obtains a 160-bit SHA-l hash. Mathematical equation in Advanced Encryption Standard: 2. Sender then signs the hash with his RSA private key and sends both the plaintext message and the Initialization: password, key, time, salt : string signed hash to the receiver.

Time ← get_time 3. After receiving the message, the receiver computes the SHA-l hash himself and also applies the sender's Input ← (password) public key to the signed hash to obtain the original hash H. key←salt + time

Encryption:

Volume XII, Issue VI, June/2020 Page No:969 Journal of Interdisciplinary Cycle Research ISSN NO: 0022-1945

Result 3. Yuan Lu, Qiang Tang and Guiling Wang, ZebraLancer: Knowledge Experiments are done by a personal computer with a atop Open Blockchain, Privately and configuration: Intel (R) Core (TM) i3- 2120 CPU @ Anonymously, arXiv:1803.01256v4 [cs.HC] 17 Feb 2019. 3.30GHz, 4GB memory, Windows 7, MySQL 5.1 backend database and jdk 1.8. This application is web 4. Shangping Wang, Dongyi Li, Yaling Zhang, Juanjuan Chen, “Smart Contract-Based based application used tool for design code in Eclipse Product Traceability System in the Supply and execute. Chain Scenario”, IEEE Access, 2019.

5. M. Nakasumi, “Information Sharing for Supply Chain Management Based on Block Chain Technology,” in 2017 IEEE 19th Conclusion Conference on Informatics (CBI), Thessaloniki, Greece, Jul. 2017. In this work, we propose a distributed and secure crowdsourcing platform with a robust recognition 6. Dimitrios G. Kogias, Helen C. Leligou, management scheme. The existing centralized Michael Xevgenis, Maria Polychronaki, schemes are liable to attacks on central servers or Evangelos Katsadouros, George Loukas, misuse through the primary authority. Using the Ryan Heartfield, Charalampos Z. block-chain based method we construct a platform this Patrikakis,” Towards a Blockchain enabled is less expensive than the existing, does not depend Crowdsourcing platform”. upon any third party and overcomes malicious manipulation of reputation and various other attacks 7. R Charanya, Ra. K Saravanaguru, M on reputation system. It also provides traceability, Aramudhan, Design of Secure Ehealth prevents invalidated modification of records and gives System Through Temporal Shadow using fair share of reward for the worker and compensation Blockchain, International Journal of for the assignment poster. The reputation score Innovative Technology and Exploring provided by the machine can be trusted because of Engineering (IJITEE) ISSN: 2278-3075, immutability inherited through the system from block- Volume-8 Issue-6, April 2019. chain. 8. Shangping Wang , Yuying Wang, And Yaling Zhang,” Blockchain-based fair References payment protocol for deduplication cloud storage system” , IEEE 1. Chi Harold Liu, Senior Member, IEEE, Qiuxia Lin, Shilin Wen. “Blockchain- 9. Jinliang Xu, Shangguang Wang, Bharat K. enabled Data Collection and Sharing for Bhargava, Fangchun Yang, “A Blockchain- Industrial IoT with Deep Reinforcement enabled Trustless Crowd-Intelligence Learning”, IEEE Transaction on Ecosystem on Mobile Edge Computing” Industrial Volume: 15, Issue: 6 , June 2019. IEEE Transactions On Industrial Informatics, Vol. X, No. X, Xx/Xx 2019.

10. Waheeda Dhokley , Saurabh Gupta , Ganesh Pawar , Abrar Shaikh, “Crowdsourcing and 2. M. Nakasumi, “Information Sharing for Platform using Blockchain Supply Chain Management Based on Block and ” International Chain Technology,” in 2017 IEEE 19th Journal of Computer Sciences and Conference on Business Informatics (CBI), Engineering. Thessaloniki, Greece, Jul. 2017.

Volume XII, Issue VI, June/2020 Page No:970