Secured Blockchain Based Decentralised
Total Page:16
File Type:pdf, Size:1020Kb
Secured Blockchain Based Decentralised Internet: A Proposed New Internet S M Habibul Mursaleen Chowdhury Ferdous Jahan Department of Computer Science Department of Computer Science American International University-Bangladesh American International University-Bangladesh Dhaka, Bangladesh Dhaka, Bangladesh [email protected] [email protected] Sarawat Murtaza Sara Dip Nandi Department of Computer Science Department of Computer Science American International University-Bangladesh American International University-Bangladesh Dhaka, Bangladesh Dhaka, Bangladesh [email protected] [email protected] ABSTRACT ACM Reference Format: Throughout this paper, we try to describe with blockchain technol- S M Habibul Mursaleen Chowdhury, Ferdous Jahan, Sarawat Murtaza Sara, and Dip Nandi. 2020. Secured Blockchain Based Decentralised Internet: A ogy the decentralization of the internet. A decentralized network Proposed New Internet. In International Conference on Computing Advance- that encourages the internet to operate from the smartphone or ments (ICCA 2020), January 10–12, 2020, Dhaka, Bangladesh. ACM, Dhaka, tablet of anybody instead of centralized servers. A decentralized DHK, Bangladesh, 7 pages. https://doi.org/10.1145/3377049.3377083 implementation would be based on a peer-to-peer network that is dependent on a user community. Their machines connected to the 1 INTRODUCTION internet will host the network, not a community of more powerful servers. Each site would be distributed across thousands of nodes The internet is a vital space for public discourse and the new arena on various devices. The data is therefore not contained, owned for the defense of freedom of speech. [1] First, web 1.0, a network by private storage facilities. There is therefore no central point of embedded pages, linked in a self-reference grid. Next began Web to hack, and no way for an oligarchy of entities to take control 2.0, social sites, blogs, forums, countless networks loaded with user- of it. A proposed alternative was formed based on a systematic generated content generated by and for the same audience. Web literature review that demonstrates that Internet decentralization 3.0’s seeds are beginning to take shape today. Web technology’s is what this modern technology needs in order to address not only latest iteration brings us the open web, a place where resources are the weaknesses of current servers including server down issue, distributed instead of clustered, where users own and manage their hacking and data manipulation or single point of failure, but also own data, and where smaller players reclaim power from corporate to prevent companies from monetizing the data of citizens through giants. their server and to market them to the advertisers. In this paper, we limit ourselves to addressing systems that use decentralized architectures to protect privacy properties. We recog- CCS CONCEPTS nize the difference, as follows, between decentralized and central- ized architectures. • Security and privacy → Database and storage security; Hu- man and societal aspects of security and privacy; • Database and 2 RELATED STUDY storage security → Management and querying of encrypted data. The traditional web is centered on the "client-server design," which KEYWORDS is every website’s basic principle. The client is the computer who sends requests for information and the server responds with data Web 3.0, Decentralised Web, DApp, Server vulnerabilities, Data in return. It depend on servers for centralized internet. The existing Privacy, Blockchain, Whisper, Ethereum, Cryptography, Bitcoin, internet is not "centralized" by hundred percent, as nobody runs Encryption, Smart Contracts, Peer-To-Peer Network the whole internet. Nonetheless, comparatively few large physical servers are accountable for storing essential elements and also for maintaining our email, social networks and websites accessible to Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed everyone. This means the corporations that own these servers have for profit or commercial advantage and that copies bear this notice and the full citation an enormous effect on how the internet is working. Our centralized on the first page. Copyrights for components of this work owned by others than ACM repository compromises our network and is accessible to a few must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a big organizations by extension, our work and relationships. Scien- fee. Request permissions from [email protected]. tific data from today are mainly processed and accessed through a ICCA 2020, January 10–12, 2020, Dhaka, Bangladesh centralized web-based network. Access to data is regulated by the © 2020 Association for Computing Machinery. ACM ISBN 978-1-4503-7778-2/20/01...$15.00 company that maintains the data, and on the basis of institutional af- https://doi.org/10.1145/3377049.3377083 filiation may be given free or limited. A siloed, centralized model of ICCA 2020, January 10–12, 2020, Dhaka, Bangladesh HM Chowdhury, et al. data management supports organizations controlling, monetizing, Digital Library and Google Scholar were searched. Such repositories and gate-keeping information access. [2] Decentralized frameworks are the common sources for papers on open source research All reconsider the control, storage,and accessibility of data. The imple- queries were based on the title and keywords like decentralized mentation of infrastructural decentralization would allow internal network, blockchain, cryptocurrency, decentralized internet apps silos to share information, promote access to data, and enhance (DApps). Fifty-nine papers consisting of 11 journal articles and 48 redundancy. [2] The exchange, storage and distribution to informa- conference articles resulted in automated keyword search. tion in exclusively digital formats is growing. Therefore, one of the 3.1.3 Manual Selection : Studies demonstrates that- most important obstacles of our time is to guarantee stable, free access to online information. Decentralized implementations have 1. Due to a lack of consistent set of keywords, modern digi- the same region between front end design, back end logic and data tal libraries can not provide strong support for automated are stored, but switch out centralized servers for a blockchain’s keyword searches. distributed nodes. Users link up to a DApp with a specific browser— 2. The abstracts of articles compared to others are relatively whether a tailor-made decentralized web browser such as Block or poor. It is therefore possible that the 59 articles recognised a plugin such as Metamask — and this browser deals with a soft- through an automated selection process may include irrele- ware program’s back end logic that can operate on a distributable vant papers and some appropriate articles may be lacking. service called a smart contract. The smart contract, in effect, reads Because of this, by evaluating the title, keywords, and ab- and writes data to the blockchain that contains information instead stract, the first author made a manual selection on these of a traditional database.[3] The Web uses a centralized database articles. This process resulted in 38 articles consisting of 9 schema that is designed for private entities to use. Data is kept journal articles and 29 conference articles. at a single specific facility, such as a data center, in a centralized 3.1.4 Reference Checking : To ensure the inclusion of other rele- data archive or any other online data services. The owner of that vant but missing articles, the every author of this study performed facility monitors access to this information. This location must be a non-recursive search through the references of the 38 selected used to exchange, upload and collaborate data. Despite the lack of articles. We do not wanted to miss any of the most related paper we centralization suggested by the term "cloud," access to data centers must choose within our selection criteria. Sometime only relying is heavily centralized. There are benefits of centralization but it on advance search may result in missing of some potential paper also comes with risks like rot and content drift [2]. or most related paper. 3 METHODOLOGY 3.1.5 Final Set Of Articles : The article selection process finally results in 38 articles. Decentralized internet using blockchain technology is focused on aggregating the best available evidence to resolve researchers engi- 3.2 ARTICLE ASSESSMENT neering issues. A Systematic Literature Review (SLR) is a standard Search has been identified 38 articles from the three popular re- approach for these studies. It suggests pre-defining a review pro- search database IEEE explore, Google Scholar and also ACM (Asso- tocol to reduce the possibility of research partiality as a starting ciation for Computing Machinery). The selection found 19 articles point for SLR success. from Google Scholar, 15 from IEEE Xplore, and 4 from ACM. Four article was found as duplicate and removed it. After the tittle re- 3.1 ARTICLE SELECTION view, 35 studies were selected for abstract review, and 7 articles This section explains the paper process of selecting which deter- were excluded because did not mention details about decentralized mines the selection criteria for the article, using an automated network