DECENTRALIZED WEB HOSTING USING BLOCKCHAIN
Main Article Content
Abstract
This paper proposes a decentralized solution for web hosting based on interplanetary file system (IPFS) and Ethereum blockchain. Particularly, we use Ethereum smart contracts to manage the IPFS network and the web hosting service. IPFS platform is used to store data and to host websites. All storage miner nodes on the IPFS network offer the pinning service to ensure that source codes of the websites and users' data are retained long-term. Moreover, these nodes also enable the interplanetary name space (IPNS) service for creating and updating mutable links to IPFS contents. TXT record is also used in the domain name system (DNS) to map domain names to IPNS addresses for hosted websites. For privacy-preserving data storage, websites need to be deployed an encryption algorithm. The proposed model that combines between the IPFS and blockchain networks to form a platform providing the decentralized web hosting service. Experiment illustrates building and hosting a web application on the IPFS network. Experimental results show that, compared to the traditional web hosting model, the hosted web application on the proposed platform ensures the confidentiality, integrity, and availability.
Downloads
Metrics
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
Z. Xiao, S. Wen, H. Yu, Z. Wu, H. Chen, C. Zhang, and Y. Ji, “A new architecture of web applications-
The Widget/Server architecture,” in 2010 2nd IEEE International Conference on Network Infrastructure and
Digital Content, IEEE, 2010, pp. 866-869.
M. Steichen, B. Fiz, R. Norvill, W. Shbair, and R. State, “BlockchainBased, Decentralized Access Control
for IPFS,” in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing
and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE
Smart Data (SmartData), IEEE, 2018, pp. 1499-1506.
A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, “Bitcoin and cryptocurrency
technologies: A comprehensive introduction,” Princeton University Press, 2016.
Z. Zheng, S. Xie, H. N. Dai, and H. Wang, “Blockchain challenges and opportunities: A survey,” in
International Journal of Web and Grid Services, 2016.
V. Buterin, “A next-generation smart contract and decentralized application platform,” white paper 3,
, 37.
N. Atzei, M. Bartoletti, and T. Cimoli, “A survey of attacks on ethereum smart contracts (sok),” In
International Conference on Principles of Security and Trust, Springer, Berlin, Heidelberg, 2017, pp. 164-
A. Ramachandran, and M. Kantarcioglu, “SmartProvenance: a distributed, blockchain based
dataprovenance system,” in Proceedings of the Eighth ACM Conference on Data and Application Security
and Privacy, ACM, 2018, pp. 35-42.
G. Singh, “A study of encryption algorithms (RSA, DES, 3DES and AES) for information security,”
International Journal of Computer Applications, 67(19), 2013.
T. Nie, and T. Zhang, “A study of DES and Blowfish encryption algorithm,” in Tencon 2009-2009 IEEE
Region 10 Conference, IEEE, 2009, pp. 1-4.
M. A. Hossain, M. B. Hossain, M. S. Uddin, and S. M. Imtiaz, “Performance analysis of different
cryptography algorithms,” International Journal of Advanced Research in Computer Science and Software
Engineering, 6(3), 2016.
Z. Zheng, S. Xie, H. N. Dai, and H. Wang, “Blockchain challenges and opportunities: A survey,” in
International Journal of Web and Grid Services, 2016.
M. Conti, S. Kumar, C. Lal, and S. Ruj, “A survey on security and privacy issues of bitcoin,” IEEE
Communications Surveys & Tutorials, 2018.
J. P. Cruz, K. Yuichi, and N. Yanai, “RBAC-SC: Role-based access control using smart contract,” IEEE
Access 6, 2018, pp. 12240- 12251.
A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “Medrec: Using blockchain for medical data access and
permission management,” in 2016 2nd International Conference on Open and Big Data (OBD), IEEE, 2016,
pp. 25-30.
X. Li, P. Jiang, T. Chen, X Luo, and Q. Wen, “A survey on the security of blockchain systems,” Future
Generation Computer Systems, 2017.
R. A. Popa, E. Stark, S. Valdez, J. Helfer, N. Zeldovich, and H. Balakrishnan, “Building web applications
on top of encrypted data using Mylar,” in 11th {USENIX} Symposium on Networked Systems Design and
Implementation ({NSDI} 14), 2014, pp. 157-172.
W. He, D. Akhawe, S. Jain, E. Shi, and D. Song, “Shadowcrypt: Encrypted web applications for
everyone,” in Proceedings of the 2014 2019 6th NAFOSTED Conference on Information and Computer
Science (NICS) 86 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2014, pp.
-1039.
H. Krawczyk, “The order of encryption and authentication for protecting communications (or: How
secure is SSL?),” in Annual International Cryptology Conference, Springer, Berlin, Heidelberg, 2001, pp.
-331.
D. Berbecaru, and A. Lioy, “On the robustness of applications based on the SSL and TLS security
protocols,” European Public key infrastructure workshop, Springer, Berlin, Heidelberg, 2007, p. 248- 264.
M. Dworkin, “Recommendation for block cipher modes of operation. methods and techniques,” NIST
Special Publication 800-38A Edition, 2001.
D. Blazhevski, A. Bozhinovski, B. Stojchevska, and V. Pachovski, “Modes of operation of the AES
algorithm,” in the 10th Conference for Informatics and Information Technology, 2013. [22] C. Zhang, J.
Sun, X. Zhu, and Y. Fang, “Privacy and security for online social networks: challenges and opportunities,”
IEEE network, 24(4), 2010, pp. 13-18