Main Article Content



This paper proposes a decentralized solution for web hosting based on interplanetary file system (IPFS) and Ethereum blockchain. Particularly, we use Ethereum smart contracts to manage the IPFS network and the web hosting service. IPFS platform is used to store data and to host websites. All storage miner nodes on the IPFS network offer the pinning service to ensure that source codes of the websites and users' data are retained long-term. Moreover, these nodes also enable the interplanetary name space (IPNS) service for creating and updating mutable links to IPFS contents. TXT record is also used in the domain name system (DNS) to map domain names to IPNS addresses for hosted websites. For privacy-preserving data storage, websites need to be deployed an encryption algorithm. The proposed model that combines between the IPFS and blockchain networks to form a platform providing the decentralized web hosting service. Experiment illustrates building and hosting a web application on the IPFS network. Experimental results show that, compared to the traditional web hosting model, the hosted web application on the proposed platform ensures the confidentiality, integrity, and availability.



Download data is not yet available.


Metrics Loading ...

Article Details

How to Cite
THAMMISHETTI, V., GOGU SWATHI, NARRA SANJAY, and PENDAM RAHUL. “DECENTRALIZED WEB HOSTING USING BLOCKCHAIN”. Technix International Journal for Engineering Research, vol. 9, no. 7, July 2022, pp. 10-16,
Research Articles


Z. Xiao, S. Wen, H. Yu, Z. Wu, H. Chen, C. Zhang, and Y. Ji, “A new architecture of web applications-

The Widget/Server architecture,” in 2010 2nd IEEE International Conference on Network Infrastructure and

Digital Content, IEEE, 2010, pp. 866-869.

M. Steichen, B. Fiz, R. Norvill, W. Shbair, and R. State, “BlockchainBased, Decentralized Access Control

for IPFS,” in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing

and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE

Smart Data (SmartData), IEEE, 2018, pp. 1499-1506.

A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, “Bitcoin and cryptocurrency

technologies: A comprehensive introduction,” Princeton University Press, 2016.

Z. Zheng, S. Xie, H. N. Dai, and H. Wang, “Blockchain challenges and opportunities: A survey,” in

International Journal of Web and Grid Services, 2016.

V. Buterin, “A next-generation smart contract and decentralized application platform,” white paper 3,

, 37.

N. Atzei, M. Bartoletti, and T. Cimoli, “A survey of attacks on ethereum smart contracts (sok),” In

International Conference on Principles of Security and Trust, Springer, Berlin, Heidelberg, 2017, pp. 164-

A. Ramachandran, and M. Kantarcioglu, “SmartProvenance: a distributed, blockchain based

dataprovenance system,” in Proceedings of the Eighth ACM Conference on Data and Application Security

and Privacy, ACM, 2018, pp. 35-42.

G. Singh, “A study of encryption algorithms (RSA, DES, 3DES and AES) for information security,”

International Journal of Computer Applications, 67(19), 2013.

T. Nie, and T. Zhang, “A study of DES and Blowfish encryption algorithm,” in Tencon 2009-2009 IEEE

Region 10 Conference, IEEE, 2009, pp. 1-4.

M. A. Hossain, M. B. Hossain, M. S. Uddin, and S. M. Imtiaz, “Performance analysis of different

cryptography algorithms,” International Journal of Advanced Research in Computer Science and Software

Engineering, 6(3), 2016.

Z. Zheng, S. Xie, H. N. Dai, and H. Wang, “Blockchain challenges and opportunities: A survey,” in

International Journal of Web and Grid Services, 2016.

M. Conti, S. Kumar, C. Lal, and S. Ruj, “A survey on security and privacy issues of bitcoin,” IEEE

Communications Surveys & Tutorials, 2018.

J. P. Cruz, K. Yuichi, and N. Yanai, “RBAC-SC: Role-based access control using smart contract,” IEEE

Access 6, 2018, pp. 12240- 12251.

A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “Medrec: Using blockchain for medical data access and

permission management,” in 2016 2nd International Conference on Open and Big Data (OBD), IEEE, 2016,

pp. 25-30.

X. Li, P. Jiang, T. Chen, X Luo, and Q. Wen, “A survey on the security of blockchain systems,” Future

Generation Computer Systems, 2017.

R. A. Popa, E. Stark, S. Valdez, J. Helfer, N. Zeldovich, and H. Balakrishnan, “Building web applications

on top of encrypted data using Mylar,” in 11th {USENIX} Symposium on Networked Systems Design and

Implementation ({NSDI} 14), 2014, pp. 157-172.

W. He, D. Akhawe, S. Jain, E. Shi, and D. Song, “Shadowcrypt: Encrypted web applications for

everyone,” in Proceedings of the 2014 2019 6th NAFOSTED Conference on Information and Computer

Science (NICS) 86 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2014, pp.


H. Krawczyk, “The order of encryption and authentication for protecting communications (or: How

secure is SSL?),” in Annual International Cryptology Conference, Springer, Berlin, Heidelberg, 2001, pp.


D. Berbecaru, and A. Lioy, “On the robustness of applications based on the SSL and TLS security

protocols,” European Public key infrastructure workshop, Springer, Berlin, Heidelberg, 2007, p. 248- 264.

M. Dworkin, “Recommendation for block cipher modes of operation. methods and techniques,” NIST

Special Publication 800-38A Edition, 2001.

D. Blazhevski, A. Bozhinovski, B. Stojchevska, and V. Pachovski, “Modes of operation of the AES

algorithm,” in the 10th Conference for Informatics and Information Technology, 2013. [22] C. Zhang, J.

Sun, X. Zhu, and Y. Fang, “Privacy and security for online social networks: challenges and opportunities,”

IEEE network, 24(4), 2010, pp. 13-18

Most read articles by the same author(s)