Data Security in a DApp Twitter Alike on Web 3.0 With Blockchain Based Technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32807
Data Security in a DApp Twitter Alike on Web 3.0 With Blockchain Based Technology

Authors: Vishal Awasthi, Tanya Soni, Vigya Awasthi, Swati Singh, Shivali Verma

Abstract:

There is a growing demand for a network that grants a high level of data security and confidentiality. For this reason, the semantic web was introduced, which allows data to be shared and reused across applications while safeguarding users privacy and user’s will grab back control of their data. The earlier Web 1.0 and Web 2.0 versions were built on client-server architecture, in  which there was the risk of data theft and unconsented sale of user data. A decentralized version, Known as Web 3.0, that is mostly built on blockchain technology was interjected to resolve these issues. The recent research focuses on blockchain technology, deals with privacy, security, transparency, and innovation of decentralized applications (DApps), e.g. a Twitter Clone, Whatsapp clone. In this paper the Twitter Alike built on the Ethereum blockchain will replace traditional techniques with improved latency, throughput, and data ownership. The central principle of this DApp is smart contract implemented using Solidity which is an object- oriented and highlevel language. Consequently, this will provide a better Quality Services, high data security, and integrity for both present and future internet technologies.

Keywords: Blockchain, DApps, Ethereum, Semantic Web, Smart Contract, Solidity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 202

References:


[1] Martinez DCalle EJove APerez-Sola C.Web-tracking compliance: websites“level of confidence in the use of information-gathering technologies: Web-tracking level of confidence. Computers and Security, (2022), 122.
[2] Zyskind GNathan OPentland A. Decentralizing privacy: Using blockchain to protect personal data. Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015, (2015), 180-184.
[3] Wright ADe Filippi P. Decentralized Blockchain Technology and the rise of lex Cryptographia(2015).
[4] Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System.(2008)
[5] Crosby Nachiappan Pradan Pattanayak Sanjeev Verma MKalyanaraman V. BlockChain Technology: Beyond Bit-coin. (2016), Issue no.2 june 2016.
[6] Yli-Huumo JKo DChoi SPark SSmolander K.Where is current research on Blockchain technology? - A systematic review. PLoS ONE, (2016), 11(10). Doi:10.1371/journal.pone.0163477
[7] Pilkington M. Blockchain Technology: Principles and Applications. 30 September 2016, 225-253.
[8] Twesige, Richard Lee. Bitcoin A simple explanation of Bitcoin and Block Chain technology. 2015, january. Conference: Bitcoin Cryptocurrenct, Volume:1 . DOI:10.13140/2.1.1385.2486.
[9] Shubhani Aggarwal, Neeraj Kumar, Pethuru Raj. History of blockchain-Blockchain 1.0: Introduction to blockchain. Elsevier,(2021), 147-169.
[10] Huaqun Guo, Xingjie Yu. A survey on blockchain technology and its security, Blockchain: Research and Applications.(2022), Volume 3, Issue 2.
[11] Jorge Soria, Jorge Moya, Amin Mohazab. Optimal mining in proof-of-work blockchain protocols. 29 December 2022.
[12] Jake Frankenfield. Reviewed by Jefreda R. Brown. Updated January 09, 2023.
[13] Alexander A. Varfolomeev, Liwa H. Alfarhani, Zahraa Ch. Oleiw. Secure-reliable smart contract applications based blockchain technology in smart cities environment, Procedia Computer Science. 2021, Volume 186, 669-676.
[14] Yuxin Huang, Ben Wang, Yinggui Wang. Research and Application of Smart Contract Based on Ethereum Blockchain. Journal of Physics: Conference Series, 2021, january. Doi: 10.1088/1742-6596/1748/4/042016.
[15] Zarrin, Javad; Wen Phang, Hao; Babu Saheer, Lakshmi; Zarrin, Bahram (May 15, 2021). ”Blockchain for decentralization of internet: prospects, trends, and challenges”. Cluster Computing. 24 (4): 2841–2866. doi:10.1007/s10586-021-03301-8. Archived from the original on September 24, 2022.
[16] S. Haber, W.S. Stornetta, ”How to time-stamp a digital document,” In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991.
[17] Dwork, Cynthia; Naor, Moni (1993). ”Pricing via Processing, Or, Combatting Junk Mail, Advances in Cryptology”. CRYPTO’92: Lecture Notes in Computer Science No. 740. Springer: 139–147
[18] Ellisngson, Annlee. ”Ticketmaster buys marketing platform to help clubs engage with fans”, 2018.