CipherFlow Storage: Encrypted File Exchange across Distributed Content Networks
DOI:
https://doi.org/10.64751/ajaccm.2026.v6.n2.pp530-538Keywords:
Blockchain, IPFS, ECIES, ChaCha20, Decentralized File Sharing, Smart Contracts, Data Security.Abstract
The exponential increase in digital data exchange and online communication has intensified the need for secure, transparent, and dependable file-sharing systems. Critical information such as financial records, healthcare data, confidential documents, and research outputs is frequently transmitted across distributed networks, where conventional centralized storage models introduce significant vulnerabilities. These traditional systems rely on single-point control, making them prone to data breaches, unauthorized access, service disruptions, and integrity violations. Furthermore, they lack transparency and robust audit mechanisms, raising concerns about data reliability and trustworthiness during storage and transmission. To overcome these limitations, this work proposes a decentralized and secure file-sharing framework that integrates blockchain technology, the Inter-Planetary File System (IPFS), and cryptographic techniques. The system ensures data confidentiality by encrypting files using the Elliptic Curve Integrated Encryption Scheme (ECIES) before storing them in the distributed IPFS network. Instead of placing the actual data on-chain, only essential metadata including file hash, ownership details, timestamps, and access permissions is maintained within a smart contract on the Ethereum blockchain. This design guarantees immutability, traceability, and protection against tampering, while enabling fine-grained access control. In addition to secure storage, the framework incorporates ChaCha20-based symmetric encryption to evaluate and compare computational performance with asymmetric methods. The combination of decentralized storage, cryptographic security, and immutable ledger technology eliminates reliance on centralized authorities, thereby reducing single points of failure and enhancing system resilience. The proposed approach ensures that only authorized entities can access and decrypt shared content while maintaining transparency of file transactions.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.







