Decentralized Trusted Storage of Audio-Video Log Data Based on Blockchain Technology and IPFS

. The development of communication and information technology has affected the world of television broadcasting in Indonesia. With the emergence of a new phenomenon, the convergence of digital media industry. The migration of analogue to digital television broadcasting has impacted various industries related to broadcasting. Especially for the sustainability of the television broadcasting community in the country. Station Tv x is one of the television communities, on the other hand the media industry has challenges in managing storage media consisting of audio and video data that has a large capacity. Audio video logs are needed as information on recording audio video files. Blockchain-based Interplenary File System (IPFS) technology is expected to be one of the alternatives that can be applied in the world of broadcasting, storage media and audio video file data distribution methods, data library security and data flexibility are one of the challenges faced in the television broadcasting industry. The purpose of this research is as an effort to decentralise audio video data in distributed storage media to be more optimal and secure. The results of this research can be used to distribute audio video data files in the data library at tv station x.


INTRODUCTION
In recent times, there has been significant attention towards blockchain and decentralized applications (DApps) as they explore the potential of this technology.Some experts view blockchain as the most important IT innovation of our era [1], comparable in importance to the World Wide Web.By utilizing blockchain-based technology, there is a chance to address the challenges faced by the media industry, particularly concerning content availability [2].
Blockchains allow for peer-to-peer transactions without the need for a trusted third party [3].They possess two crucial properties that make them appealing as data stores: immutability, which ensures an auditable record of events that cannot be altered, and redundancy, as exact copies are stored across many independent locations.Ethereum, the second largest blockchain network by market capitalization, was a pioneering platform introducing the concept of smart contracts within a decentralized blockchain network.The Ethereum protocol's accessibility enables anyone with network access to scrutinize the terms and conditions of each contract [4].
Recognizing the potential of smart contracts on the Ethereum blockchain, researchers have explored their application in various DApps.One such DApp aimed to facilitate secure sharing of commodities while preserving privacy and eliminating the need for users to log in multiple times across platforms [4].Additionally, a pilot video rights management system utilized blockchain to combine videos with rights information and facilitate transactions issued by licensors [5].
IPFS is a decentralized peer-to-peer hypermedia protocol designed to store digital content with high integrity and global accessibility.Files stored on IPFS generate file hashes and are stored on the Ethereum blockchain.The hash file stored on the blockchain can then be accessed again by calling the file stored on her IPFS [6].

II. METHODS
The blockchain-based distributed application system adopts the FAST method (Framework for the Application of Systems Techniques) as a guiding approach for analysis and design [7].The FAST methodology encompasses eight distinct phases for analysis and design, which are as follows: 1. Scope Definition.This results in a videoconferencing system that offers a heightened level of security.

2
Hsiao-Shan Huang, et al. [9] 2020 Numerous blockchain methods are focused on addressing the need for distributed transaction recording.Nonetheless, there are certain constraints when it comes to storing substantial files and documents on the blockchain.To overcome this, distributed storage media have been developed specifically to cater to the requirement of storing relatively large volumes of data.
The absence of access control mechanisms in IPFS servers and blockchain networks is apparent.Nevertheless, a secure file-sharing system efficiently manages access control policies, guaranteeing that access to files is restricted to members belonging to specific groups, ensuring that they can only access the files they are authorized to use.

3
Randhir Kumar, et al. [10] 2021 Copyright infringement has a detrimental impact on the interests of copyright holders who have their images and videos uploaded to various websites and peer-to-peer image sharing systems.
Perceptual Hash (pHash) techniques are utilized for identifying piracy in multimedia.When multimedia content is uploaded to IPFS, the system calculates the pHash of the content and subsequently compares it to the existing pHash values on the blockchain network to detect any instances of piracy.

4
Suvadra Barua, et al. [11]  According to the conducted tests, the fake diploma/transcript detection system performs well with 1-5 nodes.However, the optimal throughput value during the diploma/transcript creation and verification process is achieved when using just 1 node.

8
Ananda Rizky Duto Pamungkas, et al. [15] 2021 In this study, we attained a heightened level of security by leveraging the InterPlanetary File System (IPFS), which serves as a peer-to-peer data storage system integrated with the Ethereum blockchain.
Research results prove that IPFS can be used as an additional security for blockchain systems.

9
Irawan, B. [16] 2021 The advancement of information technology has enabled the fulfillment of all payment system requirements, ensuring that processes can be carried out securely and dependably with the aid of blockchain technology.
The Payment Transaction Proof (PTP) system has been developed using blockchain technology, which has significantly increased the security level.The introduction of blockchain ensures that evidence of validated transactions cannot be altered, as the transaction data is securely stored on a distributed ledger, providing tamper resistance to the system's log.

10
Peng Kang, et al. [17] 2022 Piracy of low-quality files is detrimental to the overall goal.
Currently, many organizations rely on a central server to store and manage knowledge files shared by users.However, this approach leads to challenges, such as This approach utilizes the consensus of all participating nodes and shares files on a synchronized blockchain, ensuring traceability throughout the process.the need to hire an untrusted third party for file content inspection and encryption, resulting in opaque file storage processes and potential manipulation of intellectual property rights.Furthermore, the lack of uniform standards for managing intellectual files creates inconsistency across institutions, hindering the establishment of a cohesive and efficient file management system.

III. RESULT AND DISCUSSION
Blockchain can be described as a transaction database that is distributed among multiple nodes, forming a peer-to-peer network.It falls under the category of Distributed Ledger Technology (DLT), and its decentralized nature relies on a consensus protocol to achieve mutual agreement in managing the databases [18].
Ethereum is an evolution of Blockchain technology initially derived from Bitcoin's concept.Its primary objective is to enable more complex computational tasks within the Blockchain framework, surpassing the mere recording of transaction data.Similar to Bitcoin, Ethereum operates as a decentralized digital currency (cryptocurrency) payment system [19].The proposed business process utilizes Ethereum smart contracts to establish a reliable and decentralized repository of audio-video logs, leveraging both blockchain technology and IPFS.It also includes automated participation of report coordinators (korlip) and contributors.Ether serves as the currency unit used for transactions within this system.The e-wallet consists of an account that includes a private key and a public key, serving as the identity for the owner of both the Coverage Coordinator and Contributor accounts.

Figure 1. Sequence Diagram
The actors involved in this system are korlip as a coverage coordinator and contributor as an actor uploading audio video files to DApss kobox, Sequence diagram in Figure 1.2 explains the process of korlipbox (Kobox) service in a system from the preparation phase to the download phase to kontirbutor based on the sequence of processes and stages that need to be done by the coverage coordinator and contributor.
 Preparation Phase      Korlipbox (Kobox) is a media sharing DApps for field workers whose job is to upload content needed for TV Channel X broadcasts, figure 1.6.
In Figure 1.7 contributor 1 uploads an audio video file with a description of bogor 2 material and manages to get a CID Hash value with the suffix "3GJrd", at a different time contributor 2 uploads an audio and video file with a description of bandung 2 material with the same CID Hash value as contributor 1, IPFS maintains reliable data integrity because it does not undergo changes during testing, so these results have fulfilled the aspects of information security based on the (Confidentiality, Integrity, and Availability) Triad Model.

Figure 1 .
Figure 1.Design Architecture System Figure 1.1 describes the flow of uploading an audio-video file to the blockchain network with the following information: 1. Field contributors upload audio video files through the DApps Application browser.2. DApps connect to IPFS to form a CID hash automatically.3. Field contributor gets the hashed CID in the DApps App browser.4. The Hash CID of the DApps is inserted into the Ethereum smart contract.5. Audio Video secure hash data is stored in the Blockchain network.6. Coordinator Opens the CID Hash Link through the browser.7. Coordinator downloads the Hash CID Link via browser/IPFS DESKTOP.8.The Coverage Coordinator makes payments to the contributor's account through the DApps that have been integrated with the metamask e-wallet.9. Contributors get payments through DApps that have been integrated with metamask e-wallets.10.The transaction hash from the DApps is inserted in the Ethereum smart contract.11.Hash CID data is stored in the Blockchain.

Figure 1 .
Figure 1.3 is a display of the ganache local server port configuration that will be used to connect with the metamask e-wallet.

Fig 4 .
Fig 4. is a display of adding a ganache local network and selecting port "ganache8545" as the main network connected to the metamask e-wallet.

Figure 1 .
Figure 1.5 illustrates the outcome of compiling and migrating a smart contract on a local Ganache network using the Truffle and Solidity programming languages.Once the migration process is complete and the contract address is obtained, the provided smart contract will be utilized to interact with DApps in a web browser with the injected Metamask.

Fig 4 .
Fig 4. Smart Contract Compile and Migration

Fig 7 .
Fig 7. Preview and File Download

Figure 1 .
Figure 1.8 shows the hash search mode of IPFS, and contents of CID opened in browser, and shows file downloaded from IPFS.

Figure 1 .
Figure 1.9 shows the information and confirmation of a transaction on Metamask of 1ETH from the Corlip account to Contributor 1's account, as well as the successful transaction proof notification and recording to DApps on the blockchain network.

Fig 9 .Fig 10 .Fig 8
Fig 9. Analysis of Gas Fee Trial against upload phase

Table 1 . 1 Previous Research Table No Authors Year Research issue Research Result
Literature research is a set of activities related to collecting library data, reading, and taking notes, and how research materials are managed.Literature research is research conducted by a researcher by collecting a series of books or journals related to a problem or research goal.This technique is carried out with the aim of exposing various theories related to the issues dealt with and studied as reference material for discussing the research results, another understanding of literature research is to look for theoretical references related to the cases or issues found.