A protocol for storage limitations and upgrades in decentralised networks

Research output: Contribution to conferenceProceedingpeer-review

1 Citation (Scopus)
113 Downloads (Pure)

Abstract

Within the MaidSafe distributed network, users are able to store mutable and immutable data, which will remain accessible on the network in a distributed hash table, essentially forever. This raises an obvious question as to how to restrict malicious parties from making use of excessive network resources, in order to ensure the storage capacity of the network is not quickly depleted by a small number of users making excessive use of storage. Such activity risks preventing legitimate use of the network. This paper explores two possible means of secure storage quota management on such a decentralised network, and presents the concept of manager verification. It then presents a protocol-based solution to allow users to purchase extra storage from other users in a decentralised network, with irrepudiable and non-forgeable agreements, which are verifiable by any third party.
Original languageEnglish
DOIs
Publication statusPublished - 9 Sept 2014
Event7th International Conference on the Security of Information and Networks (SIN14) - University of Glasgow, Glasgow, United Kingdom
Duration: 9 Sept 201411 Sept 2014

Conference

Conference7th International Conference on the Security of Information and Networks (SIN14)
Country/TerritoryUnited Kingdom
CityGlasgow
Period9/09/1411/09/14

Keywords

  • distributed storage
  • security
  • decentralised control
  • networks
  • MaidSafe distributed network
  • storage quota management
  • manager verification

Fingerprint

Dive into the research topics of 'A protocol for storage limitations and upgrades in decentralised networks'. Together they form a unique fingerprint.

Cite this