A protocol for storage limitations and upgrades in decentralised networks

Research output: Contribution to conferenceProceeding

1 Citation (Scopus)
105 Downloads (Pure)

Abstract

Within the MaidSafe distributed network, users are able to store mutable and immutable data, which will remain accessible on the network in a distributed hash table, essentially forever. This raises an obvious question as to how to restrict malicious parties from making use of excessive network resources, in order to ensure the storage capacity of the network is not quickly depleted by a small number of users making excessive use of storage. Such activity risks preventing legitimate use of the network. This paper explores two possible means of secure storage quota management on such a decentralised network, and presents the concept of manager verification. It then presents a protocol-based solution to allow users to purchase extra storage from other users in a decentralised network, with irrepudiable and non-forgeable agreements, which are verifiable by any third party.
Original languageEnglish
DOIs
Publication statusPublished - 9 Sep 2014
Event7th International Conference on the Security of Information and Networks (SIN14) - University of Glasgow, Glasgow, United Kingdom
Duration: 9 Sep 201411 Sep 2014

Conference

Conference7th International Conference on the Security of Information and Networks (SIN14)
CountryUnited Kingdom
CityGlasgow
Period9/09/1411/09/14

    Fingerprint

Keywords

  • distributed storage
  • security
  • decentralised control
  • networks
  • MaidSafe distributed network
  • storage quota management
  • manager verification

Cite this

Paul, G., & Irvine, J. (2014). A protocol for storage limitations and upgrades in decentralised networks. 7th International Conference on the Security of Information and Networks (SIN14), Glasgow, United Kingdom. https://doi.org/10.1145/2659651.2659724