IPFS and friends: A qualitative comparison of next generation peer-to-peer data networks
E Daniel, F Tschorsch - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Decentralized, distributed storage offers a way to reduce the impact of data silos as often
fostered by centralized cloud storage. While the intentions of this trend are not new, the topic …
fostered by centralized cloud storage. While the intentions of this trend are not new, the topic …
A traceability analysis of monero's blockchain
Privacy and anonymity are important desiderata in the use of cryptocurrencies. Monero—a
privacy centric cryptocurrency has rapidly gained popularity due to its unlinkability and …
privacy centric cryptocurrency has rapidly gained popularity due to its unlinkability and …
DivORAM: Towards a practical oblivious RAM with variable block size
Oblivious RAM (ORAM) is important for applications that require hiding access patterns.
Many ORAM schemes have been proposed but most of them support only storing blocks of …
Many ORAM schemes have been proposed but most of them support only storing blocks of …
NewMCOS: Towards a practical multi-cloud oblivious storage scheme
Encryption alone is not enough to protect data privacy, because access pattern leaks some
sensitive information. Oblivious RAM (ORAM), the solution to this problem, is still far from …
sensitive information. Oblivious RAM (ORAM), the solution to this problem, is still far from …
Droplet: Decentralized authorization and access control for encrypted data streams
This paper presents Droplet, a decentralized data access control service. Droplet enables
data owners to securely and selectively share their encrypted data while guaranteeing data …
data owners to securely and selectively share their encrypted data while guaranteeing data …
ThinORAM: towards practical oblivious data access in fog computing environment
Oblivious RAM (ORAM) is important for applications that require hiding of access patterns.
However, most of existing implementations of ORAM are very expensive, which are …
However, most of existing implementations of ORAM are very expensive, which are …
[PDF][PDF] Accelerating content routing with bitswap: A multi-path file transfer protocol in ipfs and filecoin
A De la Rocha, D Dias, Y Psaras - San Francisco, CA, USA …, 2021 - research.protocol.ai
Bitswap is a Block Exchange protocol designed for P2P Content Addressable Networks. It
leverages merklelinked graphs in order to parallelize retrieval and verify content integrity …
leverages merklelinked graphs in order to parallelize retrieval and verify content integrity …
Deterministic, stash-free write-only oram
Write-Only Oblivious RAM (WoORAM) protocols provide privacy by encrypting the contents
of data and also hiding the pattern of write operations over that data. WoORAMs provide …
of data and also hiding the pattern of write operations over that data. WoORAMs provide …
PEO-Store: Delegation-Proof based Oblivious Storage with Secure Redundancy Elimination
Recently, Oblivious Storage has been proposed to prevent privacy leakage from user
access patterns, which obfuscates and makes it computationally indistinguishable from the …
access patterns, which obfuscates and makes it computationally indistinguishable from the …
Review on unstructured peer-to-peer overlay network applications
Y Fazea, ZS Attarbash, F Mohammed… - 2021 International …, 2021 - ieeexplore.ieee.org
Peer-to-Peer (P2P) network is a distributed computing architecture that allows network
devices to share, access files, and folders with everyone or with selected users without …
devices to share, access files, and folders with everyone or with selected users without …