IPFS and friends: A qualitative comparison of next generation peer-to-peer data networks

E Daniel, F Tschorsch - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Decentralized, distributed storage offers a way to reduce the impact of data silos as often
fostered by centralized cloud storage. While the intentions of this trend are not new, the topic …

A traceability analysis of monero's blockchain

A Kumar, C Fischer, S Tople, P Saxena - … 11-15, 2017, Proceedings, Part II …, 2017 - Springer
Privacy and anonymity are important desiderata in the use of cryptocurrencies. Monero—a
privacy centric cryptocurrency has rapidly gained popularity due to its unlinkability and …

DivORAM: Towards a practical oblivious RAM with variable block size

Z Liu, Y Huang, J Li, X Cheng, C Shen - Information Sciences, 2018 - Elsevier
Oblivious RAM (ORAM) is important for applications that require hiding access patterns.
Many ORAM schemes have been proposed but most of them support only storing blocks of …

NewMCOS: Towards a practical multi-cloud oblivious storage scheme

Z Liu, B Li, Y Huang, J Li, Y Xiang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Encryption alone is not enough to protect data privacy, because access pattern leaks some
sensitive information. Oblivious RAM (ORAM), the solution to this problem, is still far from …

Droplet: Decentralized authorization and access control for encrypted data streams

H Shafagh, L Burkhalter, S Ratnasamy… - 29th USENIX Security …, 2020 - usenix.org
This paper presents Droplet, a decentralized data access control service. Droplet enables
data owners to securely and selectively share their encrypted data while guaranteeing data …

ThinORAM: towards practical oblivious data access in fog computing environment

Y Huang, B Li, Z Liu, J Li, SM Yiu… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Oblivious RAM (ORAM) is important for applications that require hiding of access patterns.
However, most of existing implementations of ORAM are very expensive, which are …

[PDF][PDF] Accelerating content routing with bitswap: A multi-path file transfer protocol in ipfs and filecoin

A De la Rocha, D Dias, Y Psaras - San Francisco, CA, USA …, 2021 - research.protocol.ai
Bitswap is a Block Exchange protocol designed for P2P Content Addressable Networks. It
leverages merklelinked graphs in order to parallelize retrieval and verify content integrity …

Deterministic, stash-free write-only oram

DS Roche, A Aviv, SG Choi, T Mayberry - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Write-Only Oblivious RAM (WoORAM) protocols provide privacy by encrypting the contents
of data and also hiding the pattern of write operations over that data. WoORAMs provide …

PEO-Store: Delegation-Proof based Oblivious Storage with Secure Redundancy Elimination

W Tian, G Jian, Z Xu, R Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recently, Oblivious Storage has been proposed to prevent privacy leakage from user
access patterns, which obfuscates and makes it computationally indistinguishable from the …

Review on unstructured peer-to-peer overlay network applications

Y Fazea, ZS Attarbash, F Mohammed… - 2021 International …, 2021 - ieeexplore.ieee.org
Peer-to-Peer (P2P) network is a distributed computing architecture that allows network
devices to share, access files, and folders with everyone or with selected users without …