Skip to content

Latest commit

 

History

History
295 lines (162 loc) · 22.7 KB

README.md

File metadata and controls

295 lines (162 loc) · 22.7 KB

awesome-decentralized-storage

A curated list of proof of storage and decentralized storage resources and links.

  • Proof of Storage Schemes
  • Proof of Space Implementations
  • Decentralized Storage Platforms

Proof of Storage Schemes

  • PDP/Proof of Data Possession
  • PoSE/Proof of Secure Erasure
  • PoRet/Proof of Retrievability
  • PoDR/Proof of Data Replication
  • PoSpace/Proof of Space
  • PoRep/Proof of Replication
  • PoSt/Proof of Spacetime

PDP

  • [1] Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 598-609

  • [2] Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, and Ram Swaminathan. 2007. Auditing to keep online storage services honest. In Proceedings of the 11th USENIX workshop on Hot topics in operating systems (HOTOS'07), Galen Hunt (Ed.). USENIX Association, Berkeley, CA, USA, Article 11 , 6 pages

  • [3] Décio Luiz Gazzoni Filho and Paulo Sérgio Licciardi Messeder Barreto. 2006. Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150

  • [4] Deswarte Y., Quisquater JJ., Saïdane A. (2004) Remote Integrity Checking. In: Jajodia S., Strous L. (eds) Integrity and Internal Control in Information Systems VI. IICIS 2003. IFIP International Federation for Information Processing, vol 140. Springer, Boston, MA

PoSE

  • [1] Karvelas N.P., Kiayias A. (2014) Efficient Proofs of Secure Erasure. In: Abdalla M., De Prisco R. (eds) Security and Cryptography for Networks. SCN 2014. Lecture Notes in Computer Science, vol 8642. Springer, Cham

  • [2] Perito D., Tsudik G. (2010) Secure Code Update for Embedded Devices via Proofs of Secure Erasure. In: Gritzalis D., Preneel B., Theoharidou M. (eds) Computer Security – ESORICS 2010. ESORICS 2010. Lecture Notes in Computer Science, vol 6345. Springer, Berlin, Heidelberg

  • [3] Karvelas, N. P. (2013). Proofs of secure erasure. Athens, Greece: Masters thesis, University of Athens

  • [4] Harry Buhrman, Richard Cleve, Michal Koucký, Bruno Loff, and Florian Speelman. 2014. Computing with a full memory: catalytic space. In Proceedings of the forty-sixth annual ACM symposium on Theory of computing (STOC '14). ACM, New York, NY, USA, 857-866

PoRet

PoDR

PoSpace

PoRep

PoSt

Proof of Space Implementations

  • Burstcoin
  • Chia: Proof of Space and Time, VDF-based PoT
  • SpaceMint
  • SpaceMesh
  • Permacoin: only paper, no implementation
  • BitcoinOre: already dead

Burstcoin

Chia

SpaceMint

SpaceMesh

Permacoin

BitcoinOre

Decentralized Storage Platforms

  • Sia
  • Storj
  • IPFS
  • Filecoin
  • Swarm
  • KopperCoin: only paper, no implementation
  • Retricoin: only paper, no implementation

Sia

Storj

IPFS

Filecoin

Swarm

KopperCoin

Retricoin