Skip to content

A curated list of proof of storage and decentralized storage resources and links.

License

Notifications You must be signed in to change notification settings

holybao/awesome-decentralized-storage

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

awesome-decentralized-storage

A curated list of proof of storage and decentralized storage resources and links.

  • Proof of Storage Schemes
  • Proof of Space Implementations
  • Decentralized Storage Platforms

Proof of Storage Schemes

  • PDP/Proof of Data Possession
  • PoSE/Proof of Secure Erasure
  • PoRet/Proof of Retrievability
  • PoDR/Proof of Data Replication
  • PoSpace/Proof of Space
  • PoRep/Proof of Replication
  • PoSt/Proof of Spacetime

PDP

  • [1] Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 598-609

  • [2] Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, and Ram Swaminathan. 2007. Auditing to keep online storage services honest. In Proceedings of the 11th USENIX workshop on Hot topics in operating systems (HOTOS'07), Galen Hunt (Ed.). USENIX Association, Berkeley, CA, USA, Article 11 , 6 pages

  • [3] Décio Luiz Gazzoni Filho and Paulo Sérgio Licciardi Messeder Barreto. 2006. Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150

  • [4] Deswarte Y., Quisquater JJ., Saïdane A. (2004) Remote Integrity Checking. In: Jajodia S., Strous L. (eds) Integrity and Internal Control in Information Systems VI. IICIS 2003. IFIP International Federation for Information Processing, vol 140. Springer, Boston, MA

PoSE

  • [1] Karvelas N.P., Kiayias A. (2014) Efficient Proofs of Secure Erasure. In: Abdalla M., De Prisco R. (eds) Security and Cryptography for Networks. SCN 2014. Lecture Notes in Computer Science, vol 8642. Springer, Cham

  • [2] Perito D., Tsudik G. (2010) Secure Code Update for Embedded Devices via Proofs of Secure Erasure. In: Gritzalis D., Preneel B., Theoharidou M. (eds) Computer Security – ESORICS 2010. ESORICS 2010. Lecture Notes in Computer Science, vol 6345. Springer, Berlin, Heidelberg

  • [3] Karvelas, N. P. (2013). Proofs of secure erasure. Athens, Greece: Masters thesis, University of Athens

  • [4] Harry Buhrman, Richard Cleve, Michal Koucký, Bruno Loff, and Florian Speelman. 2014. Computing with a full memory: catalytic space. In Proceedings of the forty-sixth annual ACM symposium on Theory of computing (STOC '14). ACM, New York, NY, USA, 857-866

PoRet

PoDR

PoSpace

PoRep

PoSt

Proof of Space Implementations

  • Burstcoin
  • Chia: Proof of Space and Time, VDF-based PoT
  • SpaceMint
  • SpaceMesh
  • Permacoin: only paper, no implementation
  • BitcoinOre: already dead

Burstcoin

Chia

SpaceMint

SpaceMesh

Permacoin

BitcoinOre

Decentralized Storage Platforms

  • Sia
  • Storj
  • IPFS
  • Filecoin
  • Swarm
  • KopperCoin: only paper, no implementation
  • Retricoin: only paper, no implementation

Sia

Storj

IPFS

Filecoin

Swarm

KopperCoin

Retricoin

Releases

No releases published

Packages

No packages published