2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.538
|View full text |Cite
|
Sign up to set email alerts
|

A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe

Abstract: The emergence of decentralized crypto currencies such as Bitcoin and the success of the anonymizing network TOR lead to an increased interest in peer-to-peer based technologies lately-not only due to the prevalent deployment of mass network surveillance technologies by authorities around the globe. While today's application services typically employ centralized client/server architectures that require the user to trust the service provider, new decentralized platforms that eliminate this need of trust are on t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Paul et al [64] provide a first security analysis of SAFE in 2014, concerning confidentiality, integrity and availability as well as possible attacks. In 2015 Jacob et al [65] analyzed the security of the network with respect to authenticity, integrity, confidentiality, availability, and anonymity. The authors explained how the self-authentication and the decentralized nature could be potentially exploited to reveal personal data of single entities.…”
Section: Secure Access For Everyone (Safe)mentioning
confidence: 99%
“…Paul et al [64] provide a first security analysis of SAFE in 2014, concerning confidentiality, integrity and availability as well as possible attacks. In 2015 Jacob et al [65] analyzed the security of the network with respect to authenticity, integrity, confidentiality, availability, and anonymity. The authors explained how the self-authentication and the decentralized nature could be potentially exploited to reveal personal data of single entities.…”
Section: Secure Access For Everyone (Safe)mentioning
confidence: 99%
“…However, in that paper, how to restore the owner's data when the peer storages are disconnected is not considered. In papers [13], [14], to recover the disconnected data from the peer storages, the owner generates and stores the backup data for the peer storages. Therefore, each of the peer storages in the P2P helps each other to repair when one of the data in the P2P storage is broken.…”
Section: Distributed Storage Without Server Storagementioning
confidence: 99%
“…As for the incentive, the proposed scheme can be applied to the commercial distributed storage services such as Maidsafe [13] and Storj [17]. The reason is that the peer, which just provides its storage without saving its data to other peers, exists in the proposed scheme.…”
Section: Incentive and Paymentmentioning
confidence: 99%
See 2 more Smart Citations