FileDES: A Secure Scalable and Succinct Decentralized Encrypted Storage Network (2403.14985v1)
Abstract: Decentralized Storage Network (DSN) is an emerging technology that challenges traditional cloud-based storage systems by consolidating storage capacities from independent providers and coordinating to provide decentralized storage and retrieval services. However, current DSNs face several challenges associated with data privacy and efficiency of the proof systems. To address these issues, we propose FileDES (\uline{D}ecentralized \uline{E}ncrypted \uline{S}torage), which incorporates three essential elements: privacy preservation, scalable storage proof, and batch verification. FileDES provides encrypted data storage while maintaining data availability, with a scalable Proof of Encrypted Storage (PoES) algorithm that is resilient to Sybil and Generation attacks. Additionally, we introduce a rollup-based batch verification approach to simultaneously verify multiple files using publicly verifiable succinct proofs. We conducted a comparative evaluation on FileDES, Filecoin, Storj and Sia under various conditions, including a WAN composed of up to 120 geographically dispersed nodes. Our protocol outperforms the others in terms of proof generation/verification efficiency, storage costs, and scalability.
- P. Labs. (2017) Filecoin: A decentralized storage network.
- D. Vorick and L. Champine, “Sia: Simple decentralized storage,” Retrieved May, vol. 8, p. 2018, 2014.
- S. Wilkinson, T. Boshevski, J. Brandoff, and V. Buterin, “Storj a peer-to-peer cloud storage network,” 2014.
- the Swarm team. (2021) Swarm: Storage and communication infrastructure for a self-sovereign digital society. [Online]. Available: https://www.ethswarm.org/swarm-whitepaper.pdf
- H. Kopp, D. Mödinger, F. Hauck, F. Kargl, and C. Bösch, “Design of a privacy-preserving decentralized file storage with financial incentives,” in 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2017, pp. 14–22.
- G. Korpal and D. Scott, “Decentralization and web3 technologies,” 2022.
- Y. Psaras and D. Dias, “The interplanetary file system and the filecoin network,” in 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S). IEEE, 2020, pp. 80–80.
- C. Systems. (2023) Chainsafe storage. [Online]. Available: ttps://chainsafe.io/
- J. Benet, D. Dalrymple, and N. Greco, “Proof of replication,” Protocol Labs, July, vol. 27, p. 20, 2017.
- B. Fisch, “Tight proofs of space and replication,” in Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II 38. Springer, 2019, pp. 324–348.
- Fisch, Ben, “Poreps: Proofs of space on useful data,” Cryptology ePrint Archive, 2018.
- L. Ren and S. Devadas, “Proof of space from stacked expanders,” in Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I 14. Springer, 2016, pp. 262–285.
- H. Guo, M. Xu, J. Zhang, C. Liu, D. Yu, S. Dustdar, and X. Cheng, “Filedag: A multi-version decentralized storage network built on dag-based blockchain,” arXiv preprint arXiv:2212.09096, 2022.
- M. Würsten and C. Cachin, “Filecoin consensus,” 2022.
- K. Nikitin, E. Kokoris-Kogias, P. Jovanovic, N. Gailly, L. Gasser, I. Khoffi, J. Cappos, and B. Ford, “Chainiac: Proactive software-update transparency via collectively signed skipchains and verified builds.” in USENIX Security Symposium, 2017, pp. 1271–1287.
- A. Dubovitskaya, Z. Xu, S. Ryu, M. Schumacher, and F. Wang, “Secure and trustable electronic medical records sharing using blockchain,” in AMIA annual symposium proceedings, vol. 2017. American Medical Informatics Association, 2017, p. 650.
- J. Benet, “Ipfs-content addressed, versioned, p2p file system (draft 3),” arXiv preprint arXiv:1407.3561, 2014.
- N. Ferguson, S. Lucks, B. Schneier, D. Whiting, M. Bellare, T. Kohno, J. Callas, and J. Walker, “The skein hash function family,” Submission to NIST (round 3), vol. 7, no. 7.5, p. 3, 2010.
- G. Wood et al., “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum project yellow paper, vol. 151, no. 2014, pp. 1–32, 2014.
- I. Keidar, E. Kokoris-Kogias, O. Naor, and A. Spiegelman, “All you need is dag,” in Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, ser. PODC’21. New York, NY, USA: Association for Computing Machinery, 2021, pp. 165–175. [Online]. Available: https://doi.org/10.1145/3465084.3467905
- B. Zhang, H. Cui, Y. Chen, X. Liu, Z. Yu, and B. Guo, “Enabling secure deduplication in encrypted decentralized storage,” in Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings. Springer, 2022, pp. 459–475.
- M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings 32. Springer, 2013, pp. 296–312.
- A. Ismail, M. Toohey, Y. C. Lee, Z. Dong, and A. Y. Zomaya, “Cost and performance analysis on decentralized file systems for blockchain-based applications: State-of-the-art report,” in 2022 IEEE International Conference on Blockchain (Blockchain). IEEE, 2022, pp. 230–237.
- B. Shen, J. Guo, and Y. Yang, “Medchain: Efficient healthcare data sharing via blockchain,” Applied sciences, vol. 9, no. 6, p. 1207, 2019.
- M. Xu, Z. Zou, Y. Cheng, Q. Hu, D. Yu, and X. Cheng, “Spdl: A blockchain-enabled secure and privacy-preserving decentralized learning system,” IEEE Transactions on Computers, vol. 72, no. 2, pp. 548–558, 2023.
- Y. Hu, S. Kumar, and R. A. Popa, “Ghostor: Toward a secure data-sharing system from decentralized trust.” in NSDI, 2020, pp. 851–877.
- C. Liu, H. Guo, M. Xu, S. Wang, D. Yu, J. Yu, and X. Cheng, “Extending on-chain trust to off-chain – trustworthy blockchain data collection using trusted execution environment (tee),” IEEE Transactions on Computers, vol. 71, no. 12, pp. 3268–3280, 2022.
- M. Castro, B. Liskov et al., “Practical byzantine fault tolerance,” in OsDI, vol. 99, no. 1999, 1999, pp. 173–186.