A protocol for storage limitations and upgrades in decentralised networks

Research output: Contribution to conferenceProceedingpeer-review

1 Citation (Scopus)
110 Downloads (Pure)


Within the MaidSafe distributed network, users are able to store mutable and immutable data, which will remain accessible on the network in a distributed hash table, essentially forever. This raises an obvious question as to how to restrict malicious parties from making use of excessive network resources, in order to ensure the storage capacity of the network is not quickly depleted by a small number of users making excessive use of storage. Such activity risks preventing legitimate use of the network. This paper explores two possible means of secure storage quota management on such a decentralised network, and presents the concept of manager verification. It then presents a protocol-based solution to allow users to purchase extra storage from other users in a decentralised network, with irrepudiable and non-forgeable agreements, which are verifiable by any third party.
Original languageEnglish
Publication statusPublished - 9 Sep 2014
Event7th International Conference on the Security of Information and Networks (SIN14) - University of Glasgow, Glasgow, United Kingdom
Duration: 9 Sep 201411 Sep 2014


Conference7th International Conference on the Security of Information and Networks (SIN14)
Country/TerritoryUnited Kingdom


  • distributed storage
  • security
  • decentralised control
  • networks
  • MaidSafe distributed network
  • storage quota management
  • manager verification

Cite this