Pages:
Author

Topic: Stashware: a secure and permanent decentralized storage platform - page 4. (Read 1418 times)

hero member
Activity: 2030
Merit: 578
No God or Kings, only BITCOIN.
By the way, I can't find your subreddit and the link as well on your site is broken and it can't be found.

I agree with TimeTeller because community is the one that drives far most on the development of the project with the suggestions they put in and promotion too. Is this only been worked by two hardworking developers or there more numbers included?
hero member
Activity: 2744
Merit: 588
Website released  Grin Grin Grin

You now can visit https://stashware.net/ for all the news and info about this fascinating project.

Download the latest technical and economic papers in:

https://stashware.net/technical-paper.pdf

https://stashware.net/token-economic.pdf

And don't forget that you can ask us any questions you have about stashware and decentralized storage networks.

You need to post all the vital links on the OP as it is the first post the users will check.
And if you have connections with this project, let them know that it is better to have a representative here in the forum.
For them to answer questions directly and know the sentiments of their potential customers.
Because without their supporters, it would be hard for them to thrive in crypto market.
newbie
Activity: 62
Merit: 0
In our technical whitepaper we also analyzed Filecoin one of the first DSN.

Filecoin is an open-source, cryptocurrency and decentralized storage system. It aims to be a blockchain-based cooperative digital storage and data retrieval method that targeting to replace HTTP.

This project is owned by Protocol Labs and builds on top of IPFS, allowing users to rent their free and hard drive devices. However, it is not capable for permissioning access to protected content.

The Filecoin DSN protocol can be implemented on top of any consensus protocol that allows for verification of the Filecoins proofs.

It allows periodically producing cryptographic proofs ensuring that they are providing the required capacity. In Filecoin, not only are miners given token rewards for hosting files, but they must prove that they are continuously replicating the files for more secure storage.

They are also rewarded for distributing content quickly the miner that can do this the fastest ends up with the tokens.

One of the disadvantages of Filecoin is customers have to pay for storage and retrieval of their own file.

Also, Filecoin is lack of an incentivization layer that can help in its mass adoption of modern decentralized storage technology.

Although it plans to add smart contract capabilities in the future there is no indication that this will be Ethereum-based, thus losing the benefit of access to the largest community of developers and tools for smart contracts.

Some problems of Filecoin that need to be solved are as follows:
- A technique and proof of evidence is needed to confirm the customers data has been deleted by the nodes (storage miners) after data retrieval so only customers have access to it from that point on.
- Bridges or connections that operate outside of the blockchain and allow communication between different blockchain technologies will have to be invented so that smart contracts can function on the Filecoin blockchain.
- How to verify the security and privacy of stored data and ensure the nodes has notretrieved by decrypting the customer‘s confidential data during storage.
- There is no clear mechanism that storage providers and storage retrievers will be efficiently rewarded and incentivized that they try to protect their reputation and not to act in a malicious way.
newbie
Activity: 62
Merit: 0
Today we are going to analyze the weak points of a little less known platform that is Lightchain focused in Ethereum Blockchain + IPFS.

Lightchain is an Ethereum-compatible blockchain which aims to provide privacy-enabled, contentsharing (movies, music, documents, blogs, posts, and other digital assets etc) on blockchain.
Lightstreams provides its own MainNet network, and a testnet called sirius. It is a permissioned decentralized storage system and uses proof of authority as consensus mechanism that restrains exchange from having a lot of nodes. It is also based on IPFS for uncapped and free data storage.
It provides Ethereum for smart contracts and Tendermint infrastructure for blockchain Proof of Authority. Private and large sized files are stored decentrally using the IPFS protocol with an additional security layer for protecting access to content.
newbie
Activity: 62
Merit: 0
Let's continue analyzing the ecosystem of DNS and how Stashware has solved the weakness that had other DNS:

Today is Storj one of the big projects in the ecosystem

Storj is another decentralized storage project which is built on the Ethereum network. This project has quite many community users and is dedicated to the open-source and user-experience ethos.
Storj provides a platform, cryptocurrency, and suite of decentralized applications that provides customers to keep data in a secure and decentralized manner.
Storj uses the Ethereum public chain to achieve the consensus, without its own consensus algorithm.
Storj‘s storage technology involves file sharing, similarly to torrents working approach and separates parts of the files to users in the network. User‘s files are encrypted before uploading.
Customers has their own private key to validate the ownership. As soon as a customer wants retrieve his/her file, they request it and Storj uses a distributed hash tables to locate all the shards and piece them together.

  • Some disadvantages of Storj project are no storage marketplace for dynamic pricing,
  • single point of failure of the Storj service through storj bridges ,
  • more subjected to vulnerabilities (like dDOS attacks) due to the fragmented solution./li]
newbie
Activity: 62
Merit: 0
Let's review the actual state of art of Decentralized Storage Networks and which problems have previous solutions.

Siacoin

Siacoin is a blockchain-based decentralized storage platform. It is introduced by a Nebulous Inc company.
Siacoin stores the data by dividing into some fragments then perform cryptographic encryption for distributing it across Sia decentralized network.
Sia project uses proof of storage as a consensus mechanism.

The target of Siacoin is to reducing the overhead costs of cloud storages significantly by allowing users to host or in a sense rent out their free/unused storages and hard drives. Therefore
many people are calling this project as “Airbnb of hard drives”. By offering low-cost and decentralized storage solutions, Sia project has set out to disrupt some big players in the industry such as Amazon A3, Onedrive, Dropbox and Google Drive.

Some of limitations of Siacoin project are:

  • difficult to scale and handle large data volumes due to blockchain limitations requires the download the entire blockchain first in order to become a miner
  • the previous requisite requires a lot of space and hours of synchronization.
  • requires a deposit of SIA coin before-hand in order to rent space on the network
  • only allows the payment with the native SIA cryptocurrency
  • lower ease-of use for both traditional companies
newbie
Activity: 62
Merit: 0
File Contracts and IPFS

Stashware use Interplanetary File System to keep your data safe. IPFS is one of the key technologies in the field of decentralized web. Do you want to know how Stashware interact with IPFS?

A file contract is an agreement between a IPFS provider and the end users with the use of smart contract on Stashware (See Fig 3). The digital contents of files are stored on the IPFS and the IPFS hashes (merkle hash tree) are stored into the blockchain smart contracts to provide traceability and authenticity. To construct a file’s Merkle root hash, the file is split into fragments of constant size and hashed into a Merkle tree.

The root hash, along with the total size of the file, is used to verify the existence of storage. More specifically, the hash generated on storing the documents to IPFS, can be stored in the smart contracts effectively and documents can be accessed using the hash. If there is any change in the content of the digital document, the hash changes, to show that the original content was modified and altered.

In smart contracts, it can also be specified a duration, challenge frequency, and payout parameters, including the reward for a valid proof, the reward for an invalid or missing proof,
and the maximum number of proofs that can be missed. The challenge frequency specifies how often a storage proof must be submitted, and creates discrete challenge windows during
which a host must submit storage proofs (one proof per window). Contracts define a maximum number of proofs that can be missed; if this number is exceeded, the contract becomes invalid.
If the contract is still valid at the end of the contract duration, it successfully terminates and any remaining coins are sent to the valid proof address.

Conversely, if the contract funds are exhausted before the duration elapses, or if the maximum number of missed proofs is exceeded, the contract unsuccessfully terminates and any remaining coins are sent to the missed proof address.
newbie
Activity: 62
Merit: 0
Stashware Roadmap

One of the most secure elements of a project is its future prospects.

Therefore we invite you to visit the stashware roadmap on our website.
https://stashware.net/about-roadmap.html

After intensive development, we have a full year of improvements and new features in the future.

For this third quarter we set these important objectives to achieve

Testnet development and demonstration
Front end development including explorer, gateway
Back end development
Testnet Beta version

Get to know all the news on our website and on our social networks
newbie
Activity: 62
Merit: 0
Website released  Grin Grin Grin

You now can visit https://stashware.net/ for all the news and info about this fascinating project.

Download the latest technical and economic papers in:

https://stashware.net/technical-paper.pdf

https://stashware.net/token-economic.pdf

And don't forget that you can ask us any questions you have about stashware and decentralized storage networks.
newbie
Activity: 62
Merit: 0
Whitepaper of Stashware Token economy released

At Stashware we know that for a community to engage in a network it needs a fair and interesting reward system.

Network members and miners are responsible for storing and verifying transactions and should therefore be rewarded.

Making data secure and permanently available in a decentralized network is possible thanks to Stashware, all at a very low cost.

In the following paper you can see what Stashware's token economy is based on.

Token Economy v.6: https://stashware.net/token-economic.pdf



Know a little more of our token (SWR)

The Stashware network uses a token, the scarcity of which is enforced through the consensus mechanism of the stashware data structure. The token’s main unit is the SWR, with subunit stashy, where

1 SWR = 1,000,000,000,000 stashy.

Total supply: about 60,000,000 SWR (all for mining).



Block Generation Time

2.5 minute/blocks.

576 blocks/day.

210,240 blocks/year

840,960/ four year
newbie
Activity: 62
Merit: 0
Stashware has even more features of security to protect the data of the users.

Signature aggregation: The data will be split into chunks and will be signed by the user. In order to improve efficiency of Stashware, we aim to utilize signatures that allow signature aggregation (e.g., Boneh-Lynn-Shacham (BLS) or Schnorr signatures).

Efficient hierarchical access control mechanisms: The data can require to be a hierarchical structure (like a tree-like structure) such that certain data can only be retrieval for a specific attribute/role of a user.

Efficient data sharing mechanisms: Encrypted data should be shared with anyone in an efficient manner (e.g, without being downloaded). Stashware provide an efficient mechanism using so called proxy re-encryption schemes which are used to transform ciphertexts without compromising any security and privacy issues under untrustworthy environments.

Security against offline attack: Our security methods will provide semantic security which provides randomized encryption and prevents any types of offline attacks.
newbie
Activity: 62
Merit: 0
Security and Privacy Services of Stashware

Security and Privacy is in the core of Stashware. In this post we'll see which features includes since launch.

There is no confidentiality for traditional cloud storage providers since they have the full control of user data and fully access user files. This is certainly not appreciated by users and enterprises because of sensitivity of private data. Therefore, it is very crucial to store the data (as well as the metadata) in encrypted form as well as give the full control to the user.

Therefore, Stashware provides the state of the art efficient encryption methods (e.g., a signcryption method which is a public-key primitive that signs and encrypts the data simultaneously). The user has fully control of his/her encryption keys. Our encrypted has the following advantages with respect to its competitors:
• Confidentiality: Any external including internal adversaries (e.g., Stashware) could monitor the data moving in memory before it is stored in disk. Data (as well as the metadata) must be encrypted before it reaches Stashware and must always remain encrypted while in Stashware. Secure even if the end application or user accounts are breached.
• Integrity: The data must not be changed without the user consent. Prevent any unauthorized ormalicious modification, manipulation or deletion Malicious users cannot deny having signed the message.
Agile Cryptography: Stashware will provide novel agile cryptography services which aim to meet current and future data security demands. Therefore, the Stashware platform will allow system flexibility and the ability to adapt quickly to newly developed cryptographic algorithms in an efficient and scalable manner.
• Efficient key management: The encryption key management should be designed in such a way that end users have shared control on the keys for data decryption.
• Data at rest: If the user data is sensitive then it should be encrypted on client side so that no one including Stashware can access the data without being detected.
• Authenticity and Integrity: Provide efficient signcryption methods (to provide both integrity and confidentiality of data as well as authenticity an efficient manner).
newbie
Activity: 62
Merit: 0
Thanx dlubarov.

Welcome to Stashware thread were we will inform about this new project of Decentralized Storage Network with great improvements in the Consensus Mechanism and security features. Solving some of the problems and performances issues the other DSN.

Here you can find the most relevant info about the project.

Visit our website at https://stashware.net/ for the most recent updates and news about the project.

For Read or download the latest technical and economic papers visit:



Social Media Channels:

Medium: https://medium.com/@stashware
Twitter: @stashwarenet
newbie
Activity: 2
Merit: 0
I'm posting this announcement on behalf of Borja Javier Lanza Lopez:

A Secure and Permanent Decentralized Storage Platform for Borderless Economy

Stashware is a new solution in the field of decentralised storage networks. It uses a huge distributed and disseminated network of decentralized devices that are not controlled by a single entity or authority. While using the latest technologies in cryptography to ensure data privacy. Stashware focuses on providing large, permanent storage capacity that is resistant to attack and censorship at a minimum cost of storage, maintenance, bandwidth and services without dependency on a specific vendor.

Lastest technologies for a new future

Stashware's technical team carefully analyzed the current solutions and future needs, improving the existing state of the art of Decentralized Storage Networks (DSN) by offering a robust, reliable and versatile platform. The following whitepaper describes the proposed platform in detail.

Stashware adopts account based model for its transaction structure and it also support Smart contract for decentralized application.

Stashware is developed in Golang a language used in the most cutting-edge developments of decentralized web 3.0, with multiple advantages in security, concurrency and connectivity. The platform will support IPv4 and IPv6, with an inter-node protocol based on an API - RESTFUL.

Consensus algorithm

Stashware is based on a combination of PoC, PoS and PoA as consensus mechanisms.

In Stashware, the consensus algorithm run between nodes is the improved version of proof of capacity (PoC) with proof of stake (PoS), abbreviated as iPoC. In this consensus, any node with staking at least multiple of 20.000 Stashware coin (SWR) can be a miner. A miner can be selected as validator for confirming the created block or can be creator to publish the block.

The most secure stash for any type of data

Stashware provides the following security services:

  • confidentiality of key
  • integrity of data
  • compromise authentication
  • compromise access control
  • impersonation of existing users

Stashware will provide any user friendly and transparent open source tools to ensure and fulfill all of the customers’ security and privacy concerns.

Join our subreddit for discussion: r/stashware
Pages:
Jump to: