<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">EthDrive: A Peer-to-Peer Data Storage with Provenance</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Xiao</forename><surname>Liang</surname></persName>
							<email>mr.y.xiaoliang@ieee.org</email>
						</author>
						<author>
							<persName><forename type="first">Xiwei</forename><surname>Xu</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Bin</forename><surname>Liu</surname></persName>
						</author>
						<author>
							<persName><surname>Data61</surname></persName>
						</author>
						<author>
							<persName><surname>Csiro</surname></persName>
						</author>
						<author>
							<persName><surname>Australia</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">Carnegie Mellon University</orgName>
								<address>
									<settlement>Pittsburgh</settlement>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">The University of Melbourne</orgName>
								<address>
									<settlement>Melbourne</settlement>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">School of Computer Science and Engineering</orgName>
								<orgName type="institution">UNSW</orgName>
								<address>
									<settlement>Sydney</settlement>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">EthDrive: A Peer-to-Peer Data Storage with Provenance</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2ABD695556F5E2A336BAE9D657D5DF98</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T06:11+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Information security</term>
					<term>Data storage systems</term>
					<term>Internet of Things</term>
					<term>Distributed databases</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this digitally connected world, cloud storage plays an important role in allowing users to store, share, and access their les anywhere. The conventional cloud storage is a centralised system that relies on a trusted party to provide all services. Thus, the cloud provider has the ability to manipulate the system including, for example, changing the user's data and upgrading the infrastructure software without informing the users. A centralised authority is also a single point of failure for the entire system from the software architecture perspective. In this paper, we demonstrate EthDrive, which is a peer-to-peer data storage that leverages blockchain to provide data provenance. A peer-to-peer architecture eliminates the centralised authority and achieves high availability since the data is normally replicated on multiple nodes within the network. The blockchain is used to provide a tamper-proof data provenance which could be used to check data integrity. We use an IoT scenario to show the feasibility of EthDrive 5 .</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Cloud storage reduces the need for local storage and enables ecient le sharing. The conventional cloud storage is a centralised system that relies on a trusted party to provide all services. In such a centralised architecture, rst, data on cloud storage is readable, modiable, and deletable by the cloud provider. For example, on 31 Jan 2017, six hours of database data of the famous git repository manager gitlab.com was deleted by just a simple delete command <ref type="foot" target="#foot_1">6</ref> . Second, the availability of the data on cloud storage is questionable <ref type="bibr" target="#b4">[5]</ref> while saving copies to multiple cloud providers to increase data availability needs a considerable eort due to vendor lock-in <ref type="bibr" target="#b0">[1]</ref>.</p><p>In this paper, we propose EthDrive solve those problems. EthDrive is a distributed storage client which allows users to upload, download, and share les. It utilizes content-addressable distributed le system as the underlying storage and blockchain as the distributed database. All les are stored in the distributed storage while the le records are registered on the blockchain. Files are indexed by a unique le ID which is associated with the content address, storage system used, last uploader, last update time, authorised editors, authorised administrators (people who can add and remove editors), immutability (whether the le can be updated or deleted), and comments. That information is stored in the blockchain via a smart contract, which is a program deployed and running across the blockchain network <ref type="bibr" target="#b6">[7]</ref>. Blockchain is an emerging technology that allows participants in an industry ecosystem to transact with each other without relying on a central trusted authority to record and validate transactions <ref type="bibr" target="#b7">[8]</ref>.</p><p>Information in EthDrive is secured because only authorised personnel can mutate particular information. Information like the editor and time of the last update is assigned by smart contract. Any invalid attempt will be denied by the blockchain network. Read access control is enabled by encrypting the content address and/or the le content itself. From the nature of both blockchain and content-addressable distributed le system, high availability is easily achievable while data integrity is guaranteed. In addition, it provides data provenance driven by the distributed consensus which is dicult to achieve for conventional cloud storage without a trust <ref type="bibr" target="#b1">[2]</ref>. EthDrive resolves users' most concerns when using cloud storage <ref type="bibr" target="#b3">[4]</ref> -security, control, vendor lock-in, congurability, and speed to activate new services and expand capacity.</p><p>There are related work which aim to address those problems. Such as, Permacoin <ref type="bibr" target="#b5">[6]</ref>, Sia 7 , and Storj 8 . However, they require currency in the respective blockchain valuable while EthDrive can leverage multiple blockchains with different mechanisms and benet from pre-existing cryptocurrency ecosystem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background</head><p>Conventional Cloud Storage In the scenario of sharing les using conventional cloud storage, cloud provider stores the data uploaded by the le publisher. In this model, it is not transparent to the users about how the cloud provider would deal with those les. File integrity and availability don't often come with their services <ref type="bibr" target="#b2">[3]</ref>. Even le integrity is included in their Service Level Agreement(SLA), le consumers are unable to verify it unless putting extra eorts. For provenance, we can only trust the cloud provider which can be unfavourable <ref type="bibr" target="#b1">[2]</ref>.</p><p>Peer-to-Peer Data Storage and File Sharing Peer-to-peer technology has been used for distributed data storage and le sharing. Such a system allows users to access data that is stored in other computers connected to the same peer-to-peer network. A centralised server is not required. Existing products include BitTorrent<ref type="foot" target="#foot_2">9</ref> , IPFS (InterPlanetary File System)<ref type="foot" target="#foot_3">10</ref> and etc. All these Peer-to-peer techniques use dierent mechanisms to share data with peers and to replicate data across nodes. IPFS is an open source content-addressable, globally (peer-to-peer) distributed le system for sharing a large volume of data with high throughput. IPFS has several limitations, including 1) originality of les cannot be veried, and 2) limited mutability.</p><p>Blockchain The blockchain data structure is a time-stamped list of blocks.</p><p>Blocks are containers that aggregate transactions. The blockchain provides an immutable data storage where existing transactions cannot be updated or deleted. Cryptography and digital signatures are used to prove identity and authenticity. For a basic description and technical details of blockchain, please refer to <ref type="bibr" target="#b7">[8]</ref>. Smart contracts are programs running on blockchain. All interactions with smart contracts are recorded immutably, and veried and accepted by the whole blockchain. Ethereum<ref type="foot" target="#foot_4">11</ref> is the most widely-used blockchain that supports general-purpose (Turing-complete) smart contracts at the time of this research being conducted.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">EthDrive</head><p>By using blockchain as a reliable distributed database with content-addressable peer-to-peer storage, EthDrive guarantees that the les to be downloaded from storage providers are intact. EthDrive is currently based on Ethereum and IPFS. However, it does not couple with these specic implementations. EthDrive is known to facilitate scenarios with no trusted third party or the le content must be identical to the one uploaded by the indicated le uploader. Fig. <ref type="figure">1</ref> gives an overview of EthDrive with all the available commands. File publisher and le consumer need to congure the environment via ethdrive init and start daemon process of EthDrive via ethdrive start before other operations. Users can upload and download les via ethdrive upload and ethdrive download. A user can use ethdrive upload to upload a le, then announce the le ID to allow others to locate the le. A user can also share a le without uploading it when he/she knows the IPFS address of the le via ethdrive upload with --not_provide as argument.</p><p>Every le is retrieved via ethdrive download based on a customised le ID, which is assigned by the le publisher who uploads the rst version of the le. File ID is logical and understandable. Conceptually, a le ID is associated with information including the information publisher, a purpose, and the data related to that purpose. Using dierent naming space is achieved by using other smart contracts with the same interface.</p><p>Read access control is implemented by uploading an encrypted le content address and/or an encrypted le content using symmetrical encryptions. Only personnel having the correct key can download and/or decrypt the le content. Write access control is enforced by the smart contract, which implements a permission control based on the blockchain account addresses. When a user calls the smart contract to modify the le record for a particular le ID, the smart contract checks whether the user has the permission based on the blockchain account public key and the corresponding signature.</p><p>Users could add and get comments via ethdrive comment to/from a le record if the le publisher enabled this feature. Every comment has three information associated, including the le ID it comments on, the comment author and the comment content. Since all comments are stored in the blockchain, the provenance of the comments is assured in the same way as le records. The comment mechanism enables exible interactions between the le author and the comment author. For example, a group of people uses EthDrive to publish an article. Comments are accepted. There are reviewers being invited to review this article. While everyone can post their comments on to the le record, the authors will only concern about the reviewers' reviews (in the form of a comment). By checking the comment authors, those reviews can be identied, authenticated, and conrmed to be intact without a centralised party.</p><p>Any node in the network can become a provider of a certain le via ethdrive provide. Also, people who download the data becomes a temporary provider. The Distributed Hash Table (DHT) of IPFS is able to connect them when a correct data content address is given.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Properties</head><p>Data Integrity Data integrity is achieved because 1) the content address of a le will change when the le is modied and 2) the content address is stored on the blockchain and can only be updated by authorised users.</p><p>Data Availability Both blockchain and content-addressable distributed le system are based on the peer-to-peer network. Users of EthDrive are in the Ethereum blockchain network and IPFS DHT network at the same time. There are two types of le provider in the IPFS network, including permanent providers and temporary providers. Permanent providers are nodes that provide the les. They might be the le publishers or storage provider who have some contracts with the le publishers to help them serve the les. Temporary providers are the ones that have downloaded the le. They will provide the le until the cache is cleaned. There are nodes providing other les which share some common blocks with the le. Such nodes are also providers of parts of the le.</p><p>Traceability The editor and the time of every update are recorded in the smart contract and accepted by the whole blockchain network. Thus, the transactions recorded on the blockchain provide the provenance of the le record. Using the provenance, le consumers are able to conrm that the content is the one that originally comes from the intended le publisher.</p><p>Customisability EthDrive is not coupled with the current implemented smart contract. It can work with the smart contract that implements the dened interfaces. This feature allows dierent logics to be used making EthDrive highly customisable to t dierent situations while modication of the client program is not needed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Limitations</head><p>Limitations of blockchain and IPFS apply to EthDrive. For example, Ethereum blockchain needs to be synchronised before using EthDrive. The database is growing without a bound -synchronisation can be time-consuming and the database might occupy a large space. This can be solved by deploying the light client protocol version of Ethereum which is under development at the time the research is being conducted. The download speed of IPFS can be slow down sometimes because the DHT routing of IPFS is still immature at the time the research is being conducted. However, the famous 51% attack<ref type="foot" target="#foot_5">12</ref> on the blockchain will only aect the data availability property of EthDrive while other main properties are intact.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">IoT Use Case</head><p>This section gives a detailed example to show how EthDrive can improve the quality of data storing in the context of Internet of Things.  Fig. <ref type="figure" target="#fig_1">2 b</ref>) gives a conceptual architecture of IoT using EthDrive. Nodes of the peer-to-peer network are made up of IoT gateways, storage providers, and data consumers. EthDrive provides the provenance of the data and guaranteed data integrity to increase the condence for the data from the data consumers' perspective. The following shows the steps of how EthDrive is used.</p><p>Registration on the network Storage provider registers itself to the network by uploading (ethdrive upload) an empty le named IOT_IDS. The le is used to store the ID of all the IoT gateways which the storage provider decides to provide the les they generate and upload using EthDrive. The le ID represents the storage provider ID on the network. IoT gateway registers itself to the network by uploading an empty le named DATA_IDS. The le is used to store the le ID of all the les the IoT gateway generates and uploads using EthDrive. The le ID represents the IoT gateway ID on the network.</p><p>Registration of a IoT gateway to a storage provider IoT gateway registers itself to a storage provider by adding a comment (ethdrive comment) on the le record whose le ID is the storage provider ID. The storage provider periodically checks if there is any new comment. If there is, the storage provider then decides whether accepts the request. If it accepts, the IoT gateway ID will be added to the le IOT_IDS. The modied le IOT_IDS is then uploaded (ethdrive upload) to replace the old le.</p><p>Data uploading IoT gateway packs data collected from the sensors into a le and uploads (ethdrive upload) it using EthDrive with a le ID. The le ID is added to the le DATA_IDS, then DATA_IDS is uploaded to replace the old le. The storage provider periodically checks for all the IoT gateway IDs registered to see whether they have uploaded any new le. If they do, the storage provider will call ethdrive provide to become a provider of the newly uploaded les.</p><p>Access data EthDrive uses a le ID to locate the data content address in Blockchain. If it is encrypted, data consumer will supply the correct key to EthDrive to get (ethdrive get) the data content address. Then, it downloads the data to the data consumer's local storage. If the data integrity is corrupted, the data will not be available since the IPFS component of EthDrive won't be able to locate it by the data content address stored in the blockchain. The time of upload and the data publisher can be veried by retrieving the le record information via ethdrive query.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Performance Data</head><p>Uploading les via ethdrive upload only creates a transaction for storing the le content address on to the Ethereum blockchain and uploads the le content to the local IPFS node. Thus, there is no network latency for ethdrive upload.</p><p>We conducted an experiment to evaluate the performance of downloading les using ethdrive download. In this experiment, we compared the download performance between EthDrive and a conventional cloud storage, AWS S3<ref type="foot" target="#foot_6">13</ref> in US standard region. We deployed four EthDrive nodes in four locations: Hong Kong, Tokyo (Japan), Sydney (Australia) and Pittsburgh (USA). The locations are selected so that they are geographically distinct to simulate a global peerto-peer network. The test les are generated by a random data generator. We queried IPFS network and conrmed that there is no block in the test les shared with any pre-existing le on the network. All the test les are provided by three providers. An Ethereum private blockchain is used. which is expected because the retrieval of le content address is done on the local blockchain data. Most of the time EthDrive spent is for downloading the les from the IPFS network. The yellow column (Ethereum Lookup Time) in Fig. <ref type="figure" target="#fig_2">3</ref> is too small to be viewable. In this experiment, EthDrive is faster than AWS S3 when the le size ≤ 20MB and is slower when the le size &gt; 30MB. This shows that IPFS is not handling large les eciently at the time of this experiment being conducted. This result suggests that when the le size is small, additional features provided by EthDrive doesn't come with a performance penalty.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion and Future Work</head><p>By utilizing blockchain and content-addressable distributed storage, the demonstrated EthDrive can have all the basic requirements for a reliable cloud storage fullled. It includes le integrity, reliable permission control, and high availability. In addition, EthDrive provides custom le ID as a means to locate the les to facilitate easy access, sharing and management, and comment mechanism to increase its versatility. For our future work, the following features/functions can be implemented on top of the current version: 1) An extension which allows users to pay to particular parties to have them provide certain les to ensure the minimum availability of those les. The payment will be done automatically when they are providing the le and terminated when they do not. 2) After integrating with other content-addressable distributed le systems, les can be downloaded from all the networks concurrently to boost the performance. 3) Mount les ltered by some conditions to the le system via Filesystem in Userspace (FUSE) to facilitate convenient use. We also plan to evaluate EthDrive more systematically through using additional evaluation criteria.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. IoT Data Storing Architecture Fig. 2 a) shows IoT using conventional cloud storage, which includes sensors, IoT gateways, and a cloud storage. Sensors are used to collect data. IoT gateways are presented to aggregate sensor data, translate sensor protocols and process sensor data before data is sent to the cloud storage. We assume IoT gateways don't have enough storage for storing the data generated. Cloud storage providers are responsible for storing and distributing the data generated from the sensors. Fig. 2 b) gives a conceptual architecture of IoT using EthDrive. Nodes of the peer-to-peer network are made up of IoT gateways, storage providers, and data consumers. EthDrive provides the provenance of the data and guaranteed data integrity to increase the condence for the data from the data consumers' perspective. The following shows the steps of how EthDrive is used.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. The Experiment Result</figDesc><graphic coords="7,167.81,443.44,276.66,136.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Overview of EthDrive Ethdrive Blockchain network P2P file system network File publisher File consumer Connect to network via [ethdrive start]</head><label></label><figDesc></figDesc><table><row><cell cols="2">Fig. 1. • init</cell><cell>•</cell><cell>init</cell></row><row><cell>•</cell><cell>start</cell><cell>•</cell><cell>get</cell></row><row><cell>•</cell><cell>upload</cell><cell>•</cell><cell>start</cell></row><row><cell>•</cell><cell>comment</cell><cell>•</cell><cell>query</cell></row><row><cell></cell><cell></cell><cell>•</cell><cell>download</cell></row><row><cell></cell><cell></cell><cell>•</cell><cell>comment</cell></row><row><cell cols="2">7 https://sia.tech/ 8 https://storj.io/</cell><cell></cell><cell></cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_0">The demo video for EthDrive is available at http://video.ethdrive.org/latest. The alpha version of EthDrive is now available at npm (http://dist.ethdrive. org/latest). The website for EthDrive is at http://ethdrive.org.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_1">The announcement from gitlab.com can access at https://about.gitlab.com/ 2017/02/01/gitlab-dot-com-database-incident/ X. Franch, J. Ralyté, R. Matulevičius, C. Salinesi, and R. Wieringa (Eds.): CAiSE 2017 Forum and Doctoral Consortium Papers, pp. 25-32, 2017.Copyright 2017 for this paper by its authors. Copying permitted for private and academic purposes.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="9" xml:id="foot_2">http://www.bittorrent.com/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="10" xml:id="foot_3">https://ipfs.io/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="11" xml:id="foot_4">https://www.ethereum.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="12" xml:id="foot_5">The general term refers to a situation where malicious miners have more mining power than honest miners do</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="13" xml:id="foot_6">https://aws.amazon.com/s3/</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Racs: a case for cloud storage diversity</title>
		<author>
			<persName><forename type="first">H</forename><surname>Abu-Libdeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Princehouse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Weatherspoon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st ACM symposium on Cloud computing</title>
				<meeting>the 1st ACM symposium on Cloud computing</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page">229240</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Securing Data Provenance in the Cloud</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Asghar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ion</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Russello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Crispo</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Springer</publisher>
			<biblScope unit="page">145160</biblScope>
			<pubPlace>Berlin Heidelberg; Berlin, Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Home is safer than the cloud!: privacy concerns for consumer cloud storage</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ion</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Sachdeva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kumaraguru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Apkun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Seventh Symposium on Usable Privacy and Security</title>
				<meeting>the Seventh Symposium on Usable Privacy and Security</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page">13</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A survey on cloud storage</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ju</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JCP</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page">17641771</biblScope>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Improving storage availability in cloud-of-clouds with hybrid redundant data distribution</title>
		<author>
			<persName><forename type="first">B</forename><surname>Mao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Jiang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Parallel and Distributed Processing Symposium</title>
				<imprint>
			<date type="published" when="2015-05">2015. May 2015</date>
			<biblScope unit="page">633642</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Permacoin: Repurposing bitcoin work for data preservation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Juels</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Parno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Katz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Security and Privacy (SP), 2014 IEEE Symposium on</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page">475490</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Cryptocurrencies, smart contracts, and articial intelligence</title>
		<author>
			<persName><forename type="first">S</forename><surname>Omohundro</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">AI Matters</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2014-12">Dec. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Swan</surname></persName>
		</author>
		<title level="m">Blockchain: Blueprint for a New Economy</title>
				<meeting><address><addrLine>US</addrLine></address></meeting>
		<imprint>
			<publisher>O&apos;Reilly</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
