Abstract
We present a modest proposal for a blockchain-based consortium to preserve and provide a consistent view of the global integrity of digital information currently scattered across various archives. Based on a number of real-world threats to centralized archives, our design provides increased and frequent integrity checks that can help detect and ameliorate data loss in digital archives.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
There is a copyright on “The Knowledge Trust” name held by the University of North Carolina at Chapel Hill. Thanks to Gary Marchionini for permission for its use in this proposal.
- 2.
- 3.
- 4.
- 5.
References
Amoussou-Guenou, Y., Del Pozzo, A., Potop-Butucaru, M., Tucci-Piergiovanni, S.: Dissecting Tendermint. In: Atig, M.F., Schwarzmann, A.A. (eds.) NETYS 2019. LNCS, vol. 11704, pp. 166–182. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-31277-0_11
Aturban, M., Alam, S., Nelson, M.L., Weigle, M.C.: Archive assisted archival fixity verification framework. In: 2019 ACM/IEEE Joint Conference on Digital Libraries (JCDL), pp. 162–171. IEEE (2019)
Baker, M., et al.: A fresh look at the reliability of long-term digital storage. In: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, pp. 221–234 (2006)
Collomosse, J., et al.: Archangel: trusted archives of digital public documents. In: Proceedings of the ACM Symposium on Document Engineering 2018, pp. 1–4 (2018)
Halpin, H.: Nym credentials: Privacy-preserving decentralized identity with blockchains. In: 2020 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 56–67. IEEE (2020)
Lee, C.A., Kirschenbaum, M., Chassanoff, A., Olsen, P., Woods, K.: Bitcurator: tools and techniques for digital forensics in collecting institutions. D-Lib Mag. 18(5/6), 14–21 (2012)
Maniatis, P., Rosenthal, D.S., Roussopoulos, M., Baker, M., Giuli, T.J., Muliadi, Y.: Preserving peer replicas by rate-limited sampled voting. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 44–59 (2003)
Maniatis, P., Roussopoulos, M., Giuli, T.J., Rosenthal, D.S., Baker, M.: The LOCKSS peer-to-peer digital preservation system. ACM Trans. Comput. Syst. (TOCS) 23(1), 2–50 (2005)
Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: a Comprehensive Introduction. Princeton University Press, Princeton (2016)
Paulevé, L., Jégou, H., Amsaleg, L.: Locality sensitive hashing: A comparison of hash function types and querying mechanisms. Pattern Recogn. Lett. 31(11), 1348–1358 (2010)
Reich, V., Rosenthal, D.S.: LOCKSS (lots of copies keep stuff safe). New Rev. Acad. Librariansh. 6(1), 155–161 (2000)
Rosenthal, D.S., Robertson, T.S., Lipkis, T., Reich, V., Morabito, S.: Requirements for digital preservation systems: a bottom-up approach. arXiv preprint cs/0509018 (2005)
Van de Sompel, H., Nelson, M.L., Sanderson, R., Balakireva, L.L., Ainsworth, S., Shankar, H.: Memento: time travel for the web. arXiv preprint arXiv:0911.1112 (2009)
Troncoso, C., Isaakidis, M., Danezis, G., Halpin, H.: Systematizing decentralization and privacy: lessons from 15 years of research and deployments. Proc. Priv. Enhancing Technol. 4, 307–329 (2017)
Vermaaten, S., Lavoie, B., Caplan, P.: Identifying threats to successful digital preservation: the SPOT model for risk assessment. D-lib Mag. 18(9), 1–21 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Halpin, H. (2022). The Knowledge Trust: A Proposal for a Blockchain Consortium for Digital Archives. In: Silvello, G., et al. Linking Theory and Practice of Digital Libraries. TPDL 2022. Lecture Notes in Computer Science, vol 13541. Springer, Cham. https://doi.org/10.1007/978-3-031-16802-4_35
Download citation
DOI: https://doi.org/10.1007/978-3-031-16802-4_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16801-7
Online ISBN: 978-3-031-16802-4
eBook Packages: Computer ScienceComputer Science (R0)