Abstract
The article studies the architectures of the modern systems of decentralized data storage and processing, applicability of the blockchain technology in these systems, existing security threats in comparison with the decentralized systems, and methods of security assurance allowing avoidance of these threats.
Similar content being viewed by others
REFERENCES
Personal Cloud Storage and Synchronization, ABI Research, 2013. https://www.abiresearch.com/market-research/product/1016355-personal-cloud-storage-and-synchronization/. Accessed March 1, 2018.
MaidSafe Distributed Hash Table, 2010. http://docs.maidsafe.net/Whitepapers/pdf/MaidSafeDistributedHashTable.pdf. Accessed March 1, 2018.
Storj, A peer-to-peer Cloud Storage Network, 2016. https://storj.io/storj.pdf. Accessed March 2, 2018.
Safecoin: The Decentralised Network Token, 2015. https://docs.maidsafe.net/Whitepapers/pdf/Safecoin.pdf. Accessed March 2, 2018.
ACKNOWLEDGMENTS
The study was performed in the frames of the grant of the President of the Russia Federation for state support of the leading scientific schools of the Russian Federation NSH-2992.2018.9 (Contract no. 14.Y31.18.2992-NSH dated January 17, 2018).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Translated by Yu. Bezlepkina
About this article
Cite this article
Zegzhda, D.P., Moskvin, D.A. & Myasnikov, A.V. Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology. Aut. Control Comp. Sci. 52, 1111–1116 (2018). https://doi.org/10.3103/S0146411618080400
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411618080400