Distributed Decentralized Domain Name Service

We present D3NS, a system to replace the current top level DNS system and certificate authorities, offering increased scalability, security and robustness. D3NS is based on a distributed hash table and utilizes a domain name ownership system based on the Bitcoin blockchain. It addresses previous criticism that a DHT would not suffice as a DNS replacement. D3NS provides solutions to current DNS vulnerabilities such as DDOS attacks, DNS spoofing and censorship by local governments. D3NS eliminates the need for certificate authorities by providing a decentralized authenticated record of domain name ownership. Unlike previous DNS replacement proposals, D3NS is reverse compatible with DNS and allows for incremental implementation within the current system.

[1]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[2]  Robert Tappan Morris,et al.  Serving DNS Using a Peer-to-Peer Lookup Service , 2002, IPTPS.

[3]  Haiying Shen IRM: Integrated File Replication and Consistency Maintenance in P2P Systems , 2010, IEEE Trans. Parallel Distributed Syst..

[4]  Mark A. Lemley,et al.  Don't Break the Internet , 2012 .

[5]  Michael Bedford Taylor,et al.  Bitcoin and the age of Bespoke Silicon , 2013, 2013 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES).

[6]  Torben Weis,et al.  Measurement of Globally Visible DNS Injection , 2014, IEEE Access.

[7]  Daniel Massey,et al.  A Comparative Study of the DNS Design with DHT-Based Alternatives , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[8]  Nils J. Nilsson,et al.  A Formal Basis for the Heuristic Determination of Minimum Cost Paths , 1968, IEEE Trans. Syst. Sci. Cybern..

[9]  Franz Aurenhammer,et al.  Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.

[10]  R. Harrison,et al.  A Distributed Greedy Heuristic for Computing Voronoi Tessellations with Applications Towards Peer-to-Peer Networks , 2015, 2015 IEEE International Parallel and Distributed Processing Symposium Workshop.

[11]  David Blacka,et al.  Clarifications and Implementation Notes for DNS Security (DNSSEC) , 2013, RFC.

[12]  D. F. Watson Computing the n-Dimensional Delaunay Tesselation with Application to Voronoi Polytopes , 1981, Comput. J..

[13]  Haiying Shen IRM: Integrated File Replication and Consistency Maintenance in P2P Systems , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.

[14]  Nicollette Brandt,et al.  Stop Online Piracy Act , 2012 .

[15]  Emin Gün Sirer,et al.  The design and implementation of a next generation name service for the internet , 2004, SIGCOMM '04.