Blockstack : A New Internet for Decentralized Applications

The traditional internet has many central points of failure and trust, like (a) the Domain Name System (DNS) servers, (b) public-key infrastructure, and (c) end-user data stored on centralized data stores. We present the design and implementation of a new internet, called Blockstack, where users don’t need to trust remote servers. We remove any trust points from the middle of the network and use blockchains to secure critical data bindings. Blockstack implements services for identity, discovery, and storage and can survive failures of underlying blockchains. The design of Blockstack is informed by three years of experience from a large blockchain-based production system. Blockstack gives comparable performance to traditional internet services and enables a much-needed security and reliability upgrade to the traditional internet.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Keith W. Ross,et al.  The KaZaA Overlay : A Measurement Study , 2004 .

[3]  David Mazières,et al.  Democratizing Content Publication with Coral , 2004, NSDI.

[4]  Xin Xu,et al.  Beyond random walk and metropolis-hastings samplers: why you should not backtrack for unbiased graph sampling , 2012, SIGMETRICS '12.

[5]  Michael Walfish,et al.  Semantic-Free Referencing in Linked Distributed Systems , 2003, IPTPS.

[6]  Jude C. Nelson,et al.  Extending Existing Blockchains with Virtualchain , 2016 .

[7]  A Survey of Peer-to-Peer Networks , 2005 .

[8]  David Mazières,et al.  Separating key management from file system security , 1999, SOSP.

[9]  Markus Jakobsson,et al.  Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.

[10]  Ralf Steinmetz,et al.  The eDonkey File-Sharing Network , 2004, GI Jahrestagung.

[11]  Muneeb Ali,et al.  Blockstack: A Global Naming and Storage System Secured by Blockchains , 2016, USENIX Annual Technical Conference.

[12]  William Yurcik,et al.  A survey of peer-to-peer storage techniques for distributed file systems , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[13]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[14]  Arvind Narayanan,et al.  An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design , 2015, WEIS.

[15]  Emin Gün Sirer,et al.  Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays , 2004, NSDI.

[16]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[17]  Muneeb Ali,et al.  Bootstrapping Trust in Distributed Systems with Blockchains , 2016, login Usenix Mag..

[18]  Bengt Carlsson,et al.  The Rise and Fall of Napster - An Evolutionary Approach , 2001, Active Media Technology.

[19]  Michael J. Freedman,et al.  Experiences with CoralCDN: A Five-Year Operational View , 2010, NSDI.

[20]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[21]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[22]  M. Frans Kaashoek,et al.  Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.

[23]  David Mazières,et al.  Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems , 2007, NSDI.