{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:29Z","timestamp":1750220069234,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3594556.3594625","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T21:34:46Z","timestamp":1694554486000},"page":"75-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Avoiding the 1 TB Storage Wall: Leveraging Ethereum\u2019s DHT to Reduce Peer Storage Needs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8280-0014","authenticated-orcid":false,"given":"Jean-Philippe","family":"Eisenbarth","sequence":"first","affiliation":[{"name":"SnT, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0435-3909","authenticated-orcid":false,"given":"Thibault","family":"Cholez","sequence":"additional","affiliation":[{"name":"CNRS, Inria, LORIA, Universite de Lorraine, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7919-4949","authenticated-orcid":false,"given":"Olivier","family":"Perrin","sequence":"additional","affiliation":[{"name":"CNRS, Inria, LORIA, Universite de Lorraine, France"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Scalability Challenge of Ethereum: An Initial Quantitative Analysis. In 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE). 167\u2013176","author":"Bez Mirko","year":"2019","unstructured":"Mirko Bez , Giacomo Fornari , and Tullio Vardanega . 2019 . The Scalability Challenge of Ethereum: An Initial Quantitative Analysis. In 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE). 167\u2013176 . https:\/\/doi.org\/10.1109\/SOSE.2019.00031 10.1109\/SOSE.2019.00031 Mirko Bez, Giacomo Fornari, and Tullio Vardanega. 2019. The Scalability Challenge of Ethereum: An Initial Quantitative Analysis. In 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE). 167\u2013176. https:\/\/doi.org\/10.1109\/SOSE.2019.00031"},{"key":"e_1_3_2_1_2_1","volume-title":"Detection and Mitigation of Localized Attacks in a Widely Deployed P2P Network. Peer-to-Peer Networking and Applications 6 (June","author":"Cholez Thibault","year":"2012","unstructured":"Thibault Cholez , Isabelle Chrisment , Olivier Festor , and Guillaume Doyen . 2012. Detection and Mitigation of Localized Attacks in a Widely Deployed P2P Network. Peer-to-Peer Networking and Applications 6 (June 2012 ). https:\/\/doi.org\/10.1007\/s12083-012-0137-7 10.1007\/s12083-012-0137-7 Thibault Cholez, Isabelle Chrisment, Olivier Festor, and Guillaume Doyen. 2012. Detection and Mitigation of Localized Attacks in a Widely Deployed P2P Network. Peer-to-Peer Networking and Applications 6 (June 2012). https:\/\/doi.org\/10.1007\/s12083-012-0137-7"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS52497.2021.9569812"},{"volume-title":"Peer-to-Peer Systems(Lecture Notes in Computer Science)","author":"Douceur R.","key":"e_1_3_2_1_4_1","unstructured":"John\u00a0 R. Douceur . 2002. The Sybil Attack . In Peer-to-Peer Systems(Lecture Notes in Computer Science) , Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Springer , Berlin, Heidelberg , 251\u2013260. https:\/\/doi.org\/10.1007\/3-540-45748-8_24 10.1007\/3-540-45748-8_24 John\u00a0R. Douceur. 2002. The Sybil Attack. In Peer-to-Peer Systems(Lecture Notes in Computer Science), Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Springer, Berlin, Heidelberg, 251\u2013260. https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09676-2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831152"},{"key":"e_1_3_2_1_7_1","volume-title":"Exploring Ethereum\u2019s Data Stores: A Cost and Performance Comparison. In 2021 3rd Conference on Blockchain Research Applications for Innovative Networks and Services (BRAINS). 53\u201360","author":"Kostamis Periklis","year":"2021","unstructured":"Periklis Kostamis , Andreas Sendros , and Pavlos Efraimidis . 2021 . Exploring Ethereum\u2019s Data Stores: A Cost and Performance Comparison. In 2021 3rd Conference on Blockchain Research Applications for Innovative Networks and Services (BRAINS). 53\u201360 . https:\/\/doi.org\/10.1109\/BRAINS52497.2021.9569804 10.1109\/BRAINS52497.2021.9569804 Periklis Kostamis, Andreas Sendros, and Pavlos Efraimidis. 2021. Exploring Ethereum\u2019s Data Stores: A Cost and Performance Comparison. In 2021 3rd Conference on Blockchain Research Applications for Innovative Networks and Services (BRAINS). 53\u201360. https:\/\/doi.org\/10.1109\/BRAINS52497.2021.9569804"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"e_1_3_2_1_9_1","first-page":"236","article-title":"Low-Resource Eclipse Attacks on Ethereum\u2019s Peer-to-Peer Network","volume":"2018","author":"Marcus Yuval","year":"2018","unstructured":"Yuval Marcus , Ethan Heilman , and Sharon Goldberg . 2018 . Low-Resource Eclipse Attacks on Ethereum\u2019s Peer-to-Peer Network . IACR Cryptology ePrint Archive 2018 (2018), 236 . Yuval Marcus, Ethan Heilman, and Sharon Goldberg. 2018. Low-Resource Eclipse Attacks on Ethereum\u2019s Peer-to-Peer Network. IACR Cryptology ePrint Archive 2018 (2018), 236.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_10_1","volume-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric","author":"Maymounkov Petar","year":"2002","unstructured":"Petar Maymounkov and David Mazi\u00e8res . 2002 . Kademlia: A Peer-to-Peer Information System Based on the XOR Metric . In Peer-to-Peer Systems, Gerhard Goos, Juris Hartmanis, Jan van Leeuwen, Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Vol.\u00a02429. Springer Berlin Heidelberg , Berlin, Heidelberg, 53\u201365. https:\/\/doi.org\/10.1007\/3-540-45748-8_5 10.1007\/3-540-45748-8_5 Petar Maymounkov and David Mazi\u00e8res. 2002. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Peer-to-Peer Systems, Gerhard Goos, Juris Hartmanis, Jan van Leeuwen, Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Vol.\u00a02429. Springer Berlin Heidelberg, Berlin, Heidelberg, 53\u201365. https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"key":"e_1_3_2_1_11_1","volume-title":"Radu State, and Andrea Cullen","author":"Norvill Robert","year":"2018","unstructured":"Robert Norvill , Beltran\u00a0Borja Fiz\u00a0Pontiveros , Radu State, and Andrea Cullen . 2018 . IPFS for Reduction of Chain Size in Ethereum. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) . 1121\u20131128. https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00204 10.1109\/Cybermatics_2018.2018.00204 Robert Norvill, Beltran\u00a0Borja Fiz\u00a0Pontiveros, Radu State, and Andrea Cullen. 2018. IPFS for Reduction of Chain Size in Ethereum. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). 1121\u20131128. https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00204"},{"volume-title":"Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing(Lecture Notes on Data Engineering and Communications Technologies), Valentina\u00a0E","author":"Poornima\u00a0Devi P.","key":"e_1_3_2_1_12_1","unstructured":"P. Poornima\u00a0Devi , Srinivasan\u00a0Ananthanarayanan Bragadeesh , and Arumugam Umamakeswari . 2021. Secure Data Management Using IPFS and Ethereum . In Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing(Lecture Notes on Data Engineering and Communications Technologies), Valentina\u00a0E . Balas, Aboul\u00a0Ella Hassanien, Satyajit Chakrabarti, and Lopa Mandal (Eds.). Springer , Singapore , 565\u2013578. https:\/\/doi.org\/10.1007\/978-981-33-4968-1_44 10.1007\/978-981-33-4968-1_44 P. Poornima\u00a0Devi, Srinivasan\u00a0Ananthanarayanan Bragadeesh, and Arumugam Umamakeswari. 2021. Secure Data Management Using IPFS and Ethereum. In Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing(Lecture Notes on Data Engineering and Communications Technologies), Valentina\u00a0E. Balas, Aboul\u00a0Ella Hassanien, Satyajit Chakrabarti, and Lopa Mandal (Eds.). Springer, Singapore, 565\u2013578. https:\/\/doi.org\/10.1007\/978-981-33-4968-1_44"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3284764.3284769"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290168.1290176"},{"key":"e_1_3_2_1_15_1","unstructured":"Lee Thomas. 2016. BlockchainIllustrations\/Ethereum at Master \u00b7 4c656554\/BlockchainIllustrations. https:\/\/github.com\/4c656554\/BlockchainIllustrations.  Lee Thomas. 2016. BlockchainIllustrations\/Ethereum at Master \u00b7 4c656554\/BlockchainIllustrations. https:\/\/github.com\/4c656554\/BlockchainIllustrations."},{"key":"e_1_3_2_1_16_1","volume-title":"Computers & Security 88 (Jan","author":"Xu Guangquan","year":"2020","unstructured":"Guangquan Xu , Bingjiang Guo , Chunhua Su , Xi Zheng , Kaitai Liang , Duncan\u00a0 S. Wong , and Hao Wang . 2020. Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum . Computers & Security 88 (Jan . 2020 ), 101604. https:\/\/doi.org\/10.1016\/j.cose.2019.101604 10.1016\/j.cose.2019.101604 Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng, Kaitai Liang, Duncan\u00a0S. Wong, and Hao Wang. 2020. Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum. Computers & Security 88 (Jan. 2020), 101604. https:\/\/doi.org\/10.1016\/j.cose.2019.101604"},{"volume-title":"Blockchain \u2013 ICBC 2018(Lecture Notes in Computer Science), Shiping Chen, Harry Wang, and Liang-Jie Zhang (Eds.)","author":"Zhang Huijuan","key":"e_1_3_2_1_17_1","unstructured":"Huijuan Zhang , Chengxin Jin , and Hejie Cui . 2018. A Method to Predict the Performance and Storage of Executing Contract for Ethereum Consortium-Blockchain . In Blockchain \u2013 ICBC 2018(Lecture Notes in Computer Science), Shiping Chen, Harry Wang, and Liang-Jie Zhang (Eds.) . Springer International Publishing , Cham , 63\u201374. https:\/\/doi.org\/10.1007\/978-3-319-94478-4_5 10.1007\/978-3-319-94478-4_5 Huijuan Zhang, Chengxin Jin, and Hejie Cui. 2018. A Method to Predict the Performance and Storage of Executing Contract for Ethereum Consortium-Blockchain. In Blockchain \u2013 ICBC 2018(Lecture Notes in Computer Science), Shiping Chen, Harry Wang, and Liang-Jie Zhang (Eds.). Springer International Publishing, Cham, 63\u201374. https:\/\/doi.org\/10.1007\/978-3-319-94478-4_5"},{"key":"e_1_3_2_1_18_1","first-page":"000","volume-title":"An Innovative IPFS-Based Storage Model for Blockchain. In 2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). 704\u2013708","author":"Zheng Qiuhong","year":"2018","unstructured":"Qiuhong Zheng , Yi Li , Ping Chen , and Xinghua Dong . 2018 . An Innovative IPFS-Based Storage Model for Blockchain. In 2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). 704\u2013708 . https:\/\/doi.org\/10.1109\/WI.2018. 000 - 008 10.1109\/WI.2018.000-8 Qiuhong Zheng, Yi Li, Ping Chen, and Xinghua Dong. 2018. An Innovative IPFS-Based Storage Model for Blockchain. In 2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). 704\u2013708. https:\/\/doi.org\/10.1109\/WI.2018.000-8"}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594625","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594556.3594625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:07Z","timestamp":1750183747000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594625"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":18,"alternative-id":["10.1145\/3594556.3594625","10.1145\/3594556"],"URL":"https:\/\/doi.org\/10.1145\/3594556.3594625","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}