Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System
Abstract
:1. Introduction
2. Background
2.1. MQTT
- Broker: The broker is the central hub that mediates the communication between publishers and subscribers on given topics.
- Publisher: A publisher is a client that sends messages to the broker labeled with given topics.
- Subscriber: A subscriber is a client that receives messages from the broker. Subscribers express interest in one or more topics and receive messages related to those topics.
- QoS 0: At most one delivery.
- QoS 1: At least one delivery.
- QoS 2: Exactly one delivery.
2.2. Blockchain and IPFS
2.2.1. Blockchain
2.2.2. IPFS
2.2.3. Integration with Blockchain
3. Related Works
3.1. MQTT Security
3.2. Lack of End-to-End Security in MQTT
4. Motivations and Use Cases
- We aim to achieve the integrity of the flow of messages exchanged between publishers and subscribers. This property should be preserved even in the case of an attacker being able to intercept the communication and tamper with it. This attacker can also be placed at the broker.
- We aim to achieve accountability guarantees. Specifically, in our solution, once the integrity of the exchanged flow is proven, the sender of a flow of messages (either a publisher or the broker) cannot deny having sent it. This property, known as non-repudiation, is essential for maintaining accountability.
5. The Proposed Approach
5.1. Notation
5.2. Setup Phase
Listing 1. Solidity Smart Contract for handling the mapping between the root of the MHT and the IPFS address. |
5.3. Communication Phase
5.4. Verification Phase
5.5. Final Remarks
6. Cost Analysis of Smart Contract Execution
6.1. Gas Costs Overview
6.2. Cost Breakdown and Business Model Implications
6.3. Cost Analysis of System Maintenance per Client
6.3.1. Cost Calculation Model
- Number of publishers
- Number of subscribers
- Frequency of round time (a higher frequency implies invoking the addRootIPFSAddress function more often)
- Frequency of alarms (a higher frequency implies invoking the pullTheAlarm function more often)
- One round per day per publisher (blue)
- One round per week per publisher (orange)
- One round per month per publisher (green)
6.3.2. Discussion
7. Experiments
7.1. Experimental Setup
7.2. Performance Analysis
7.3. Discussions
8. Security Analysis
8.1. Security Assumptions
- Account Ownership: The ownership of Ethereum accounts used by publishers, subscribers, and the broker is guaranteed. We assume there are no impersonation activities, i.e., an attacker cannot take over a participant’s account.
- Hash Function Properties: The hash functions used for the construction of hashchains and Merkle hash trees (MHT) are collision and pre-image resistant. This means that it is computationally unlikely to find two different inputs that produce the same hash (collision resistance) or to find an input whose hash matches a given output (pre-image resistance).
8.2. Adversary Model
- the attacker can modify at least one of the exchanged messages;
- the attacker can inject at least one message in the exchanged flow;
- the attacker can delete at least one of the exchanged messages;
- the attacker can change the order of at least one message in the exchanged flow;
8.3. Security Properties
- End-to-end data flow integrity: This concept was first formalized in [9]. Our aim is to achieve not only the integrity of each exchanged message but also the integrity of the entire flow of exchanged messages.
- Accountability: This property ensures that publishers and brokers cannot deny having sent a flow of messages after it has been sent.
- the flow of messages published by the publisher/broker can be traced back to it in a verifiable manner.
- the publisher/broker cannot deny the publication of a flow once it has been sent.
- Completeness: all the messages sent by a publisher are also received by the subscribers;
- Correctness: all the messages received by the subscribers are correct, in the sense that, for instance, there are no new messages added by an attacker, i.e., messages that are not present in the original message flow sent by the publisher;
- Weak Liveness: the order of the messages received by the subscribers is preserved.
8.4. Achieving Security Properties
8.4.1. Preserving End-to-End Data Flow Integrity
8.4.2. Preserving Accountability
9. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
MQTT | Message queuing telemetry transport |
IPFS | Interplanetary file system |
QoS | Quality of service |
MHT | Merkle hash tree |
DHT | Distributed hash table |
P2P | Peer-to-peer |
TLS | Transport layer security |
ACN | Anonymous communication network |
CP-ABE | Cipertext-policy attribute-based encryption |
KP-ABE | Key-policy attribute-based encryption |
USD | United States dollars |
References
- Lazzaro, S.; De Angelis, V.; Mandalari, A.M.; Buccafurri, F. Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. In Proceedings of the 2024 IEEE International Conference on Pervasive Computing and Communications (PerCom), Biarritz, France, 11–15 March 2024; pp. 114–124. [Google Scholar] [CrossRef]
- Maskeliūnas, R.; Damaševičius, R.; Segal, S. A Review of Internet of Things Technologies for Ambient Assisted Living Environments. Future Internet 2019, 11, 259. [Google Scholar] [CrossRef]
- Li, J.; Maiti, A.; Fei, J. Features and Scope of Regulatory Technologies: Challenges and Opportunities with Industrial Internet of Things. Future Internet 2023, 15, 256. [Google Scholar] [CrossRef]
- Lupia, F.; Lucchese, M.; Merro, M.; Zannone, N. ICS Honeypot Interactions: A Latitudinal Study. In Proceedings of the 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy, 15–18 December 2023; pp. 3025–3034. [Google Scholar]
- Lucchese, M.; Lupia, F.; Merro, M.; Paci, F.; Zannone, N.; Furfaro, A. HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems. In Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES ’23, New York, NY, USA, 29 August–1 September 2023. [Google Scholar] [CrossRef]
- OASIS. MQTT Version 5.0 2019. Available online: https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-v5.0.html (accessed on 10 July 2024).
- Gündoğan, C.; Kietzmann, P.; Lenders, M.; Petersen, H.; Schmidt, T.C.; Wählisch, M. NDN, CoAP, and MQTT: A comparative measurement study in the IoT. In Proceedings of the 5th ACM Conference on Information-Centric Networking, ICN ’18, New York, NY, USA, 21–23 September 2018; pp. 159–171. [Google Scholar] [CrossRef]
- Buccafurri, F.; De Angelis, V.; Lazzaro, S. MQTT-A: A Broker-Bridging P2P Architecture to Achieve Anonymity in MQTT. IEEE Internet Things J. 2023, 10, 15443–15463. [Google Scholar] [CrossRef]
- Buccafurri, F.; De Angelis, V.; Lazzaro, S. MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT. IEEE Trans. Dependable Secur. Comput. 2024, 1–18. [Google Scholar] [CrossRef]
- Panwar, A.; Bhatnagar, V. Distributed Ledger Technology (DLT): The Beginning of a Technological Revolution for Blockchain. In Proceedings of the 2nd International Conference on Data, Engineering and Applications (IDEA), Bhopal, India, 28–29 February 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Hamilton, M. Blockchain distributed ledger technology: An introduction and focus on smart contracts. J. Corp. Account. Financ. 2020, 31, 7–12. [Google Scholar] [CrossRef]
- Kushwaha, S.S.; Joshi, S.; Singh, D.; Kaur, M.; Lee, H.N. Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access 2022, 10, 6605–6621. [Google Scholar] [CrossRef]
- Benet, J. Ipfs-content addressed, versioned, p2p file system. arXiv 2014, arXiv:1407.3561. [Google Scholar]
- Daniel, E.; Tschorsch, F. IPFS and friends: A qualitative comparison of next generation peer-to-peer data networks. IEEE Commun. Surv. Tutor. 2022, 24, 31–52. [Google Scholar] [CrossRef]
- Sanka, A.I.; Cheung, R.C. A systematic review of blockchain scalability: Issues, solutions, analysis and future research. J. Netw. Comput. Appl. 2021, 195, 103232. [Google Scholar] [CrossRef]
- Zheng, Q.; Li, Y.; Chen, P.; Dong, X. An Innovative IPFS-Based Storage Model for Blockchain. In Proceedings of the 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI), Santiago, Chile, 3–6 December 2018; pp. 704–708. [Google Scholar] [CrossRef]
- Toldinas, J.; Lozinskis, B.; Baranauskas, E.; Dobrovolskis, A. MQTT Quality of Service versus Energy Consumption. In Proceedings of the 2019 23rd International Conference Electronics, Palanga, Lithuania, 17–19 June 2019; pp. 1–4. [Google Scholar] [CrossRef]
- Sun, J.; Yao, X.; Wang, S.; Wu, Y. Non-Repudiation Storage and Access Control Scheme of Insurance Data Based on Blockchain in IPFS. IEEE Access 2020, 8, 155145–155155. [Google Scholar] [CrossRef]
- Anthal, J.; Choudhary, S.; Shettiyar, R. Decentralizing File Sharing: The Potential of Blockchain and IPFS. In Proceedings of the 2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT), Gharuan, India, 5–6 May 2023; pp. 773–777. [Google Scholar] [CrossRef]
- Khatal, S.; Rane, J.; Patel, D.; Patel, P.; Busnel, Y. FileShare: A Blockchain and IPFS Framework for Secure File Sharing and Data Provenance. In Proceedings of the Advances in Machine Learning and Computational Intelligence; Patnaik, S., Yang, X.S., Sethi, I.K., Eds.; Springer: Singapore, 2021; pp. 825–833. [Google Scholar]
- Bawane, H.; Shinde, T.; Kadam, A.; Budukh, Y.; Mundhe, P. Ethegram-an ethereum and ipfs-based decentralized social network system. Int. Res. J. Eng. Technol. 2020, 7, 1978–1982. [Google Scholar]
- Buccafurri, F.; De Angelis, V.; Idone, M.F.; Labrini, C. A protocol for anonymous short communications in social networks and its application to proximity-based services. Online Soc. Netw. Media 2022, 31, 100221. [Google Scholar] [CrossRef]
- Patel, C.; Doshi, N. A novel MQTT security framework in generic IoT model. Procedia Comput. Sci. 2020, 171, 1399–1408. [Google Scholar] [CrossRef]
- Perrone, G.; Vecchio, M.; Pecori, R.; Giaffreda, R. The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices. In Proceedings of the IoTBDS, Porto, Portugal, 24–26 April 2017; pp. 246–253. [Google Scholar]
- Mendez Mena, D.; Papapanagiotou, I.; Yang, B. Internet of things: Survey on security. Inf. Secur. J. Glob. Perspect. 2018, 27, 162–182. [Google Scholar] [CrossRef]
- Dierks, T.; Allen, C. The TLS Protocol Version 1.0. RFC 1999, 2246, 1–80. [Google Scholar]
- Prantl, T.; Iffländer, L.; Herrnleben, S.; Engel, S.; Kounev, S.; Krupitzer, C. Performance impact analysis of securing MQTT using TLS. In Proceedings of the ACM/SPEC International Conference on Performance Engineering, Virtual Event, France, 19–23 April 2021; pp. 241–248. [Google Scholar]
- Mathews, S.P.; Gondkar, R.R. Protocol Recommendation for Message Encryption in MQTT. In Proceedings of the 2019 International Conference on Data Science and Communication (IconDSC), Bangalore, India, 1–2 March 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Su, W.T.; Chen, W.C.; Chen, C.C. An Extensible and Transparent Thing-to-Thing Security Enhancement for MQTT Protocol in IoT Environment. In Proceedings of the 2019 Global IoT Summit (GIoTS), Aarhus, Denmark, 17–21 June 2019; pp. 1–4. [Google Scholar] [CrossRef]
- Ahamed, J.; Zahid, M.; Omar, M.; Ahmad, K. AES and MQTT based security system in the internet of things. J. Discret. Math. Sci. Cryptogr. 2019, 22, 1589–1598. [Google Scholar] [CrossRef]
- Shin, S.; Kobara, K.; Chuang, C.C.; Huang, W. A security framework for MQTT. In Proceedings of the 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 17–19 October 2016; pp. 432–436. [Google Scholar] [CrossRef]
- Sadio, O.; Ngom, I.; Lishou, C. Lightweight Security Scheme for MQTT/MQTT-SN Protocol. In Proceedings of the 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Granada, Spain, 22–25 October 2019; pp. 119–123. [Google Scholar] [CrossRef]
- Dinculeană, D.; Cheng, X. Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices. Appl. Sci. 2019, 9, 848. [Google Scholar] [CrossRef]
- Oak, A.; Daruwala, R. Assessment of Message Queue Telemetry and Transport (MQTT) protocol with Symmetric Encryption. In Proceedings of the 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, 15–17 December 2018; pp. 5–8. [Google Scholar] [CrossRef]
- Iyer, S.; Bansod, G.V.; Naidu, P.; Garg, S. Implementation and Evaluation of Lightweight Ciphers in MQTT Environment. In Proceedings of the 2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Msyuru, India, 14–15 December 2018; pp. 276–281. [Google Scholar] [CrossRef]
- Niruntasukrat, A.; Issariyapat, C.; Pongpaibool, P.; Meesublak, K.; Aiumsupucgul, P.; Panya, A. Authorization mechanism for MQTT-based Internet of Things. In Proceedings of the 2016 IEEE International Conference on Communications Workshops (ICC), Kuala Lumpur, Malaysia, 23–27 May 2016; pp. 290–295. [Google Scholar]
- Michaelides, M.; Sengul, C.; Patras, P. An Experimental Evaluation of MQTT Authentication and Authorization in IoT. In Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization, New Orleans, LA, USA, 31 January–4 February 2022; pp. 69–76. [Google Scholar]
- Gupta, V.; Khera, S.; Turk, N. MQTT protocol employing IOT based home safety system with ABE encryption. Multimed. Tools Appl. 2021, 80, 2931–2949. [Google Scholar] [CrossRef]
- Bisne, L.; Parmar, M. Composite secure MQTT for Internet of Things using ABE and dynamic S-box AES. In Proceedings of the 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), Vellore, India, 21–22 April 2017; pp. 1–5. [Google Scholar]
- Mendoza-Cardenas, F.; Leon-Aguilar, R.S.; Quiroz-Arroyo, J.L. CP-ABE encryption over MQTT for an IoT system with Raspberry Pi. In Proceedings of the 2022 56th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 9–11 March 2022; pp. 236–239. [Google Scholar] [CrossRef]
- Liao, T.L.; Lin, H.R.; Wan, P.Y.; Yan, J.J. Improved Attribute-Based Encryption Using Chaos Synchronization and Its Application to MQTT Security. Appl. Sci. 2019, 9, 4454. [Google Scholar] [CrossRef]
- Calabretta, M.; Pecori, R.; Vecchio, M.; Veltri, L. MQTT-Auth: A token-based solution to endow MQTT with authentication and authorization capabilities. J. Commun. Softw. Syst. 2018, 14, 320–331. [Google Scholar] [CrossRef]
- Bhawiyuga, A.; Data, M.; Warda, A. Architectural design of token based authentication of MQTT protocol in constrained IoT device. In Proceedings of the 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA), Lombok, Indonesia, 26–27 October 2017; pp. 1–4. [Google Scholar]
- Bali, R.S.; Jaafar, F.; Zavarasky, P. Lightweight authentication for MQTT to improve the security of IoT communication. In Proceedings of the 3rd International Conference on Cryptography Security, and Privacy, Kuala Lumpur, Malaysia, 19–21 January 2019; pp. 6–12. [Google Scholar]
- Fischer, M.; Kümper, D.; Tönjes, R. Towards improving the Privacy in the MQTT Protocol. In Proceedings of the 2019 Global IoT Summit (GIoTS), Aarhus, Denmark, 17–21 June 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Dingledine, R.; Mathewson, N.; Syverson, P. Tor: The Second-Generation Onion Router; Technical Report; Naval Research Laboratory: Washington, DC, USA, 2004. [Google Scholar]
- Piotrowska, A.M.; Hayes, J.; Elahi, T.; Meiser, S.; Danezis, G. The loopix anonymity system. In Proceedings of the 26th Usenix Security Symposium (Usenix Security 17), Vancouver, BC, Canada, 16–18 August 2017; pp. 1199–1216. [Google Scholar]
- Buccafurri, F.; De Angelis, V.; Idone, M.F.; Labrini, C.; Lazzaro, S. Achieving Sender Anonymity in Tor against the Global Passive Adversary. Appl. Sci. 2022, 12, 137. [Google Scholar] [CrossRef]
- Reiter, M.K.; Rubin, A.D. Crowds: Anonymity for Web transactions. ACM Trans. Inf. Syst. Secur. 1998, 1, 66–92. [Google Scholar] [CrossRef]
- Protskaya, Y.; Veltri, L. Broker Bridging Mechanism for Providing Anonymity in MQTT. In Proceedings of the 2019 10th International Conference on Networks of the Future (NoF), Rome, Italy, 1–3 October 2019; pp. 110–113. [Google Scholar] [CrossRef]
- Lee, H.; Lim, J.; Kwon, T.T. MQTLS: Toward Secure MQTT Communication with an Untrusted Broker. In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Republic of Korea, 16–18 October 2019; pp. 53–58. [Google Scholar] [CrossRef]
- Dahlmanns, M.; Pennekamp, J.; Fink, I.B.; Schoolmann, B.; Wehrle, K.; Henze, M. Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems. In Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, SAT-CPS ’21, New York, NY, USA, 28 April 2021; pp. 78–87. [Google Scholar] [CrossRef]
- Hamad, M.; Finkenzeller, A.; Liu, H.; Lauinger, J.; Prevelakis, V.; Steinhorst, S. SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation. IEEE Internet Things J. 2023, 10, 3384–3406. [Google Scholar] [CrossRef]
- Pallickara, S.; Pierce, M.; Gadgil, H.; Fox, G.; Yan, Y.; Huang, Y. A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems. In Proceedings of the 2006 7th IEEE/ACM International Conference on Grid Computing, Barcelona, Spain, 28–29 September 2006; pp. 215–222. [Google Scholar] [CrossRef]
- Borcea, C.; Gupta, A.B.D.; Polyakov, Y.; Rohloff, K.; Ryan, G. PICADOR: End-to-end encrypted Publish–Subscribe information distribution with proxy re-encryption. Future Gener. Comput. Syst. 2017, 71, 177–191. [Google Scholar] [CrossRef]
- Yang, H.; Guo, Y.; Guo, Y. Blockchain-based cloud-fog collaborative smart home authentication scheme. Comput. Netw. 2024, 242, 110240. [Google Scholar] [CrossRef]
- Küpçü, A. Distributing trusted third parties. SIGACT News 2013, 44, 92–112. [Google Scholar] [CrossRef]
- Luntovskyy, A.; Globa, L. Performance, Reliability and Scalability for IoT. In Proceedings of the 2019 International Conference on Information and Digital Technologies (IDT), Zilina, Slovakia, 25–27 June 2019; pp. 316–321. [Google Scholar] [CrossRef]
- Buccafurri, F.; De Angelis, V.; Lazzaro, S. A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees. Future Internet 2022, 14, 243. [Google Scholar] [CrossRef]
- Profanter, S.; Tekat, A.; Dorofeev, K.; Rickert, M.; Knoll, A. OPC UA versus ROS, DDS, and MQTT: Performance Evaluation of Industry 4.0 Protocols. In Proceedings of the 2019 IEEE International Conference on Industrial Technology (ICIT), Melbourne, VIC, Australia, 13–15 February 2019; pp. 955–962. [Google Scholar] [CrossRef]
- Lazzaro, A.; D’Addona, D.M.; Merenda, M. Comparison of Machine Learning Models for Predictive Maintenance Applications. In Proceedings of the Advances in System-Integrated Intelligence; Valle, M., Lehmhus, D., Gianoglio, C., Ragusa, E., Seminara, L., Bosse, S., Ibrahim, A., Thoben, K.D., Eds.; Springer: Cham, Switzerland, 2023; pp. 657–666. [Google Scholar]
- Lakshminarayana, S.; Praseed, A.; Thilagam, P.S. Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects. IEEE Commun. Surv. Tutor. 2024. [Google Scholar] [CrossRef]
- Lachtar, A.; Val, T.; Kachouri, A. Elderly monitoring system in a smart city environment using LoRa and MQTT. IET Wirel. Sens. Syst. 2020, 10, 70–77. [Google Scholar] [CrossRef]
- Georgi, N.; Le Bouquin Jeannès, R. Proposal of a health monitoring system for continuous care. In Proceedings of the 2017 Fourth International Conference on Advances in Biomedical Engineering (ICABME), Beirut, Lebanon, 19–21 October 2017; pp. 1–4. [Google Scholar] [CrossRef]
Function | Gas Usage | Cost in USD (2023 Median) |
---|---|---|
Deploy Contract | 461,322 gas | USD 23 |
addClient | 68,401 gas | USD 3.41 |
addRootIPFSAddress | 47,016 gas | USD 2.34 |
pullTheAlarm | 26,763 gas | USD 1.33 |
getIPFSAddress (view) | - | USD 0 |
Operation | Client-Side | Broker-Side |
---|---|---|
Hash (SHA-256) | 148 ms | 58 µs |
addRootIPFSAddress | – | 18.088 s |
getIPFSAddress | 16.331 s | – |
IPFS Upload | – | 9 ms |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lazzaro, S.; Buccafurri, F. Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System. Future Internet 2024, 16, 246. https://doi.org/10.3390/fi16070246
Lazzaro S, Buccafurri F. Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System. Future Internet. 2024; 16(7):246. https://doi.org/10.3390/fi16070246
Chicago/Turabian StyleLazzaro, Sara, and Francesco Buccafurri. 2024. "Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System" Future Internet 16, no. 7: 246. https://doi.org/10.3390/fi16070246
APA StyleLazzaro, S., & Buccafurri, F. (2024). Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System. Future Internet, 16(7), 246. https://doi.org/10.3390/fi16070246