Next Article in Journal
Internet of Things and Cyber–Physical Systems
Next Article in Special Issue
SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network
Previous Article in Journal
The Future of Cybersecurity in the Age of Quantum Computers
Previous Article in Special Issue
Users’ Perceptions of Key Blockchain Features in Games
 
 
Article
Peer-Review Record

Comparison of Distributed Tamper-Proof Storage Methods for Public Key Infrastructures

Future Internet 2022, 14(11), 336; https://doi.org/10.3390/fi14110336
by Fabian Honecker *, Julian Dreyer and Ralf Tönjes
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Future Internet 2022, 14(11), 336; https://doi.org/10.3390/fi14110336
Submission received: 28 October 2022 / Revised: 15 November 2022 / Accepted: 16 November 2022 / Published: 18 November 2022
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT II)

Round 1

Reviewer 1 Report

This paper proposes a comparison of tamper-proof storage methods for PKI systems. The following are my suggestions to improve the quality of the paper further.

 

Section 2

 

Consider adding a comparison/conclusion paragraph stating how the proposal differs from others. Alternatively, stating what is the missing research area that this proposal covers.

 

Section 3

 

In Figure 1, in Step 6.1. How does the Signing Hub get the "token" to decrypt?

 

In Figure 3:

  • Why do the steps start at number 11?
  • How does the HLF obtain pk_sen* in Step 13.1.2.?
  • In step 13.1.3, is not the Signing Hub already getting pk_sen* from Phase 1 (c.f., Figure 2 step 11? Why the hub get another pk_sen* here?
  • Whose public key is used in step 13.2?

 

Section 4

 

It is not clear yet (at least to me) what the goal is and what is being proposed in this paper.

 

Do the authors try to replace HLF in Figures 2 and 3 with IPFS and SIA and compare which is faster?

However, Figures 2 and 3 are specific to HLF. If they are modified to IPFS and SIA, then the protocol steps should be modified (for IPFS and SIA cases) to guarantee the same security properties as in the original paper.

 

Please ensures that the comparison yields the same security guarantee as the original so that they all can be compared fairly.

 

Additionally, a separate figure or diagram to summarize or differentiate the authors' proposal from Figures 2 and 3. So the readers can understand better what is being modified from the originals.

 

Section 5

 

Does the private IPFS run in a local network? If yes, it will be evident that it will be faster than others. HLF process queries from users in the form of transactions; thus, it should be slower than IPFS. Also, HLF needs to do the consensus will even slow down the processing time even for a local network. Public IPFS and SIA need to connect to the real network. Thus, real-world latency may affect the experiment result. Please ensure that the experiment has been performed equally and that each condition is treated equally, if possible.

 

HLF, IPFS, and SIA have their own merits and trade-off. Please consider adding qualitative pros and cons for all of them. Thus, readers can understand that, for example, even if IPFS is the most efficient, it does not have high security and integrity guarantee as in HLF.

Author Response

Dear Reviewer,

thank you very much for your kind review! I made major changes to the manuscript. Please find our comments in the attached pdf.

Best regards

Author Response File: Author Response.pdf

Reviewer 2 Report

Thank you for the opportunity to rate your article. Areas to be corrected:

1. All abbreviations mentioned must be fully explained for the first time (e.g. line 11 of abstract).

2. The introduction lacks a detailed justification of the problem: a lot of explanation of concepts and attempts to justify the problematic based on only 4 sources. The purpose of the article must also be clearly defined.

3. in principle, the article should be redone structurally, in accordance with the following logical sequence: Introduction (in which the problem is clearly justified, and the goal and/or hypotheses are set), if there is a need to review literature sources, then it should be done as one chapter with relevant subsections, then it should there should be a clear Methods and methodology section, and a section or sections of the obtained Results and discussion (here, according to logic, they could be separate or combined).

4. The critical approach of the authors of the article is missing in the discussion section.

5. It is recommended to avoid citation when formulating conclusions.

6. Please note that chapters/subsections should not be less than 1 page. Therefore, the existing subsections must be logically combined for the moment.

7. When examining such a topic, there should be a larger list of literature.

Author Response

Dear Reviewer,

thank you very much for your kind review. I made major changes to the manuscript following your proposed changes. Please find our comments in the attached pdf.

Best regards

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

The authors have addressed my previous comments well.

Author Response

Dear Reviewer,

thank you very much, again, for your feedback. We are glad to hear that we addressed all issues.

Best regards,

Reviewer 2 Report

It would be appropriate to write in the introduction or somewhere near the first abbreviation that all abbreviations used in the text are presented with a full explanation at the end of the article

Author Response

Dear Reviewer,

thank you very much, again, for your review. We included a phrase mentioning the abbreviations at the end of the article right after the structure overview in the introduction. We hope that this satisfies your request.

Best regards,

Back to TopTop