I. Introduction
A brief review of the IT advances shows that computing technology has grown tremendously in terms of processing ca-pabilities, sharing and storage of information, but it has raised several issues on security, privacy and data integrity. Some of the risks inherent in centralized systems are; vulnerability to data leakage, unauthorized access, having one central point of failure, and server crashes. Consequently, there is rising demand for products that will enable the elimination of these risks and provide secure and safe data exchange within the decentralized networks.