fix grammar flaw

This commit is contained in:
Trolli Schmittlauch 2019-09-17 13:26:04 +02:00
parent 04bd8c295c
commit a226a3830c
2 changed files with 2 additions and 2 deletions

BIN
paper_hashtag_federation.pdf (Stored with Git LFS)

Binary file not shown.

View file

@ -697,7 +697,7 @@ The large difference in overloaded nodes clearly shows that the k-choices load b
Adding hashtag federation to federated social network using this proposed system in most cases does not raise any serious privacy concerns: Only public posts are handled by the system, and as only the URI from where a post can be fetched is relayed to subscribers the originating instance can choose to stop providing that post at any time.
Instances subscribe to tags on behalf of their users, they hide the interests of particular users unless the set of active users on the particular instance is too small.
While \ac{DHT} networks provide an efficient way of structuring a \ac{P2P} lookup network with only knowing a small subset of its nodes and no central authority, exactly these missing global view and lack of central trust anchor pose several security challenges.
While \ac{DHT} networks provide an efficient way of structuring a \ac{P2P} lookup network with only knowing a small subset of its nodes and no central authority, exactly this missing global view and lack of central trust anchor poses several security challenges.
Urdaneta et al. \cite{urdanetaSurveyDHTSecurity2011} provide a broad survey of common security threats in \ac{DHT} security and attempts of solving them. \\
\textbf{Routing attacks} try to alter or disrupt the routing process within a \ac{DHT} to prevent the resolution of keys, let them point to invalid nodes or even to relay the combined lookup requests on a popular ID to a third party server as a Distributed \ac{DoS}. Storage attacks attempt to alter or forge the stored payload data returned under a key by impersonating the responsible node or taking over the relevant key space.