fix grammar flaw
This commit is contained in:
parent
04bd8c295c
commit
a226a3830c
BIN
paper_hashtag_federation.pdf
(Stored with Git LFS)
BIN
paper_hashtag_federation.pdf
(Stored with Git LFS)
Binary file not shown.
|
@ -697,7 +697,7 @@ The large difference in overloaded nodes clearly shows that the k-choices load b
|
|||
Adding hashtag federation to federated social network using this proposed system in most cases does not raise any serious privacy concerns: Only public posts are handled by the system, and as only the URI from where a post can be fetched is relayed to subscribers the originating instance can choose to stop providing that post at any time.
|
||||
Instances subscribe to tags on behalf of their users, they hide the interests of particular users unless the set of active users on the particular instance is too small.
|
||||
|
||||
While \ac{DHT} networks provide an efficient way of structuring a \ac{P2P} lookup network with only knowing a small subset of its nodes and no central authority, exactly these missing global view and lack of central trust anchor pose several security challenges.
|
||||
While \ac{DHT} networks provide an efficient way of structuring a \ac{P2P} lookup network with only knowing a small subset of its nodes and no central authority, exactly this missing global view and lack of central trust anchor poses several security challenges.
|
||||
|
||||
Urdaneta et al. \cite{urdanetaSurveyDHTSecurity2011} provide a broad survey of common security threats in \ac{DHT} security and attempts of solving them. \\
|
||||
\textbf{Routing attacks} try to alter or disrupt the routing process within a \ac{DHT} to prevent the resolution of keys, let them point to invalid nodes or even to relay the combined lookup requests on a popular ID to a third party server as a Distributed \ac{DoS}. Storage attacks attempt to alter or forge the stored payload data returned under a key by impersonating the responsible node or taking over the relevant key space.
|
||||
|
|
Loading…
Reference in a new issue