Security issues in online social networks
H Gao, J Hu, T Huang, J Wang… - IEEE Internet …, 2011 - ieeexplore.ieee.org
This article surveys the current state of security issues and available defense mechanisms
regarding popular online social networks. It covers a wide variety of attacks and the …
regarding popular online social networks. It covers a wide variety of attacks and the …
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today's P2P
systems. What makes this problem particularly difficult is the unique set of challenges that …
systems. What makes this problem particularly difficult is the unique set of challenges that …
Privacy-preserving audit and extraction of digital contents
MA Shah, R Swaminathan, M Baker - Cryptology ePrint Archive, 2008 - eprint.iacr.org
A growing number of online services, such as Google, Yahoo!, and Amazon, are starting to
charge users for their storage. Customers often use these services to store valuable data …
charge users for their storage. Customers often use these services to store valuable data …
Taxonomy of trust: Categorizing P2P reputation systems
S Marti, H Garcia-Molina - Computer Networks, 2006 - Elsevier
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is
to organize existing ideas and work to facilitate system design. We present a taxonomy of …
to organize existing ideas and work to facilitate system design. We present a taxonomy of …
BAR fault tolerance for cooperative services
This paper describes a general approach to constructing cooperative services that span
multiple administrative domains. In such environments, protocols must tolerate both …
multiple administrative domains. In such environments, protocols must tolerate both …
[PDF][PDF] Auditing to Keep Online Storage Services Honest.
A growing number of online service providers offer to store customers' photos, email, file
system backups, and other digital assets. Currently, customers cannot make informed …
system backups, and other digital assets. Currently, customers cannot make informed …
[PDF][PDF] A survey of solutions to the sybil attack
Many security mechanisms are based on specific assumptions of identity and are vulnerable
to attacks when these assumptions are violated. For example, impersonation is the well …
to attacks when these assumptions are violated. For example, impersonation is the well …
Meridian: A lightweight network location service without virtual coordinates
This paper introduces a lightweight, scalable and accurate framework, called Meridian, for
performing node selection based on network location. The framework consists of an overlay …
performing node selection based on network location. The framework consists of an overlay …
A review of techniques to mitigate sybil attacks
N Balachandran, S Sanyal - arXiv preprint arXiv:1207.2617, 2012 - arxiv.org
Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a
malicious node masquerades as several different nodes, called Sybil nodes, simultaneously …
malicious node masquerades as several different nodes, called Sybil nodes, simultaneously …
The LOCKSS peer-to-peer digital preservation system
P Maniatis, M Roussopoulos, TJ Giuli… - ACM Transactions on …, 2005 - dl.acm.org
The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer
system for preserving access to journals and other archival information published on the …
system for preserving access to journals and other archival information published on the …