Security issues in online social networks

H Gao, J Hu, T Huang, J Wang… - IEEE Internet …, 2011 - ieeexplore.ieee.org
This article surveys the current state of security issues and available defense mechanisms
regarding popular online social networks. It covers a wide variety of attacks and the …

Robust incentive techniques for peer-to-peer networks

M Feldman, K Lai, I Stoica, J Chuang - … of the 5th ACM conference on …, 2004 - dl.acm.org
Lack of cooperation (free riding) is one of the key problems that confronts today's P2P
systems. What makes this problem particularly difficult is the unique set of challenges that …

Privacy-preserving audit and extraction of digital contents

MA Shah, R Swaminathan, M Baker - Cryptology ePrint Archive, 2008 - eprint.iacr.org
A growing number of online services, such as Google, Yahoo!, and Amazon, are starting to
charge users for their storage. Customers often use these services to store valuable data …

Taxonomy of trust: Categorizing P2P reputation systems

S Marti, H Garcia-Molina - Computer Networks, 2006 - Elsevier
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is
to organize existing ideas and work to facilitate system design. We present a taxonomy of …

BAR fault tolerance for cooperative services

AS Aiyer, L Alvisi, A Clement, M Dahlin… - Proceedings of the …, 2005 - dl.acm.org
This paper describes a general approach to constructing cooperative services that span
multiple administrative domains. In such environments, protocols must tolerate both …

[PDF][PDF] Auditing to Keep Online Storage Services Honest.

MA Shah, M Baker, JC Mogul, R Swaminathan - HotOS, 2007 - usenix.org
A growing number of online service providers offer to store customers' photos, email, file
system backups, and other digital assets. Currently, customers cannot make informed …

[PDF][PDF] A survey of solutions to the sybil attack

BN Levine, C Shields, NB Margolin - University of Massachusetts …, 2006 - git.gnunet.org
Many security mechanisms are based on specific assumptions of identity and are vulnerable
to attacks when these assumptions are violated. For example, impersonation is the well …

Meridian: A lightweight network location service without virtual coordinates

B Wong, A Slivkins, EG Sirer - ACM SIGCOMM Computer …, 2005 - dl.acm.org
This paper introduces a lightweight, scalable and accurate framework, called Meridian, for
performing node selection based on network location. The framework consists of an overlay …

A review of techniques to mitigate sybil attacks

N Balachandran, S Sanyal - arXiv preprint arXiv:1207.2617, 2012 - arxiv.org
Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a
malicious node masquerades as several different nodes, called Sybil nodes, simultaneously …

The LOCKSS peer-to-peer digital preservation system

P Maniatis, M Roussopoulos, TJ Giuli… - ACM Transactions on …, 2005 - dl.acm.org
The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer
system for preserving access to journals and other archival information published on the …