Dissent in numbers: Making strong anonymity scale
Current anonymous communication systems make a trade-off between weak anonymity
among many nodes, via onion routing, and strong anonymity among few nodes, via DC …
among many nodes, via onion routing, and strong anonymity among few nodes, via DC …
Managing and accessing data in the cloud: Privacy risks and approaches
SDC di Vimercati, S Foresti… - 2012 7th International …, 2012 - ieeexplore.ieee.org
Ensuring proper privacy and protection of the information stored, communicated, processed,
and disseminated in the cloud as well as of the users accessing such an information is one …
and disseminated in the cloud as well as of the users accessing such an information is one …
Talek: Private group messaging with hidden access patterns
Talek is a private group messaging system that sends messages through potentially
untrustworthy servers, while hiding both data content and the communication patterns …
untrustworthy servers, while hiding both data content and the communication patterns …
Cloudtransport: Using cloud storage for censorship-resistant networking
C Brubaker, A Houmansadr, V Shmatikov - … Enhancing Technologies: 14th …, 2014 - Springer
Censorship circumvention systems such as Tor are highly vulnerable to network-level
filtering. Because the traffic generated by these systems is disjoint from normal network …
filtering. Because the traffic generated by these systems is disjoint from normal network …
{SpotProxy}: Rediscovering the Cloud for Censorship Circumvention
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …
Network-based secret communication in clouds: A survey
The cloud concept promises computing as a utility. More and more functions are moved to
cloud environments. But this transition comes at a cost: security and privacy solutions have …
cloud environments. But this transition comes at a cost: security and privacy solutions have …
Multi path considerations for anonymized routing: Challenges and opportunities
HT Karaoglu, MB Akgun, MH Gunes… - 2012 5th International …, 2012 - ieeexplore.ieee.org
Recently, there has been a surging interest on anonymizer technologies as a result of
increasing privacy concerns and censorship barriers on the Internet. Tor network has …
increasing privacy concerns and censorship barriers on the Internet. Tor network has …
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation
Content Delivery Networks (CDNs) are critical Internet infrastructure. Besides high
availability and high performance, CDNs also provide security services such as anti-DoS …
availability and high performance, CDNs also provide security services such as anti-DoS …
Misty clouds—A layered cloud platform for online user anonymity in Social Internet of Things
J Al-Muhtadi, M Qiang, K Saleem, M AlMusallam… - Future Generation …, 2019 - Elsevier
Online services typically collect data that are explicitly provided by users and metadata that
are implicitly inferred from users' activity patterns. The proclaimed goal of metadata …
are implicitly inferred from users' activity patterns. The proclaimed goal of metadata …
Cyber anonymity based on software-defined networking and Onion Routing (SOR)
Cyber anonymity tools have attracted wide attention in resisting network traffic censorship
and surveillance, and have played a crucial role for open communications over the Internet …
and surveillance, and have played a crucial role for open communications over the Internet …