Dissent in numbers: Making strong anonymity scale

DI Wolinsky, H Corrigan-Gibbs, B Ford… - 10th USENIX Symposium …, 2012 - usenix.org
Current anonymous communication systems make a trade-off between weak anonymity
among many nodes, via onion routing, and strong anonymity among few nodes, via DC …

Managing and accessing data in the cloud: Privacy risks and approaches

SDC di Vimercati, S Foresti… - 2012 7th International …, 2012 - ieeexplore.ieee.org
Ensuring proper privacy and protection of the information stored, communicated, processed,
and disseminated in the cloud as well as of the users accessing such an information is one …

Talek: Private group messaging with hidden access patterns

R Cheng, W Scott, E Masserova, I Zhang… - Proceedings of the 36th …, 2020 - dl.acm.org
Talek is a private group messaging system that sends messages through potentially
untrustworthy servers, while hiding both data content and the communication patterns …

Cloudtransport: Using cloud storage for censorship-resistant networking

C Brubaker, A Houmansadr, V Shmatikov - … Enhancing Technologies: 14th …, 2014 - Springer
Censorship circumvention systems such as Tor are highly vulnerable to network-level
filtering. Because the traffic generated by these systems is disjoint from normal network …

{SpotProxy}: Rediscovering the Cloud for Censorship Circumvention

PTJ Kon, S Kamali, J Pei, D Barradas, A Chen… - 33rd USENIX Security …, 2024 - usenix.org
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …

Network-based secret communication in clouds: A survey

J Ullrich, T Zseby, J Fabini… - … communications surveys & …, 2017 - ieeexplore.ieee.org
The cloud concept promises computing as a utility. More and more functions are moved to
cloud environments. But this transition comes at a cost: security and privacy solutions have …

Multi path considerations for anonymized routing: Challenges and opportunities

HT Karaoglu, MB Akgun, MH Gunes… - 2012 5th International …, 2012 - ieeexplore.ieee.org
Recently, there has been a surging interest on anonymizer technologies as a result of
increasing privacy concerns and censorship barriers on the Internet. Tor network has …

Abusing CDNs for fun and profit: Security issues in CDNs' origin validation

R Guo, J Chen, B Liu, J Zhang, C Zhang… - 2018 IEEE 37th …, 2018 - ieeexplore.ieee.org
Content Delivery Networks (CDNs) are critical Internet infrastructure. Besides high
availability and high performance, CDNs also provide security services such as anti-DoS …

Misty clouds—A layered cloud platform for online user anonymity in Social Internet of Things

J Al-Muhtadi, M Qiang, K Saleem, M AlMusallam… - Future Generation …, 2019 - Elsevier
Online services typically collect data that are explicitly provided by users and metadata that
are implicitly inferred from users' activity patterns. The proclaimed goal of metadata …

Cyber anonymity based on software-defined networking and Onion Routing (SOR)

A Elgzil, CE Chow, A Aljaedi… - 2017 IEEE conference on …, 2017 - ieeexplore.ieee.org
Cyber anonymity tools have attracted wide attention in resisting network traffic censorship
and surveillance, and have played a crucial role for open communications over the Internet …