Hiding in the Clouds and Building a Stealth Communication Network

Social networks, instant messages and file sharing systems are common communication means among friends, families, coworkers, etc. Due to concerns of personal privacy, identify thefts, data misuse, freedom of speech and government surveillance, online social or communication networks have provided v...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Jiang, Wei, Bowers, Adam, Lin, Dan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Jiang, Wei
Bowers, Adam
Lin, Dan
description Social networks, instant messages and file sharing systems are common communication means among friends, families, coworkers, etc. Due to concerns of personal privacy, identify thefts, data misuse, freedom of speech and government surveillance, online social or communication networks have provided various options for a user to guard or control his or her personal data. However, for most these services, user data are still accessible by the service providers, which can lead to both liability issues if data breach occurs at the server side and data misuse by the network administrators. To prevent service providers from accessing user data, secure end-to-end user communication is a must, like the one provided by WhatsApp. On the other hand, the services provided by such communication network can still be interfered by an authority. For a communication network to be stealthy, the following features are essential: (1) oblivious service, (2) complete user control and flexibility, and (3) lightweight. In this paper, we first discuss the features and benefits of a stealth communication network (SNET), and then we propose a theoretical framework that can be adopted to implement an SNET. By utilizing the framework and the existing publicly available cloud storage, we present the implementation details of an instance of SNET, named Secret-Share. Last but not least, we discuss the current limitations of Secret-Share and its potential extensions.
doi_str_mv 10.48550/arxiv.1901.10097
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1901_10097</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1901_10097</sourcerecordid><originalsourceid>FETCH-LOGICAL-a677-dfff4095ac10b0bcbde946db23d4e2ee271ed043be271f6848f714d7af913fa93</originalsourceid><addsrcrecordid>eNotz81OwzAQBGBfOKCWB-CEXyBhHTtxfCwRUKSqHOg9WsdrajVxUOrw8_aogdOMNNJIH2O3AnJVlyXc4_QdPnNhQOQCwOhrttkGF-I7D5GnI_GmH2d35hgdf5hDv0zI3xJhn468GYdhjqHDFMbI95S-xum0Zlce-zPd_OeKHZ4eD802270-vzSbXYaV1pnz3iswJXYCLNjOOjKqcraQTlFBVGhBDpS0l-arWtVeC-U0eiOkRyNX7O7vdjG0H1MYcPppL5Z2schfRRxEfw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Hiding in the Clouds and Building a Stealth Communication Network</title><source>arXiv.org</source><creator>Jiang, Wei ; Bowers, Adam ; Lin, Dan</creator><creatorcontrib>Jiang, Wei ; Bowers, Adam ; Lin, Dan</creatorcontrib><description>Social networks, instant messages and file sharing systems are common communication means among friends, families, coworkers, etc. Due to concerns of personal privacy, identify thefts, data misuse, freedom of speech and government surveillance, online social or communication networks have provided various options for a user to guard or control his or her personal data. However, for most these services, user data are still accessible by the service providers, which can lead to both liability issues if data breach occurs at the server side and data misuse by the network administrators. To prevent service providers from accessing user data, secure end-to-end user communication is a must, like the one provided by WhatsApp. On the other hand, the services provided by such communication network can still be interfered by an authority. For a communication network to be stealthy, the following features are essential: (1) oblivious service, (2) complete user control and flexibility, and (3) lightweight. In this paper, we first discuss the features and benefits of a stealth communication network (SNET), and then we propose a theoretical framework that can be adopted to implement an SNET. By utilizing the framework and the existing publicly available cloud storage, we present the implementation details of an instance of SNET, named Secret-Share. Last but not least, we discuss the current limitations of Secret-Share and its potential extensions.</description><identifier>DOI: 10.48550/arxiv.1901.10097</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2019-01</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1901.10097$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1901.10097$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Jiang, Wei</creatorcontrib><creatorcontrib>Bowers, Adam</creatorcontrib><creatorcontrib>Lin, Dan</creatorcontrib><title>Hiding in the Clouds and Building a Stealth Communication Network</title><description>Social networks, instant messages and file sharing systems are common communication means among friends, families, coworkers, etc. Due to concerns of personal privacy, identify thefts, data misuse, freedom of speech and government surveillance, online social or communication networks have provided various options for a user to guard or control his or her personal data. However, for most these services, user data are still accessible by the service providers, which can lead to both liability issues if data breach occurs at the server side and data misuse by the network administrators. To prevent service providers from accessing user data, secure end-to-end user communication is a must, like the one provided by WhatsApp. On the other hand, the services provided by such communication network can still be interfered by an authority. For a communication network to be stealthy, the following features are essential: (1) oblivious service, (2) complete user control and flexibility, and (3) lightweight. In this paper, we first discuss the features and benefits of a stealth communication network (SNET), and then we propose a theoretical framework that can be adopted to implement an SNET. By utilizing the framework and the existing publicly available cloud storage, we present the implementation details of an instance of SNET, named Secret-Share. Last but not least, we discuss the current limitations of Secret-Share and its potential extensions.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz81OwzAQBGBfOKCWB-CEXyBhHTtxfCwRUKSqHOg9WsdrajVxUOrw8_aogdOMNNJIH2O3AnJVlyXc4_QdPnNhQOQCwOhrttkGF-I7D5GnI_GmH2d35hgdf5hDv0zI3xJhn468GYdhjqHDFMbI95S-xum0Zlce-zPd_OeKHZ4eD802270-vzSbXYaV1pnz3iswJXYCLNjOOjKqcraQTlFBVGhBDpS0l-arWtVeC-U0eiOkRyNX7O7vdjG0H1MYcPppL5Z2schfRRxEfw</recordid><startdate>20190128</startdate><enddate>20190128</enddate><creator>Jiang, Wei</creator><creator>Bowers, Adam</creator><creator>Lin, Dan</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20190128</creationdate><title>Hiding in the Clouds and Building a Stealth Communication Network</title><author>Jiang, Wei ; Bowers, Adam ; Lin, Dan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a677-dfff4095ac10b0bcbde946db23d4e2ee271ed043be271f6848f714d7af913fa93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Jiang, Wei</creatorcontrib><creatorcontrib>Bowers, Adam</creatorcontrib><creatorcontrib>Lin, Dan</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jiang, Wei</au><au>Bowers, Adam</au><au>Lin, Dan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Hiding in the Clouds and Building a Stealth Communication Network</atitle><date>2019-01-28</date><risdate>2019</risdate><abstract>Social networks, instant messages and file sharing systems are common communication means among friends, families, coworkers, etc. Due to concerns of personal privacy, identify thefts, data misuse, freedom of speech and government surveillance, online social or communication networks have provided various options for a user to guard or control his or her personal data. However, for most these services, user data are still accessible by the service providers, which can lead to both liability issues if data breach occurs at the server side and data misuse by the network administrators. To prevent service providers from accessing user data, secure end-to-end user communication is a must, like the one provided by WhatsApp. On the other hand, the services provided by such communication network can still be interfered by an authority. For a communication network to be stealthy, the following features are essential: (1) oblivious service, (2) complete user control and flexibility, and (3) lightweight. In this paper, we first discuss the features and benefits of a stealth communication network (SNET), and then we propose a theoretical framework that can be adopted to implement an SNET. By utilizing the framework and the existing publicly available cloud storage, we present the implementation details of an instance of SNET, named Secret-Share. Last but not least, we discuss the current limitations of Secret-Share and its potential extensions.</abstract><doi>10.48550/arxiv.1901.10097</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1901.10097
ispartof
issn
language eng
recordid cdi_arxiv_primary_1901_10097
source arXiv.org
subjects Computer Science - Cryptography and Security
title Hiding in the Clouds and Building a Stealth Communication Network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T05%3A49%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Hiding%20in%20the%20Clouds%20and%20Building%20a%20Stealth%20Communication%20Network&rft.au=Jiang,%20Wei&rft.date=2019-01-28&rft_id=info:doi/10.48550/arxiv.1901.10097&rft_dat=%3Carxiv_GOX%3E1901_10097%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true