Skip to main content

Using Dust Clouds to Enhance Anonymous Communication

  • Conference paper
Security Protocols XVIII (Security Protocols 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7061))

Included in the following conference series:

Abstract

Cloud computing platforms, such as Amazon EC2 [1], enable customers to lease several virtual machines (VMs) on a per-hour basis. The customer can now obtain a dynamic and diverse collection of machines spread across the world. In this paper we consider how this aspect of cloud computing can facilitate anonymous communications over untrusted networks such as the Internet, and discuss some of the challenges that arise as a result.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Amazon EC2, http://aws.amazon.com/ec2/

  2. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  3. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium. USENIX Association (2004)

    Google Scholar 

  5. Feamster, N., Dingledine, R.: Location diversity in anonymity networks. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 66–76. ACM (2004)

    Google Scholar 

  6. Kouvelas, I., Hardman, V., Crowcroft, J.: Network adaptive continuous-media applications through self organized transcoding. In: Proceedings of the 8th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 117–128 (1998)

    Google Scholar 

  7. Mahmud, K., Mukumoto, K., Fukuda, A.: Development of MBC System Using Software Modem. IEICE Transactions on Communications (Special Issue on Software Defined Radio and its Technologies), 1269–1281 (2000)

    Google Scholar 

  8. McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63–76. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Murray, D.G., Milos, G., Hand, S.: Improving Xen security through disaggregation. In: Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp. 151–160. ACM (2008)

    Google Scholar 

  10. Rennhard, M., Plattner, B.: Practical anonymity for the masses with MorphMix. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 233–250. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199–212. ACM (2009)

    Google Scholar 

  12. Santos, N., Gummadi, K.P., Rodrigues, R.: Towards Trusted Cloud Computing. In: Proceedings of the 1st USENIX Workshop on Hot Topics in Cloud Computing. USENIX Association, Berkeley (2009)

    Google Scholar 

  13. Sassaman, L.: The Faithless Endpoint: How Tor puts certain users at greater risk. Technical Report 2007-003, ESAT-COSIC (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mortier, R., Madhavapeddy, A., Hong, T., Murray, D., Schwarzkopf, M. (2014). Using Dust Clouds to Enhance Anonymous Communication. In: Christianson, B., Malcolm, J. (eds) Security Protocols XVIII. Security Protocols 2010. Lecture Notes in Computer Science, vol 7061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45921-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45921-8_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45920-1

  • Online ISBN: 978-3-662-45921-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics