Wei et al., 2020 - Google Patents
Foggy: a new anonymous communication architecture based on microservicesWei et al., 2020
- Document ID
- 5647809471352163848
- Author
- Wei H
- Bai G
- Luo Z
- Publication year
- Publication venue
- 2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS)
External Links
Snippet
This paper presents Foggy, an anonymous communication system focusing on providing users with anonymous web browsing. Foggy provides a microservice-based proxy for web browsing and other low-latency network activities without exposing users' metadata and …
- 238000004891 communication 0 title abstract description 37
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cooper et al. | Privacy considerations for internet protocols | |
Gritzalis | Enhancing web privacy and anonymity in the digital era | |
US11582241B1 (en) | Community server for secure hosting of community forums via network operating system in secure data network | |
Chakravarty et al. | Detection and analysis of eavesdropping in anonymous communication networks | |
Barnes et al. | Confidentiality in the face of pervasive surveillance: A threat model and problem statement | |
Ajami et al. | Security challenges and approaches in online social networks: A survey | |
Chakravarty et al. | Detecting traffic snooping in tor using decoys | |
Zave et al. | Patterns and interactions in network security | |
Dikshit et al. | Recent trends on privacy-preserving technologies under standardization at the IETF | |
Elahi et al. | CORDON–a taxonomy of internet censorship resistance strategies | |
Cooper et al. | RFC 6973: Privacy considerations for Internet protocols | |
Chao et al. | A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization | |
Volini | A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues | |
Evers et al. | Thirteen years of Tor attacks | |
Haraty et al. | A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems | |
Wei et al. | Foggy: a new anonymous communication architecture based on microservices | |
Grahn et al. | Anonymous communication on the internet | |
Pustogarov | Deanonymisation techniques for Tor and Bitcoin | |
Cheng et al. | A Covert‐Aware Anonymous Communication Network for Social Communication | |
Ahmad et al. | A New Look at the Tor Anonymous Communication System | |
Amalou et al. | Anonymous Traffic Detection and Identification | |
Conti et al. | Anonymity in an electronic society: A survey | |
Misata et al. | A taxonomy of privacy-protecting tools to browse the world wide web | |
Øverlier | Anonymity and Forensics | |
Tippe et al. | Hardening Tor Hidden Services |