[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Wei et al., 2020 - Google Patents

Foggy: a new anonymous communication architecture based on microservices

Wei et al., 2020

Document ID
5647809471352163848
Author
Wei H
Bai G
Luo Z
Publication year
Publication venue
2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS)

External Links

Snippet

This paper presents Foggy, an anonymous communication system focusing on providing users with anonymous web browsing. Foggy provides a microservice-based proxy for web browsing and other low-latency network activities without exposing users' metadata and …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Cooper et al. Privacy considerations for internet protocols
Gritzalis Enhancing web privacy and anonymity in the digital era
US11582241B1 (en) Community server for secure hosting of community forums via network operating system in secure data network
Chakravarty et al. Detection and analysis of eavesdropping in anonymous communication networks
Barnes et al. Confidentiality in the face of pervasive surveillance: A threat model and problem statement
Ajami et al. Security challenges and approaches in online social networks: A survey
Chakravarty et al. Detecting traffic snooping in tor using decoys
Zave et al. Patterns and interactions in network security
Dikshit et al. Recent trends on privacy-preserving technologies under standardization at the IETF
Elahi et al. CORDON–a taxonomy of internet censorship resistance strategies
Cooper et al. RFC 6973: Privacy considerations for Internet protocols
Chao et al. A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
Volini A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues
Evers et al. Thirteen years of Tor attacks
Haraty et al. A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems
Wei et al. Foggy: a new anonymous communication architecture based on microservices
Grahn et al. Anonymous communication on the internet
Pustogarov Deanonymisation techniques for Tor and Bitcoin
Cheng et al. A Covert‐Aware Anonymous Communication Network for Social Communication
Ahmad et al. A New Look at the Tor Anonymous Communication System
Amalou et al. Anonymous Traffic Detection and Identification
Conti et al. Anonymity in an electronic society: A survey
Misata et al. A taxonomy of privacy-protecting tools to browse the world wide web
Øverlier Anonymity and Forensics
Tippe et al. Hardening Tor Hidden Services