Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 60 tok/s
Gemini 2.5 Pro 51 tok/s Pro
GPT-5 Medium 18 tok/s Pro
GPT-5 High 14 tok/s Pro
GPT-4o 77 tok/s Pro
Kimi K2 159 tok/s Pro
GPT OSS 120B 456 tok/s Pro
Claude Sonnet 4 38 tok/s Pro
2000 character limit reached

Hiding in the Clouds and Building a Stealth Communication Network (1901.10097v1)

Published 29 Jan 2019 in cs.CR

Abstract: Social networks, instant messages and file sharing systems are common communication means among friends, families, coworkers, etc. Due to concerns of personal privacy, identify thefts, data misuse, freedom of speech and government surveillance, online social or communication networks have provided various options for a user to guard or control his or her personal data. However, for most these services, user data are still accessible by the service providers, which can lead to both liability issues if data breach occurs at the server side and data misuse by the network administrators. To prevent service providers from accessing user data, secure end-to-end user communication is a must, like the one provided by WhatsApp. On the other hand, the services provided by such communication network can still be interfered by an authority. For a communication network to be stealthy, the following features are essential: (1) oblivious service, (2) complete user control and flexibility, and (3) lightweight. In this paper, we first discuss the features and benefits of a stealth communication network (SNET), and then we propose a theoretical framework that can be adopted to implement an SNET. By utilizing the framework and the existing publicly available cloud storage, we present the implementation details of an instance of SNET, named Secret-Share. Last but not least, we discuss the current limitations of Secret-Share and its potential extensions.

Summary

We haven't generated a summary for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Lightbulb On Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.