2014
DOI: 10.1007/978-3-319-08506-7_1
|View full text |Cite
|
Sign up to set email alerts
|

CloudTransport: Using Cloud Storage for Censorship-Resistant Networking

Abstract: Abstract. Censorship circumvention systems such as Tor are highly vulnerable to network-level filtering. Because the traffic generated by these systems is disjoint from normal network traffic, it is easy to recognize and block, and once the censors identify network servers (e.g., Tor bridges) assisting in circumvention, they can locate all of their users. CloudTransport is a new censorship-resistant communication system that hides users' network traffic by tunneling it through a cloud storage service such as A… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(31 citation statements)
references
References 16 publications
0
31
0
Order By: Relevance
“…In SWEET [36], covert traffic is relayed through encrypted or steganography-protected email messages that are temporarily staged on standard mail servers. CloudTransport [2] adopts a similar principle, but uses public cloud storage services for covert message forwarding. SWEET is limited by the unusual email utilization patterns it generates while CloudTransport is prone to denial of service and traffic analysis.…”
Section: Related Workmentioning
confidence: 99%
“…In SWEET [36], covert traffic is relayed through encrypted or steganography-protected email messages that are temporarily staged on standard mail servers. CloudTransport [2] adopts a similar principle, but uses public cloud storage services for covert message forwarding. SWEET is limited by the unusual email utilization patterns it generates while CloudTransport is prone to denial of service and traffic analysis.…”
Section: Related Workmentioning
confidence: 99%
“…In either case, these solutions work only for cacheable content. -CloudTransport [4] repurposes cloud storage to implement interactive communication to a server in a way that will evade common censorship techniques.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The vast resources and connectivity available via these infrastructures can also expand the capacity of server-anonymous systems. However, prior attempts (of which we are aware) to leverage these infrastructures to support server anonymity have been designed for an oblivious cloud operator that (at best) provides no specific support for server anonymity (e.g., [4,16]). Changes are thus typically hoisted onto the client users of these systems, who often lack the permissions, trust, or know-how to do so.…”
Section: Introductionmentioning
confidence: 99%
“…CloudTransport [8] uses the cloud storage service to circumvent the Internet censorship. It proposes a passive-rendezvous protocol, which enables the CloudTransport client and bridge to communicate through oblivious cloud systems.…”
Section: Circumvention Systems Without Imitation Flawmentioning
confidence: 99%
“…Decoy Routing schemes [16,20,31,32] use backbone routers as proxies to imitate connections to arbitrary unblocked hosts, but were shown to require impractically large and targeted deployments in order to avoid availability attacks [18,25]. "Hide-within" systems [8,17,34] attempt to hide both the true destination and the covert nature of circumvention connections by tunnelling connections through popular services such as email, VoIP, and cloud storage. In addition to requiring high bandwidth overhead, these schemes were shown to suffer from detection and blocking attacks stemming from inconsistency between the data volume and loss tolerance of the proxy and cover applications [14].…”
Section: Introductionmentioning
confidence: 99%