Censorship resistant overlay publishing

نویسندگان

  • Eugene Y. Vasserman
  • Victor Heorhiadi
  • Yongdae Kim
  • Nicholas Hopper
چکیده

The fundamental requirement of censorship resistance is content availability and discoverability — it should be easy for users to find and access documents. At the same time, participating storage providers should be unaware of what they are storing to preserve plausible deniability. Fulfilling these requirements simultaneously seems impossible — how does a system maintain a searchable index of content for users and yet hide it from storage providers? These paradoxical requirements have been previously reconciled by requiring out-of-band communication to either find ways to connect to the system, locate files, or learn file decryption keys — an unacceptable situation when easy content discovery is critical. This paper describes a design for a peer-to-peer, permanent, and unblockable content store which is easily searchable and yet self-contained, i.e. does not require out-of-band communication. To achieve this, we separate file data, metadata, and encryption keys such that someone searching for information about a specific topic can retrieve all three components and reconstruct the file, but someone who only stores at most two components can neither determine the nature of the file content nor locate the missing component. We begin by identifying the core requirements for unblockable storage systems to resist state-level Internet censorship, construct a system that fulfills those requirements, and analyze how it avoids the problem of prior attempts at censorship resistance. Finally, we present measurements of a deployed proof-of-concept implementation, demonstrating the feasibility of our design.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Censorship-Resistant Communication over Public Networks

The rapid growth of peer-to-peer networks and social networking websites has demonstrated the internet’s potential as a medium for grassroots collaboration. This report describes ongoing research into the use of friend-to-friend overlay networks for censorship-resistant communication. Decentralised mechanisms for resource allocation, unforgeable acknowledgements and adaptive routing are propose...

متن کامل

Censorship-resistant Publishing

As the web evolves, it is becoming easier to form communities based on shared interests, and to create, publish, and query data on a wide variety of topics. In order to fully deliver on the promise of free data exchange, any community-supporting infrastructure needs to enforce the key requirement to preserve privacy of the association of content providers with potential sensitive published info...

متن کامل

Poster: Incentivized Censorship Resistance with Payment Contracts

We propose Lavinia, a censorship resistant publishing system that incentivizes document storage through the use of an anonymous, distributed, time-locked payment system. This has the advantage of allowing the publisher to decide whether a document is worth storing, and for how long, instead of relying on public interest or an appointed editorial board. We give a description of related work in c...

متن کامل

Dagster: Censorship-Resistant Publishing Without Replication

In this paper we present Dagster, a new censorship-resistant publishing scheme. Unlike previous censorship-resistant schemes, Dagster does not rely on the widespread replication of data and can even be used in a single server setting. It accomplishes this by “intertwining” legitimate and illegitimate data, so that a censor can not remove objectionable content without simultaneously removing leg...

متن کامل

Dust: A Blocking-Resistant Internet Transport Protocol

Censorship of free speech on the Internet has been an increasing problem as the methods of identifying and filtering traffic have become more sophisticated. A number of approaches to counteract Internet censorship have been implemented, from censorship-resistant publishing systems to anonymizing proxies. While existing systems provide protection against some attacks, they fail to provide resist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011