SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform

被引:0
作者
Marsalek, Alexander [1 ,2 ]
Pruenster, Bernd [2 ]
Suzic, Bojan [2 ]
Zefferer, Thomas [3 ]
机构
[1] Secure Informat Technol Ctr Austria, Graz, Austria
[2] Graz Univ Technol, IAIK, Graz, Austria
[3] A SIT Plus GmbH, Vienna, Austria
来源
INFORMATION SYSTEMS SECURITY, ICISS 2018 | 2018年 / 11281卷
关键词
Blockchain; Messenger; Decentralized; Secure data exchange; Censorship-resistant; Non-repudiation; Privacy preserving;
D O I
10.1007/978-3-030-05171-6_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Efficient and secure electronic communication is crucial for successful business-to-business processes. Due to the weaknesses of e-mail communication, a shift towards instant messaging can also be observed in this context. However, reliance on instant-messaging solutions in business processes has its own drawbacks such as the lack of archiving capabilities and unsatisfactory legal compliance. Furthermore, special business scenarios such as bidding processes come with complex security requirements that are not met by current instant-messaging solutions. To also enable efficient and secure electronic communication for these scenarios, we propose a blockchain-based instant-messaging solution under the name SeDiCom. SeDiCom employs the capabilities of the blockchain technology, one-time identities, and the Tor anonymity network to enable confidential instant messaging without leaking any identifying metadata. Our proposed solution provides non-repudiation, censorship resistance, integrated backup facilities, and verifiable notices of receipt, while inherently preventing man-in-the-middle attacks and virtually all other forms of eavesdropping. By this means, SeDiCom enables efficient and secure electronic communication for business scenarios with special security requirements while also catering to today's usage patterns.
引用
收藏
页码:345 / 363
页数:19
相关论文
共 26 条
[1]  
[Anonymous], 2010, Standards for efficient cryptography 2 (SEC 2: Recommended elliptic curve domain parameters, Version 2.0)
[2]   A study of ten popular Android mobile VoIP applications: Are the communications encrypted? [J].
Azfar, Abdullah ;
Choo, Kim-Kwang Raymond ;
Liu, Lin .
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, :4858-4867
[3]  
Buterin V., 2013, GitHub repository
[4]   Unintended consequences of emerging communication technologies: Instant Messaging in the workplace [J].
Cameron, AF ;
Webster, J .
COMPUTERS IN HUMAN BEHAVIOR, 2005, 21 (01) :85-103
[5]  
Carnegie Mellon University, 2017, CERT DIV SPOOF FORG
[6]  
cnet.com, 2009, CNET COM
[7]   A Formal Security Analysis of the Signal Messaging Protocol [J].
Cohn-Gordon, Katriel ;
Cremers, Cas ;
Dowling, Benjamin ;
Garratt, Luke ;
Stebila, Douglas .
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, :451-466
[8]  
Cole David., 2014, The New York Review of Books, V10, P2014
[9]   Traffic Analysis of Encrypted Messaging Services: Apple iMessage and Beyond [J].
Coull, Scott E. ;
Dyer, Kevin P. .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (05) :6-11
[10]  
Crypviser GmbH, 2017, CRYPV MOST SEC SOL E