Browse Source

add twitterize to bibliography

Carsten Porth 6 years ago
parent
commit
b65fa8f496
2 changed files with 25 additions and 3 deletions
  1. 22 0
      thesis/bib/bibliography.bib
  2. 3 3
      thesis/content/03-related-work/twitterize.tex

+ 22 - 0
thesis/bib/bibliography.bib

@@ -1,3 +1,25 @@
 % Encoding: UTF-8
 
+@InProceedings{daubert2014twitterize,
+  author       = {Daubert, Jörg and Bock, Leon and Kikirasy, Panayotis and Mühlhauser, Max and Fischer, Mathias},
+  title        = {Twitterize: Anonymous micro-blogging},
+  booktitle    = {2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)},
+  year         = {2014},
+  pages        = {817--823},
+  organization = {IEEE},
+}
+
+@InProceedings{daubert2013distributed-anonymous-pubsub,
+  author    = {Daubert, J{\"o}rg and Fischer, Mathias and Schiffner, Stefan and M{\"u}hlh{\"a}user, Max},
+  title     = {Distributed and Anonymous Publish-Subscribe},
+  booktitle = {Network and System Security},
+  year      = {2013},
+  editor    = {Lopez, Javier and Huang, Xinyi and Sandhu, Ravi},
+  pages     = {685--691},
+  address   = {Berlin, Heidelberg},
+  publisher = {Springer Berlin Heidelberg},
+  abstract  = {Publish-subscribe is a scheme for distributing information based on interests. While security mechanisms have been added to publish-subscribe, privacy, in particular anonymous communication is hardly considered. We summarize security and privacy requirements for such systems, including an adversary model for privacy. We introduce a construction for publish-subscribe overlays that fulfills the requirements. Contrary to previous approaches, it does neither presume an online trusted third party, nor expensive cryptographic operations performed by brokers. Further, we informally discuss how our requirements are met.},
+  isbn      = {978-3-642-38631-2},
+}
+
 @Comment{jabref-meta: databaseType:bibtex;}

+ 3 - 3
thesis/content/03-related-work/twitterize.tex

@@ -1,4 +1,4 @@
-With Twitterize, Daubert et al. present an approach on how data can be protected by a special overlay network and anonymously exchanged within a social network. The proposal refers to micro-blogging social networks such as Twitter. For this, a proof of concept in the form of an Android app was developed.
+With Twitterize, Daubert et al. present an approach on how data can be protected by a special overlay network and anonymously exchanged within a social network\cite{daubert2014twitterize}. The proposal refers to micro-blogging social networks such as Twitter. For this, a proof of concept in the form of an Android app was developed.
 
 \subsubsection{Design Principles}
 Daubert et al. made various demands on the proposed solution. With regard to the protection of privacy in general:
@@ -30,7 +30,7 @@ First, a user must define the hashtag and generate a key for symmetric encryptio
 
 In order join the group, other users need the key and knowledge of the name of the hashtag. However, the key exchange should not be carried out via the social network used. An exchange via e-mail, NFC, QR codes, etc. is conceivable.
 
-If the users of a group with a common hashtag are all aware of the key and the hash tag, the second phase of building an overlay network begins. Here the private flooding mechanism is used. A publisher creates an advertisement tweet consisting of a pseudonym and the first element of a hash chain and posts it in the underlay network. This tweet appears in the timelines of his followers. If not already done, each follower distributes the advertisement tweet on his own timeline and thus reaches his own followers. However, this tweet differs from the original tweet by extending the hash chain. It generates a hash of the previous hash chain and thus receives the next element of the chain. According to this principle, the entire network is flooded and as a result, each user saves a triplet consisting of pseudonym, hash chain and the user before him in the chain in a database table.
+If the users of a group with a common hashtag are all aware of the key and the hash tag, the second phase of building an overlay network begins. Here the private flooding mechanism is used\cite{daubert2013distributed-anonymous-pubsub}. A publisher creates an advertisement tweet consisting of a pseudonym and the first element of a hash chain and posts it in the underlay network. This tweet appears in the timelines of his followers. If not already done, each follower distributes the advertisement tweet on his own timeline and thus reaches his own followers. However, this tweet differs from the original tweet by extending the hash chain. It generates a hash of the previous hash chain and thus receives the next element of the chain. According to this principle, the entire network is flooded and as a result, each user saves a triplet consisting of pseudonym, hash chain and the user before him in the chain in a database table.
 
 If the advertisement tweet reaches a user who is aware of the hashtag and the associated key, the user responds with a subscription tweet. This message is addressed to the user from whom the advertisement tweet was received and contains the user name (@user) and the pseudonym. The user thus addressed in turn posts a message consisting of the user name of the user from whom he received the advertisement tweet and the pseudonym. This happens until the original publisher has been reached. In this process, another routing table is filled with pseudonym and sending user. The overlay network is thus formed. Since each user only has a local view of the message flow, no conclusions about sender and recipient can be drawn from the message flow.
 
@@ -40,7 +40,7 @@ In the third phase, users can exchange messages using the previously shared hash
 	\centering
 	\includegraphics[width=1.0\textwidth]{twitterize-information-flow}
 	\label{fig:twitterize-information-flow}
-	\caption{.}
+	\caption{.\cite{daubert2014twitterize}}
 \end{figure}
 
 \subsubsection{Proof of Concept}