Abstract
Efficient and secure electronic communication is crucial for successful business-to-business processes. Due to the weaknesses of e-mail communication, a shift towards instant messaging can also be observed in this context. However, reliance on instant-messaging solutions in business processes has its own drawbacks such as the lack of archiving capabilities and unsatisfactory legal compliance. Furthermore, special business scenarios such as bidding processes come with complex security requirements that are not met by current instant-messaging solutions. To also enable efficient and secure electronic communication for these scenarios, we propose a blockchain-based instant-messaging solution under the name SeDiCom. SeDiCom employs the capabilities of the blockchain technology, one-time identities, and the Tor anonymity network to enable confidential instant messaging without leaking any identifying metadata. Our proposed solution provides non-repudiation, censorship resistance, integrated backup facilities, and verifiable notices of receipt, while inherently preventing man-in-the-middle attacks and virtually all other forms of eavesdropping. By this means, SeDiCom enables efficient and secure electronic communication for business scenarios with special security requirements while also catering to today’s usage patterns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
In case of a proof-of-work based blockchain..
- 5.
- 6.
- 7.
- 8.
- 9.
As an example, Bitcoin wallets typically require a maturity depth of six blocks. Meaning six additional blocks need to be created after the block containing the corresponding transaction.
- 10.
Ethereum does not define a maximum block size in contrast to e.g. Bitcoin.
- 11.
Transactions related to the creation of a smart contracts are ignored and not included into a block.
- 12.
- 13.
- 14.
References
WhatsApp. One Billion, 1 February 2016. https://blog.whatsapp.com/616/One-billion. Accessed 19 Apr 2017
Fiadino, P., Schiavone, M., Casas, P.: Vivisecting WhatsApp in cellular networks: servers, flows, and quality of experience. In: Steiner, M., Barlet-Ros, P., Bonaventure, O. (eds.) TMA 2015. LNCS, vol. 9053, pp. 49–63. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-17172-2_4
Coull, S.E., Dyer, K.P.: Traffic analysis of encrypted messaging services: Apple imessage and beyond. ACM SIGCOMM Comput. Commun. Rev. 44(5), 5–11 (2014)
Azfar, A., Choo, K.K.R., Liu, L.: A study of ten popular android mobile voip applications: are the communications encrypted? In: 2014 HICSS-47, pp. 4858-4867 (2014). https://doi.org/10.1109/HICSS.2014.596
cnet.com: Instant messaging latest trend in e-commerce software (2009). https://www.cnet.com/news/instant-messaging-latest-trend-in-e-commerce-software/
Lawton, G.: Instant messaging puts on a business suit. Computer 36(3), 14–16 (2003)
Doyle, S.: Is instant messaging going to replace SMS and e-mail as the medium of choice for direct customer communications? J. Datab. Mark. Customer Strategy Manag. 11, 17–182 (2003)
Cameron, A.F., Webster, J.: Unintended consequences of emerging communication technologies: instant messaging in the workplace. Comput. Hum. Behav. 21(1), 85–103 (2005). ISSN 0747–5632
Gann, R.: Instant messaging for business (2012). https://www.techradar.com/news/world-of-tech/roundup/instant-messaging-for-business-1075434
Schneier, B.: NSA doesn’t need to spy on your calls to learn your secrets. Wired (2015)
Mayer, J., Mutchler, P., Mitchell, J.C.: Evaluating the privacy properties of telephone metadata. Proc. Nat. Acad. Sci. 113(20), 5536–5541 (2016). https://doi.org/10.1073/pnas.1508081113
Schneier, B.: Metadata = surveillance. IEEE Secur. Priv. 12(2), 84–84 (2014). https://doi.org/10.1109/MSP.2014.28. ISSN 1540-7993
Cole, D.: We kill people based on metadata. N. Y. Rev. Books 10, 2014 (2014)
Goldberg, I., OTR Development Team: Off-the record messaging protocol version 3, 6 January 2016. https://otr.cypherpunks.ca/Protocol-v3-4.0.0.html. Accessed 16 Mar 2017
Crypviser GmbH: Crypviser - the most secure solution ever (whitepaper), May 2017. https://ico.crypviser.net/static/docs/CrypViserWhitepaper_en.pdf. Accessed 05 Sept 2017
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). eprint: https://bitcoin.org/bitcoin.pdf
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, August 2004
Buterin, V., et al.: Ethereum white paper (2013). https://github.com/ethereum/wiki/wiki/White-Paper
Sziláyi, P.: Clique PoA protocol & Rinkeby PoA testnet #225 (2017). https://github.com/ethereum/EIPs/issues/225
Greenwald, G.: NSA collecting phone records of millions of Verizon customers daily. The Guardian 6(5), 13 (2013)
Lyon, J., Wong, M.: Sender id: Authenticating e-mail. RFC Editor, RFC 4406, April 2006
Carnegie Mellon University: CERT Division: Spoofed/forged email, September 2017. http://cert.org/historical/tech_tips/email_spoofing.cfm. Accessed 05 Sept 2017
Brown, D.R.L.: Standards for Efficient Cryptography 2 (SEC 2), January 2010. http://www.secg.org/sec2-v2.pdf. Accessed 27 July 2018
Petrlic, R., Sorge, C.: Instant messaging. Datenschutz, pp. 97–108. Springer, Wiesbaden (2017). https://doi.org/10.1007/978-3-658-16839-1_8
Schrittwieser, S., et al.: Guess who’s texting you. Evaluating the Security of Smartphone Messaging Applications, SBA Research gGmbH (2012)
Cohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: 2017 IEEE EuroS&P, April 2017, pp. 451–466. https://doi.org/10.1109/EuroSP.2017.27
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Marsalek, A., Prünster, B., Suzic, B., Zefferer, T. (2018). SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform. In: Ganapathy, V., Jaeger, T., Shyamasundar, R. (eds) Information Systems Security. ICISS 2018. Lecture Notes in Computer Science(), vol 11281. Springer, Cham. https://doi.org/10.1007/978-3-030-05171-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-05171-6_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05170-9
Online ISBN: 978-3-030-05171-6
eBook Packages: Computer ScienceComputer Science (R0)