Skip to main content

Secure Whitelisting of Instant Messages

  • Conference paper
  • First Online:
Innovations for Community Services (I4CS 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 648))

Included in the following conference series:

Abstract

Nowadays, social networks (like Facebook) have not only absorbed the function of abating pure IM (Instant Messaging) systems (like ICQ) but also their dangers, such as cyberbullying and security violations. Existent safe IM blacklist sifters already conform to the security objectives authenticity, integrity, privacy, and resilience, but simple tricks of inventive bullies can evade filtering of their originated instant messages. Therefore, this treatise introduces a novel conception of a secure IM sieve based on whitelisting. Beside a detailed view on the underlying architecture, security and performance analyses adumbrate the feasibility of the approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. van den Berg, B.: Colouring inside the lines: using technology to regulate childrens behaviour online. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 67–85. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_4

    Google Scholar 

  2. van den Berg, B.: Regulating online child safety: introduction. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 1–16. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_1

    Google Scholar 

  3. Boss, G., McConnell, K.C.: System and method for filtering instant messages by context, US Patent App. 10/356,100. https://www.google.com/patents/US20040154022

  4. Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp. 917–922, June 2012. doi:10.1109/ICC.2012.6364125

  5. Ciavarella, R., de Terwangne, C.: Online social networks and young peoples privacy protection: the role of the right to be forgotten. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 157–171. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_9

    Google Scholar 

  6. Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, New York (2001)

    MATH  Google Scholar 

  7. Fahrnberger, G.: Computing on encrypted character strings in clouds. In: Hota, C., Srimani, P.K. (eds.) Distributed Computing and Internet Technology. LNCS, vol. 7753, pp. 244–254. Springer, Heidelberg (2013). doi:10.1007/978-3-642-36071-8_19

    Google Scholar 

  8. Fahrnberger, G.: Securestring 2.0 - a cryptosystem for computing on encrypted character strings in clouds. In: Eichler, G., Gumzej, R. (eds.) Networked Information Systems. Fortschritt-Berichte Reihe 10, vol. 826, pp. 226–240. VDI Düsseldorf, June 2013. doi:10.13140/RG.2.1.4846.7521/3

  9. Fahrnberger, G.: A second view on securestring 2.0. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 239–250. Springer, Heidelberg (2014). doi:10.1007/978-3-319-04483-5_25

    Chapter  Google Scholar 

  10. Fahrnberger, G.: SIMS: a comprehensive approach for a secure instant messaging sifter. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 164–173, September 2014. doi:10.1109/TrustCom.2014.25

  11. Fahrnberger, G.: Repetition pattern attack on multi-word-containing securestring 2.0 objects. In: Natarajan, R., Barua, G., Patra, M.R. (eds.) ICDCIT 2015. LNCS, vol. 8956, pp. 265–277. Springer, Heidelberg (2015). doi:10.1007/978-3-319-14977-6_26

    Google Scholar 

  12. Fahrnberger, G.: A detailed view on securestring 3.0. In: Chakrabarti, A., Sharma, N., Balas, V.E. (eds.) Advances in Computing Applications. Springer, Singapore, November 2016. doi:10.1007/978-981-10-2630-0_7

    Google Scholar 

  13. Fahrnberger, G., Heneis, K.: Securestring 3.0 - a cryptosystem for blind computing on encrypted character strings. In: Natarajan, R., Barua, G., Patra, M.R. (eds.) ICDCIT 2015. LNCS, vol. 8956, pp. 331–334. Springer, Heidelberg (2015). doi:10.1007/978-3-319-14977-6_33

    Google Scholar 

  14. Fahrnberger, G., Nayak, D., Martha, V.S., Ramaswamy, S.: Safechat: a tool to shield children’s communication from explicit messages. In: 2014 14th International Conference on Innovations for Community Services (I4CS), pp. 80–86, June 2014. doi:10.1109/I4CS.2014.6860557

  15. Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, New York (2003)

    MATH  Google Scholar 

  16. Ganz, H., Borst, K.J.: Multiple-layer chat filter system and method, US Patent 8,316,097. https://www.google.com/patents/US8316097

  17. Genner, S.: Violent video games and cyberbullying: why education is better than regulation. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 229–243. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_13

    Google Scholar 

  18. van der Hof, S.: No childs play: online data protection for children. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 127–141. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_7

    Google Scholar 

  19. ISO, IEC 10116:2006: Information technology - security techniques - modes of operation for an n-bit block cipher. International Organization for Standardization, February 2006. https://www.iso.org/iso/catalogue_detail?csnumber=38761

  20. van der Knaap, L.M., Cuijpers, C.: Regulating online sexual solicitation: towards evidence-based policy and regulation. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 265–281. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_15

    Google Scholar 

  21. Landsman, R.: Filter for instant messaging, US Patent Ap. 11/252,664. https://www.google.com/patents/US20070088793

  22. Lievens, E.: Children and peer-to-peer risks in social networks: regulating, empowering or a little bit of both? In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 191–209. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_11

    Google Scholar 

  23. Liu, Z., Lin, W., Li, N., Lee, D.: Detecting and filtering instant messaging spam - a global and personalized approach. In: 1st IEEE ICNP Workshop on Secure Network Protocols, (NPSec), pp. 19–24, November 2005. doi:10.1109/NPSEC.2005.1532048

  24. Miller, G.A.: Wordnet: a lexical database for english. Commun. ACM 38(11), 39–41 (1995). doi:10.1145/219717.219748

    Google Scholar 

  25. Notten, N.: Taking risks on the world wide web: the impact of families and societies on adolescents risky online behavior. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 105–123. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_6

    Google Scholar 

  26. Örencik, C., Savas, E.: An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distrib. Parallel Databases 32(1), 119–160 (2014). doi:10.1007/s10619-013-7123-9

    Google Scholar 

  27. Sonck, N., de Haan, J.: Safety by literacy? rethinking the role of digital skills in improving online safety. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 89–104. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_5

    Google Scholar 

  28. Stebila, D., Green, J.: Elliptic curve algorithm integration in the secure shell transport layer. RFC 5656 (Proposed Standard), December 2009. https://www.ietf.org/rfc/rfc5656.txt

  29. Thierer, A.: A framework for responding to online safety risks. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 39–66. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_3

    Google Scholar 

  30. Vandebosch, H.: Addressing cyberbullying using a multi-stakeholder approach: the flemish case. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 245–262. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_14

    Google Scholar 

  31. Waksman, A., Sethumadhavan, S.: Tamper evident microprocessors. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 173–188, May 2010. doi:10.1109/SP.2010.19

  32. van der Zwaan, J.M., Dignum, V., Jonker, C.M., van der Hof, S.: On technology against cyberbullying. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 211–228. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_12

    Google Scholar 

Download references

Acknowledgments

Many thanks to Bettina Baumgartner from the University of Vienna for proofreading this paper!

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Günter Fahrnberger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Fahrnberger, G. (2016). Secure Whitelisting of Instant Messages. In: Fahrnberger, G., Eichler, G., Erfurth, C. (eds) Innovations for Community Services. I4CS 2016. Communications in Computer and Information Science, vol 648. Springer, Cham. https://doi.org/10.1007/978-3-319-49466-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49466-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49465-4

  • Online ISBN: 978-3-319-49466-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics