Abstract
Nowadays, social networks (like Facebook) have not only absorbed the function of abating pure IM (Instant Messaging) systems (like ICQ) but also their dangers, such as cyberbullying and security violations. Existent safe IM blacklist sifters already conform to the security objectives authenticity, integrity, privacy, and resilience, but simple tricks of inventive bullies can evade filtering of their originated instant messages. Therefore, this treatise introduces a novel conception of a secure IM sieve based on whitelisting. Beside a detailed view on the underlying architecture, security and performance analyses adumbrate the feasibility of the approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
van den Berg, B.: Colouring inside the lines: using technology to regulate childrens behaviour online. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 67–85. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_4
van den Berg, B.: Regulating online child safety: introduction. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 1–16. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_1
Boss, G., McConnell, K.C.: System and method for filtering instant messages by context, US Patent App. 10/356,100. https://www.google.com/patents/US20040154022
Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp. 917–922, June 2012. doi:10.1109/ICC.2012.6364125
Ciavarella, R., de Terwangne, C.: Online social networks and young peoples privacy protection: the role of the right to be forgotten. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 157–171. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_9
Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, New York (2001)
Fahrnberger, G.: Computing on encrypted character strings in clouds. In: Hota, C., Srimani, P.K. (eds.) Distributed Computing and Internet Technology. LNCS, vol. 7753, pp. 244–254. Springer, Heidelberg (2013). doi:10.1007/978-3-642-36071-8_19
Fahrnberger, G.: Securestring 2.0 - a cryptosystem for computing on encrypted character strings in clouds. In: Eichler, G., Gumzej, R. (eds.) Networked Information Systems. Fortschritt-Berichte Reihe 10, vol. 826, pp. 226–240. VDI Düsseldorf, June 2013. doi:10.13140/RG.2.1.4846.7521/3
Fahrnberger, G.: A second view on securestring 2.0. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 239–250. Springer, Heidelberg (2014). doi:10.1007/978-3-319-04483-5_25
Fahrnberger, G.: SIMS: a comprehensive approach for a secure instant messaging sifter. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 164–173, September 2014. doi:10.1109/TrustCom.2014.25
Fahrnberger, G.: Repetition pattern attack on multi-word-containing securestring 2.0 objects. In: Natarajan, R., Barua, G., Patra, M.R. (eds.) ICDCIT 2015. LNCS, vol. 8956, pp. 265–277. Springer, Heidelberg (2015). doi:10.1007/978-3-319-14977-6_26
Fahrnberger, G.: A detailed view on securestring 3.0. In: Chakrabarti, A., Sharma, N., Balas, V.E. (eds.) Advances in Computing Applications. Springer, Singapore, November 2016. doi:10.1007/978-981-10-2630-0_7
Fahrnberger, G., Heneis, K.: Securestring 3.0 - a cryptosystem for blind computing on encrypted character strings. In: Natarajan, R., Barua, G., Patra, M.R. (eds.) ICDCIT 2015. LNCS, vol. 8956, pp. 331–334. Springer, Heidelberg (2015). doi:10.1007/978-3-319-14977-6_33
Fahrnberger, G., Nayak, D., Martha, V.S., Ramaswamy, S.: Safechat: a tool to shield children’s communication from explicit messages. In: 2014 14th International Conference on Innovations for Community Services (I4CS), pp. 80–86, June 2014. doi:10.1109/I4CS.2014.6860557
Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, New York (2003)
Ganz, H., Borst, K.J.: Multiple-layer chat filter system and method, US Patent 8,316,097. https://www.google.com/patents/US8316097
Genner, S.: Violent video games and cyberbullying: why education is better than regulation. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 229–243. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_13
van der Hof, S.: No childs play: online data protection for children. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 127–141. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_7
ISO, IEC 10116:2006: Information technology - security techniques - modes of operation for an n-bit block cipher. International Organization for Standardization, February 2006. https://www.iso.org/iso/catalogue_detail?csnumber=38761
van der Knaap, L.M., Cuijpers, C.: Regulating online sexual solicitation: towards evidence-based policy and regulation. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 265–281. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_15
Landsman, R.: Filter for instant messaging, US Patent Ap. 11/252,664. https://www.google.com/patents/US20070088793
Lievens, E.: Children and peer-to-peer risks in social networks: regulating, empowering or a little bit of both? In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 191–209. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_11
Liu, Z., Lin, W., Li, N., Lee, D.: Detecting and filtering instant messaging spam - a global and personalized approach. In: 1st IEEE ICNP Workshop on Secure Network Protocols, (NPSec), pp. 19–24, November 2005. doi:10.1109/NPSEC.2005.1532048
Miller, G.A.: Wordnet: a lexical database for english. Commun. ACM 38(11), 39–41 (1995). doi:10.1145/219717.219748
Notten, N.: Taking risks on the world wide web: the impact of families and societies on adolescents risky online behavior. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 105–123. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_6
Örencik, C., Savas, E.: An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distrib. Parallel Databases 32(1), 119–160 (2014). doi:10.1007/s10619-013-7123-9
Sonck, N., de Haan, J.: Safety by literacy? rethinking the role of digital skills in improving online safety. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 89–104. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_5
Stebila, D., Green, J.: Elliptic curve algorithm integration in the secure shell transport layer. RFC 5656 (Proposed Standard), December 2009. https://www.ietf.org/rfc/rfc5656.txt
Thierer, A.: A framework for responding to online safety risks. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 39–66. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_3
Vandebosch, H.: Addressing cyberbullying using a multi-stakeholder approach: the flemish case. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 245–262. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_14
Waksman, A., Sethumadhavan, S.: Tamper evident microprocessors. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 173–188, May 2010. doi:10.1109/SP.2010.19
van der Zwaan, J.M., Dignum, V., Jonker, C.M., van der Hof, S.: On technology against cyberbullying. In: van der Hof, S., van den Berg, B., Schermer, B. (eds.) Minding Minors Wandering the Web: Regulating Online Child Safety, Information Technology and Law Series, vol. 24, pp. 211–228. T.M.C. Asser Press, March 2014. doi:10.1007/978-94-6265-005-3_12
Acknowledgments
Many thanks to Bettina Baumgartner from the University of Vienna for proofreading this paper!
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Fahrnberger, G. (2016). Secure Whitelisting of Instant Messages. In: Fahrnberger, G., Eichler, G., Erfurth, C. (eds) Innovations for Community Services. I4CS 2016. Communications in Computer and Information Science, vol 648. Springer, Cham. https://doi.org/10.1007/978-3-319-49466-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-49466-1_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49465-4
Online ISBN: 978-3-319-49466-1
eBook Packages: Computer ScienceComputer Science (R0)