Skip to main content
Top

2014 | OriginalPaper | Chapter

On the Feasibility of a Technological Response to the Surveillance Morass

Authors : Joan Feigenbaum, Jérémie Koenig

Published in: Security Protocols XXII

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We consider mass surveillance from a computer-science perspective. After presenting some objections to the behavior of the US National Security Agency and its counterparts in allied nations (emphasizing technical problems associated with such behavior, rather than political, legal, and social problems), we propose a grass-roots, technological response: decentralized cloud services, facilitated by open-source, decentralized configuration-management tools.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Call for Papers, Cambridge Security Protocols Workshop, 2014.
 
Literature
1.
go back to reference Greenwald, G.: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, New York (2014) Greenwald, G.: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, New York (2014)
2.
go back to reference Goldfarb, A., Tucker, C.E.: Online advertising, behavioral targeting, and privacy. Commun. ACM 54(5), 25–27 (2011)CrossRef Goldfarb, A., Tucker, C.E.: Online advertising, behavioral targeting, and privacy. Commun. ACM 54(5), 25–27 (2011)CrossRef
3.
go back to reference Lichtblau, E., Schmidt, M.S.: Other Agencies Clamor for Data NSA Compiles. The New York Times, 23 Aug 2013 Lichtblau, E., Schmidt, M.S.: Other Agencies Clamor for Data NSA Compiles. The New York Times, 23 Aug 2013
4.
go back to reference Gorman, S.: NSA Officers Spy on Love Interests. The Wall Street Journal, 23 August 2013 Gorman, S.: NSA Officers Spy on Love Interests. The Wall Street Journal, 23 August 2013
5.
go back to reference Gellman, B., Soltani, A.: NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. The Washington Post, 30 Oct 2013 Gellman, B., Soltani, A.: NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. The Washington Post, 30 Oct 2013
7.
go back to reference Soltani, A., Gellman, B.: New Documents Show How the NSA Infers Relationships Based on Mobile Location Data. The Washington Post, 10 Dec 2013 Soltani, A., Gellman, B.: New Documents Show How the NSA Infers Relationships Based on Mobile Location Data. The Washington Post, 10 Dec 2013
8.
go back to reference Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)CrossRef Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)CrossRef
9.
go back to reference Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)CrossRef Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)CrossRef
10.
go back to reference Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13(4), 593–622 (2005) Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13(4), 593–622 (2005)
12.
go back to reference Prevelakis, V., Spinellis, D.: The athens affair. IEEE Spectrum. 44(7), 26–33 (2007)CrossRef Prevelakis, V., Spinellis, D.: The athens affair. IEEE Spectrum. 44(7), 26–33 (2007)CrossRef
14.
go back to reference Lanier, J.: Who Owns the Future?. Simon and Schuster, New York (2013) Lanier, J.: Who Owns the Future?. Simon and Schuster, New York (2013)
19.
go back to reference Madhavapeddy, A., Mortier, R., Rotsos, C., Scott, D., Singh, B., Gazagnaire, T., Smith, S., Hand, S., Crowcroft, J.: Unikernels: library operating systems for the cloud. In: 18th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 461–472. ACM Press, New York (2013) Madhavapeddy, A., Mortier, R., Rotsos, C., Scott, D., Singh, B., Gazagnaire, T., Smith, S., Hand, S., Crowcroft, J.: Unikernels: library operating systems for the cloud. In: 18th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 461–472. ACM Press, New York (2013)
Metadata
Title
On the Feasibility of a Technological Response to the Surveillance Morass
Authors
Joan Feigenbaum
Jérémie Koenig
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-12400-1_23

Premium Partner