Publication:
Informing protocol design through crowdsourcing: The case of pervasive encryption

dc.affiliation.dptoUC3M. Departamento de Ingeniería Telemáticaes
dc.affiliation.grupoinvUC3M. Grupo de Investigación: Network Technologieses
dc.contributor.authorMandalari, Anna María
dc.contributor.authorBagnulo Braun, Marcelo Gabriel
dc.contributor.authorLutu, Andra Elena
dc.date.accessioned2022-04-29T09:09:18Z
dc.date.available2022-04-29T09:09:18Z
dc.date.issued2015-08-17
dc.descriptionProceeding of: C2B(1)D '15: 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, August 17, 2015, London, United Kingdomen
dc.description.abstractMiddleboxes, such as proxies, firewalls and NATs play an important role in the modern Internet ecosystem. On one hand, they perform advanced functions, e.g. traffic shaping, security or enhancing application performance. On the other hand, they turn the Internet into a hostile ecosystem for innovation, as they limit the deviation from deployed protocols. It is therefore essential, when designing a new protocol, to first understand its interaction with the elements of the path. The emerging area of crowdsourcing solutions can help to shed light on this issue. Such approach allows us to reach large and different sets of users and also different types of devices and networks to perform Internet measurements. In this paper, we show how to make informed protocol design choices by using a crowdsourcing platform. We consider a specific use case, namely the case of pervasive encryption in the modern Internet. Given the latest public disclosures of the NSA global surveillance operations, the issue of privacy in the Internet became of paramount importance. Internet community efforts are thus underway to increase the adoption of encryption. Using a crowdsourcing approach, we perform large-scale TLS measurements to advance our understanding on whether wide adoption of encryption is possible in today’s Internet.en
dc.description.sponsorshipThe work of Anna Maria Mandalari has been funded by the EU FP7 METRICS (607728) project. The work of Marcelo Bagnulo has been funded by the EU FP7 Trilogy2 (317756) project.en
dc.description.statusPublicadoes
dc.format.extent5
dc.identifier.bibliographicCitationC2B(I)D 2015: Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, Part of SIGCOMM'15, August 17, 2015, London, United Kingdom. New York: Association For Computing Machinery, pp.: 33-38.en
dc.identifier.doihttps://doi.org/10.1145/2787394.2787397
dc.identifier.isbn978-1-4503-3539-3
dc.identifier.publicationfirstpage33
dc.identifier.publicationlastpage38
dc.identifier.publicationtitleC2B(I)D 2015: Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, Part of SIGCOMM'15, August 17, 2015, London, United Kingdomen
dc.identifier.urihttps://hdl.handle.net/10016/34658
dc.identifier.uxxiCC/0000033311
dc.language.isoengen
dc.publisherAssociation For Computing Machinery (ACM)en
dc.relation.eventdate2015-08-17
dc.relation.eventplaceLondon (United Kingdom)en
dc.relation.eventtitleACM SIGCOMM Workshop on Crowdsourcing and crowdsharing of Big (Internet) Data: (C2B(I)D)en
dc.relation.projectIDinfo:eu-repo/grantAgreement/EC/FP7-ICT-2011-8-317756en
dc.relation.projectIDinfo:eu-repo/grantAgreement/EC/PITN-GA-2013-607728en
dc.rights© 2015 ACM. Permission to make digital or hard copies of portions of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyright for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permission to republish from: permissions@acm.org.en
dc.rights.accessRightsopen accessen
dc.subject.ecienciaTelecomunicacioneses
dc.subject.otherCrowdsourcingen
dc.subject.otherTLSen
dc.subject.otherInternet measurementsen
dc.subject.otherMiddleboxesen
dc.titleInforming protocol design through crowdsourcing: The case of pervasive encryptionen
dc.typeconference proceedings*
dc.type.hasVersionAM*
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
informing_C2B(1)D_2015_ps.pdf
Size:
270.88 KB
Format:
Adobe Portable Document Format