{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T17:02:08Z","timestamp":1759683728807,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T00:00:00Z","timestamp":1512000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1651570"],"award-info":[{"award-number":["CNS-1651570"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,30]]},"DOI":"10.1145\/3152434.3152459","type":"proceedings-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T18:38:25Z","timestamp":1511807905000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["DIY Hosting for Online Privacy"],"prefix":"10.1145","author":[{"given":"Shoumik","family":"Palkar","sequence":"first","affiliation":[{"name":"Stanford University"}]},{"given":"Matei","family":"Zaharia","sequence":"additional","affiliation":[{"name":"Stanford University"}]}],"member":"320","published-online":{"date-parts":[[2017,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Vincent. Innovative Technology for CPU Based Attestation and Sealing. In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy","volume":"13","year":"2013","unstructured":"Anati, Ittai and Gueron, Shay and Johnson, Simon and Scarlata , Vincent. Innovative Technology for CPU Based Attestation and Sealing. In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy , volume 13 , 2013 . Anati, Ittai and Gueron, Shay and Johnson, Simon and Scarlata, Vincent. Innovative Technology for CPU Based Attestation and Sealing. In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy, volume 13, 2013."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026920"},{"key":"e_1_3_2_2_3_1","unstructured":"Amazon Web Services Simple Monthly Calculator. https:\/\/calculator.s3.amazonaws.com\/index.html.  Amazon Web Services Simple Monthly Calculator. https:\/\/calculator.s3.amazonaws.com\/index.html."},{"key":"e_1_3_2_2_4_1","unstructured":"AWS Shield. https:\/\/aws.amazon.com\/shield\/.  AWS Shield. https:\/\/aws.amazon.com\/shield\/."},{"key":"e_1_3_2_2_5_1","unstructured":"AWS Data Privacy. https:\/\/aws.amazon.com\/compliance\/data-privacy-faq\/.  AWS Data Privacy. https:\/\/aws.amazon.com\/compliance\/data-privacy-faq\/."},{"key":"e_1_3_2_2_6_1","unstructured":"Azure Functions. https:\/\/azure.microsoft.com\/en-us\/services\/functions\/.  Azure Functions. https:\/\/azure.microsoft.com\/en-us\/services\/functions\/."},{"key":"e_1_3_2_2_7_1","unstructured":"S. Biddle. Stop Using Unroll.me right now. It sold your data to Uber. https:\/\/theintercept.com\/2017\/04\/24\/stop-using-unroll-me-right-now-it-sold-your-data-to-uber\/.  S. Biddle. Stop Using Unroll.me right now. It sold your data to Uber. https:\/\/theintercept.com\/2017\/04\/24\/stop-using-unroll-me-right-now-it-sold-your-data-to-uber\/."},{"key":"e_1_3_2_2_8_1","first-page":"13","volume-title":"The Growth of Diaspora-a Centralized Online Social Network in the Wild. In Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on","author":"Bielenberg A.","year":"2012","unstructured":"A. Bielenberg , L. Helm , A. Gentilucci , D. Stefanescu , and H. Zhang . The Growth of Diaspora-a Centralized Online Social Network in the Wild. In Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on , pages 13 -- 18 . IEEE, 2012 . A. Bielenberg, L. Helm, A. Gentilucci, D. Stefanescu, and H. Zhang. The Growth of Diaspora-a Centralized Online Social Network in the Wild. In Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on, pages 13--18. IEEE, 2012."},{"key":"e_1_3_2_2_9_1","volume-title":"https:\/\/d0.awsstatic.com\/whitepapers\/KMS-Cryptographic-Details.pdf","author":"Key Management Service Cryptographic AWS","year":"2015","unstructured":"AWS Key Management Service Cryptographic Details. https:\/\/d0.awsstatic.com\/whitepapers\/KMS-Cryptographic-Details.pdf , 2015 . AWS Key Management Service Cryptographic Details. https:\/\/d0.awsstatic.com\/whitepapers\/KMS-Cryptographic-Details.pdf, 2015."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831090.2831109"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3154630.3154652"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_3_2_2_13_1","unstructured":"Django. http:\/\/djangoproject.com.  Django. http:\/\/djangoproject.com."},{"key":"e_1_3_2_2_14_1","unstructured":"Facebook Data Policy. https:\/\/www.facebook.com\/full_data_use_policy.  Facebook Data Policy. https:\/\/www.facebook.com\/full_data_use_policy."},{"key":"e_1_3_2_2_15_1","unstructured":"GoDaddy Email Hosting. https:\/\/www.godaddy.com\/email\/professional-email.  GoDaddy Email Hosting. https:\/\/www.godaddy.com\/email\/professional-email."},{"key":"e_1_3_2_2_16_1","unstructured":"Ex-Googler Allegedly Spied on User E-mails Chats. https:\/\/www.wired.com\/2010\/09\/google-spy\/.  Ex-Googler Allegedly Spied on User E-mails Chats. https:\/\/www.wired.com\/2010\/09\/google-spy\/."},{"key":"e_1_3_2_2_17_1","unstructured":"Google Talk is Being Discontinued. https:\/\/news.ycombinator.com\/item?id=13950002.  Google Talk is Being Discontinued. https:\/\/news.ycombinator.com\/item?id=13950002."},{"key":"e_1_3_2_2_18_1","volume-title":"An experimental study of the skype peer-to-peer voip system. Technical report","author":"Guha S.","year":"2005","unstructured":"S. Guha and N. Daswani . An experimental study of the skype peer-to-peer voip system. Technical report , Cornell University , 2005 . S. Guha and N. Daswani. An experimental study of the skype peer-to-peer voip system. Technical report, Cornell University, 2005."},{"key":"e_1_3_2_2_19_1","unstructured":"Five IRS Employees Charged with Snooping on Tax Returns. https:\/\/www.wired.com\/2008\/05\/five-irs-employ\/.  Five IRS Employees Charged with Snooping on Tax Returns. https:\/\/www.wired.com\/2008\/05\/five-irs-employ\/."},{"key":"e_1_3_2_2_20_1","first-page":"9","author":"Kallman W. R.","year":"2015","unstructured":"W. R. Kallman , D. L. Hoffman , and M. T. Mitchell . Peer-to-peer email , Oct. 20 2015 . US Patent 9 ,166,937. W. R. Kallman, D. L. Hoffman, and M. T. Mitchell. Peer-to-peer email, Oct. 20 2015. US Patent 9,166,937.","journal-title":"Peer-to-peer email"},{"key":"e_1_3_2_2_21_1","unstructured":"Amazon Key Management Service. https:\/\/aws.amazon.com\/kms.  Amazon Key Management Service. https:\/\/aws.amazon.com\/kms."},{"key":"e_1_3_2_2_22_1","unstructured":"Amazon Lambda. https:\/\/aws.amazon.com\/lambda.  Amazon Lambda. https:\/\/aws.amazon.com\/lambda."},{"key":"e_1_3_2_2_23_1","unstructured":"Data Breach Lawsuit. https:\/\/www.classaction.com\/data-breach\/lawsuit\/.  Data Breach Lawsuit. https:\/\/www.classaction.com\/data-breach\/lawsuit\/."},{"key":"e_1_3_2_2_24_1","first-page":"338","volume-title":"2011 IEEE International Conference on","author":"Mega G.","year":"2011","unstructured":"G. Mega , A. Montresor , and G. P. Picco . Efficient dissemination in decentralized social networks. In Peer-to-Peer Computing (P2P) , 2011 IEEE International Conference on , pages 338 -- 347 . IEEE, 2011 . G. Mega, A. Montresor, and G. P. Picco. Efficient dissemination in decentralized social networks. In Peer-to-Peer Computing (P2P), 2011 IEEE International Conference on, pages 338--347. IEEE, 2011."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616448.2616464"},{"key":"e_1_3_2_2_27_1","unstructured":"PRISM Surveillance Program. https:\/\/www.theguardian.com\/us-news\/prism.  PRISM Surveillance Program. https:\/\/www.theguardian.com\/us-news\/prism."},{"key":"e_1_3_2_2_28_1","unstructured":"UK Report Finds Rising Digial Privacy Concerns. https:\/\/techcrunch.com\/2016\/04\/21\/uk-report-finds-rising-digital-privacy-concerns\/.  UK Report Finds Rising Digial Privacy Concerns. https:\/\/techcrunch.com\/2016\/04\/21\/uk-report-finds-rising-digital-privacy-concerns\/."},{"key":"e_1_3_2_2_29_1","unstructured":"Rackspace Email Service. https:\/\/www.rackspace.com\/en-us\/email-hosting\/webmail.  Rackspace Email Service. https:\/\/www.rackspace.com\/en-us\/email-hosting\/webmail."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_2_31_1","unstructured":"Signal. https:\/\/whispersystems.org.  Signal. https:\/\/whispersystems.org."},{"key":"e_1_3_2_2_32_1","unstructured":"How Much Bandwidth does Skype Need? https:\/\/support.skype.com\/en\/faq\/FA1417\/how-much-bandwidth-does-skype-need.  How Much Bandwidth does Skype Need? https:\/\/support.skype.com\/en\/faq\/FA1417\/how-much-bandwidth-does-skype-need."},{"key":"e_1_3_2_2_33_1","unstructured":"Apache SpamAssassin. http:\/\/spamassassin.apache.org.  Apache SpamAssassin. http:\/\/spamassassin.apache.org."},{"key":"e_1_3_2_2_34_1","unstructured":"Rogue tax workers snooped on ex-spouses family members. https:\/\/www.thestar.com\/news\/canada\/2010\/06\/20\/rogue_tax_workers_snooped_on_exspouses_family_members.html.  Rogue tax workers snooped on ex-spouses family members. https:\/\/www.thestar.com\/news\/canada\/2010\/06\/20\/rogue_tax_workers_snooped_on_exspouses_family_members.html."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139567"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/3154630.3154654"},{"key":"e_1_3_2_2_37_1","unstructured":"WhatsApp Security. https:\/\/www.whatsapp.com\/security\/.  WhatsApp Security. https:\/\/www.whatsapp.com\/security\/."},{"volume-title":"https:\/\/www.nytimes.com\/2016\/12\/14\/technology\/yahoo-hack.html?_r=0","year":"2016","key":"e_1_3_2_2_38_1","unstructured":"Yahoo Says 1 Billion Accounts Were Hacked. https:\/\/www.nytimes.com\/2016\/12\/14\/technology\/yahoo-hack.html?_r=0 , 2016 . Yahoo Says 1 Billion Accounts Were Hacked. https:\/\/www.nytimes.com\/2016\/12\/14\/technology\/yahoo-hack.html?_r=0, 2016."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_2_40_1","unstructured":"Zappa. https:\/\/github.com\/Miserlou\/Zappa.  Zappa. https:\/\/github.com\/Miserlou\/Zappa."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901318.2901345"}],"event":{"name":"HotNets-XVI: The 16th ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"location":"Palo Alto CA USA","acronym":"HotNets-XVI"},"container-title":["Proceedings of the 16th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152434.3152459","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152434.3152459","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152434.3152459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:30Z","timestamp":1750212810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152434.3152459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,30]]},"references-count":41,"alternative-id":["10.1145\/3152434.3152459","10.1145\/3152434"],"URL":"https:\/\/doi.org\/10.1145\/3152434.3152459","relation":{},"subject":[],"published":{"date-parts":[[2017,11,30]]},"assertion":[{"value":"2017-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}