Accessing Google Scholar under Extreme Internet Censorship A
![Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue Zhen Lu, VMware Zhenhua Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue Zhen Lu, VMware Zhenhua](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-1.jpg)
![Outline 1 2 3 4 Background Feasibility Study Scholar. Cloud System Performance 5 Summary Outline 1 2 3 4 Background Feasibility Study Scholar. Cloud System Performance 5 Summary](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-2.jpg)
![Internet censorship across the world China, Iran, Russia, Thailand … q Political websites are Internet censorship across the world China, Iran, Russia, Thailand … q Political websites are](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-3.jpg)
![Troubles of scholars Find a topic -> Google Scholar search -> Read papers Google Troubles of scholars Find a topic -> Google Scholar search -> Read papers Google](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-4.jpg)
![Troubles of scholars Find a topic -> Google Scholar search -> Read papers Chinese Troubles of scholars Find a topic -> Google Scholar search -> Read papers Chinese](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-5.jpg)
![Ways to bypass censorship All roads lead to Rome! VPN Tor Shadowsocks Other Proxies Ways to bypass censorship All roads lead to Rome! VPN Tor Shadowsocks Other Proxies](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-6.jpg)
![Problems of circumvention system Difficult to use not available Expensive Illegal Unstable/ Why not Problems of circumvention system Difficult to use not available Expensive Illegal Unstable/ Why not](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-7.jpg)
![2 Feasibility Study 8 2 Feasibility Study 8](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-8.jpg)
![Internet censorship in China Technical part Governmental part Get registered on MIIT website -> Internet censorship in China Technical part Governmental part Get registered on MIIT website ->](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-9.jpg)
![Mainstream Choice 371 faculty members and students from THU q VPN is the most Mainstream Choice 371 faculty members and students from THU q VPN is the most](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-10.jpg)
![Comparison q VPN √ Stable × Exposed to GFW (DPI) q open. VPN √ Comparison q VPN √ Stable × Exposed to GFW (DPI) q open. VPN √](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-11.jpg)
![Comparison q Tor × Exposed to GFW (DPI) √ Automatic Configuration q Shadowsocks √ Comparison q Tor × Exposed to GFW (DPI) √ Automatic Configuration q Shadowsocks √](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-12.jpg)
![3 Scholar. Cloud System 13 3 Scholar. Cloud System 13](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-13.jpg)
![Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-14.jpg)
![Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-15.jpg)
![Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-16.jpg)
![Key points Split-proxy and auto-config http: //pac. scholar. thucloud. com/df 70 d 12 a-f Key points Split-proxy and auto-config http: //pac. scholar. thucloud. com/df 70 d 12 a-f](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-17.jpg)
![Key points Split-proxy and auto-config http: //pac. scholar. thucloud. com/df 70 d 12 a-f Key points Split-proxy and auto-config http: //pac. scholar. thucloud. com/df 70 d 12 a-f](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-18.jpg)
![Key points Message blinding Public well-known encryption schemes suffer from DPI. (Liang Wang, CCS Key points Message blinding Public well-known encryption schemes suffer from DPI. (Liang Wang, CCS](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-19.jpg)
![Key points Service legalization ICP Reg. #15063437 in China Internet Censorship Key points Service legalization ICP Reg. #15063437 in China Internet Censorship](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-20.jpg)
![4 Performance 21 4 Performance 21](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-21.jpg)
![Network experience 1 TCP Stream S. S. only. 10 s timeout. Main stream First-time* Network experience 1 TCP Stream S. S. only. 10 s timeout. Main stream First-time*](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-22.jpg)
![Network experience 2 Page load time u Worst first-time latency 15 s —— Tor Network experience 2 Page load time u Worst first-time latency 15 s —— Tor](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-23.jpg)
![Network experience 3 Round-Trip Time u Tor has the largest average RTT u Tor Network experience 3 Round-Trip Time u Tor has the largest average RTT u Tor](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-24.jpg)
![Network experience 4 Packet Lost Rate u Tor suffers from 4. 4% PLR u Network experience 4 Packet Lost Rate u Tor suffers from 4. 4% PLR u](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-25.jpg)
![Client side overhead Network Traffic CPU Memory Differences are not remarkable, while Scholar. Cloud Client side overhead Network Traffic CPU Memory Differences are not remarkable, while Scholar. Cloud](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-26.jpg)
![Scalability u. Shadowsocks PLT sharply grows after 60 u. Scholar. Cloud acts well in Scalability u. Shadowsocks PLT sharply grows after 60 u. Scholar. Cloud acts well in](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-27.jpg)
![Summary p. Legally accessing Google Scholar under extreme censorship p. Design and deploy Scholar. Summary p. Legally accessing Google Scholar under extreme censorship p. Design and deploy Scholar.](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-28.jpg)
![The End Thank you! The End Thank you!](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-29.jpg)
![System Architecture p Portal website system p Split-proxy system p User control system System Architecture p Portal website system p Split-proxy system p User control system](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-30.jpg)
![System Architecture System Architecture](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-31.jpg)
- Slides: 31
![Accessing Google Scholar under Extreme Internet Censorship A Legal Avenue Zhen Lu VMware Zhenhua Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue Zhen Lu, VMware Zhenhua](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-1.jpg)
Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue Zhen Lu, VMware Zhenhua Li, Jian Yang, Tianyin Xu, Ennan Zhai, Yao Liu, Christo Wilson, Tsinghua University / Tsinghua University UCSD Yale University Binghamton University Northeastern University luzhen 02@gmail. com Dec. 15, 2017
![Outline 1 2 3 4 Background Feasibility Study Scholar Cloud System Performance 5 Summary Outline 1 2 3 4 Background Feasibility Study Scholar. Cloud System Performance 5 Summary](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-2.jpg)
Outline 1 2 3 4 Background Feasibility Study Scholar. Cloud System Performance 5 Summary
![Internet censorship across the world China Iran Russia Thailand q Political websites are Internet censorship across the world China, Iran, Russia, Thailand … q Political websites are](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-3.jpg)
Internet censorship across the world China, Iran, Russia, Thailand … q Political websites are blocked mostly. q Non-Political websites may be blocked incidentally!
![Troubles of scholars Find a topic Google Scholar search Read papers Google Troubles of scholars Find a topic -> Google Scholar search -> Read papers Google](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-4.jpg)
Troubles of scholars Find a topic -> Google Scholar search -> Read papers Google Scholar index includes roughly 160 million documents
![Troubles of scholars Find a topic Google Scholar search Read papers Chinese Troubles of scholars Find a topic -> Google Scholar search -> Read papers Chinese](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-5.jpg)
Troubles of scholars Find a topic -> Google Scholar search -> Read papers Chinese researchers CANNOT access it.
![Ways to bypass censorship All roads lead to Rome VPN Tor Shadowsocks Other Proxies Ways to bypass censorship All roads lead to Rome! VPN Tor Shadowsocks Other Proxies](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-6.jpg)
Ways to bypass censorship All roads lead to Rome! VPN Tor Shadowsocks Other Proxies
![Problems of circumvention system Difficult to use not available Expensive Illegal Unstable Why not Problems of circumvention system Difficult to use not available Expensive Illegal Unstable/ Why not](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-7.jpg)
Problems of circumvention system Difficult to use not available Expensive Illegal Unstable/ Why not build a system for
![2 Feasibility Study 8 2 Feasibility Study 8](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-8.jpg)
2 Feasibility Study 8
![Internet censorship in China Technical part Governmental part Get registered on MIIT website Internet censorship in China Technical part Governmental part Get registered on MIIT website ->](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-9.jpg)
Internet censorship in China Technical part Governmental part Get registered on MIIT website -> Provide public Internet service legally
![Mainstream Choice 371 faculty members and students from THU q VPN is the most Mainstream Choice 371 faculty members and students from THU q VPN is the most](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-10.jpg)
Mainstream Choice 371 faculty members and students from THU q VPN is the most popular way q Shadowsocks also plays an important role
![Comparison q VPN Stable Exposed to GFW DPI q open VPN Comparison q VPN √ Stable × Exposed to GFW (DPI) q open. VPN √](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-11.jpg)
Comparison q VPN √ Stable × Exposed to GFW (DPI) q open. VPN √ Secure × Bad Usability
![Comparison q Tor Exposed to GFW DPI Automatic Configuration q Shadowsocks Comparison q Tor × Exposed to GFW (DPI) √ Automatic Configuration q Shadowsocks √](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-12.jpg)
Comparison q Tor × Exposed to GFW (DPI) √ Automatic Configuration q Shadowsocks √ Easy to setup √ Traffic split
![3 Scholar Cloud System 13 3 Scholar. Cloud System 13](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-13.jpg)
3 Scholar. Cloud System 13
![Combine advantages together Stable Secure Autoconfig Traffic split Internet Censorship Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-14.jpg)
Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship
![Combine advantages together Stable Secure Autoconfig Traffic split Internet Censorship Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-15.jpg)
Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship http: //scholar. thucloud. com
![Combine advantages together Stable Secure Autoconfig Traffic split Internet Censorship Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-16.jpg)
Combine advantages together √ Stable √ Secure √ Auto-config √ Traffic split Internet Censorship Launched in Jan. 2016 2000+ users/ 700+ daily active users 2. 2 USD operation cost daily http: //scholar. thucloud. com
![Key points Splitproxy and autoconfig http pac scholar thucloud comdf 70 d 12 af Key points Split-proxy and auto-config http: //pac. scholar. thucloud. com/df 70 d 12 a-f](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-17.jpg)
Key points Split-proxy and auto-config http: //pac. scholar. thucloud. com/df 70 d 12 a-f 586 -11 e 5 -980 a-08002705856 d. pac Proxy Automatic Configuration file (PAC) Internet Censorship Web proxy
![Key points Splitproxy and autoconfig http pac scholar thucloud comdf 70 d 12 af Key points Split-proxy and auto-config http: //pac. scholar. thucloud. com/df 70 d 12 a-f](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-18.jpg)
Key points Split-proxy and auto-config http: //pac. scholar. thucloud. com/df 70 d 12 a-f 586 -11 e 5 -980 a-08002705856 d. pac Proxy Automatic Configuration file (PAC) Web proxy
![Key points Message blinding Public wellknown encryption schemes suffer from DPI Liang Wang CCS Key points Message blinding Public well-known encryption schemes suffer from DPI. (Liang Wang, CCS](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-19.jpg)
Key points Message blinding Public well-known encryption schemes suffer from DPI. (Liang Wang, CCS 2015) Internet Censorship
![Key points Service legalization ICP Reg 15063437 in China Internet Censorship Key points Service legalization ICP Reg. #15063437 in China Internet Censorship](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-20.jpg)
Key points Service legalization ICP Reg. #15063437 in China Internet Censorship
![4 Performance 21 4 Performance 21](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-21.jpg)
4 Performance 21
![Network experience 1 TCP Stream S S only 10 s timeout Main stream Firsttime Network experience 1 TCP Stream S. S. only. 10 s timeout. Main stream First-time*](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-22.jpg)
Network experience 1 TCP Stream S. S. only. 10 s timeout. Main stream First-time* access cost
![Network experience 2 Page load time u Worst firsttime latency 15 s Tor Network experience 2 Page load time u Worst first-time latency 15 s —— Tor](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-23.jpg)
Network experience 2 Page load time u Worst first-time latency 15 s —— Tor u Wost subsequent latency 4. 5 s —— S. S. First time access suffers great latency: DNS resolution / Web cache / Google record*
![Network experience 3 RoundTrip Time u Tor has the largest average RTT u Tor Network experience 3 Round-Trip Time u Tor has the largest average RTT u Tor](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-24.jpg)
Network experience 3 Round-Trip Time u Tor has the largest average RTT u Tor is also the most unstable one Shadowsocks shows the same average TTL but much larger max TTL* Authentication
![Network experience 4 Packet Lost Rate u Tor suffers from 4 4 PLR u Network experience 4 Packet Lost Rate u Tor suffers from 4. 4% PLR u](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-25.jpg)
Network experience 4 Packet Lost Rate u Tor suffers from 4. 4% PLR u Compared with normal website access (Amazon) 0. 2% S. S. is much worse than Scholar. Cloud again! DPI (Message Blinding)
![Client side overhead Network Traffic CPU Memory Differences are not remarkable while Scholar Cloud Client side overhead Network Traffic CPU Memory Differences are not remarkable, while Scholar. Cloud](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-26.jpg)
Client side overhead Network Traffic CPU Memory Differences are not remarkable, while Scholar. Cloud is no worse than the average.
![Scalability u Shadowsocks PLT sharply grows after 60 u Scholar Cloud acts well in Scalability u. Shadowsocks PLT sharply grows after 60 u. Scholar. Cloud acts well in](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-27.jpg)
Scalability u. Shadowsocks PLT sharply grows after 60 u. Scholar. Cloud acts well in large concurrency
![Summary p Legally accessing Google Scholar under extreme censorship p Design and deploy Scholar Summary p. Legally accessing Google Scholar under extreme censorship p. Design and deploy Scholar.](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-28.jpg)
Summary p. Legally accessing Google Scholar under extreme censorship p. Design and deploy Scholar. Cloud to provide web proxy service to thousands of users, with high performance, usability, robustness against censorship, and low overhead p. Measure and analyze five main circumvention system on network performance, client side overhead, robustness against censorship and scalability. We provide a new perspective to Internet censorship in China. We hope that our experiences will help the community better understand China’s Internet censorship ecosystem.
![The End Thank you The End Thank you!](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-29.jpg)
The End Thank you!
![System Architecture p Portal website system p Splitproxy system p User control system System Architecture p Portal website system p Split-proxy system p User control system](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-30.jpg)
System Architecture p Portal website system p Split-proxy system p User control system
![System Architecture System Architecture](https://slidetodoc.com/presentation_image_h/9979295ef4dcc23547861fd3118a8c0a/image-31.jpg)
System Architecture
Scholar
Google acadêmico (https //scholar.google.com.br/)
Ews shot
Gmailgmailgmailgmail
Hard core science
Scholar google
Google scholar
Scholar
Conflict of interest penelitian adalah
Scholar google
Googlen classroom
Googlr znalac
Google scholar
Google scholar
Google scholar
Google scholar tricks
Googlel calender
Google scholar hinari
/partnerdash google scholar
Google scholar
Google scholar
Google scholar
Google scholarly search engine
Pub uc
Scholar google profile search
Anurag acharya google
Google scholar
Google scholar
Google scholar
My learning essentials
Scholar google
Googlel translat