Towards an architecture for end-to-end-encrypted file synchronization systems

被引:1
|
作者
Hoffmann, Christian [1 ]
Brand, Christoph [1 ]
Heinzl, Steffen [1 ]
机构
[1] Univ Appl Sci Wurzburg, Sanderheinrichsleitenweg 20, D-97074 Wurzburg, Germany
关键词
D O I
10.1109/WETICE.2015.30
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Users often utilize Dropbox and similar services to store their data in a cloud. They protect their data through encryption services offered by the cloud provider. But how reasonable is such a protection? The cloud provider is usually able to (at least theoretically) read the encrypted data, since he is the one holding the encryption keys. And even if you trust a cloud provider, what happens if the cloud provider is acquired by another company? Do you also trust the acquiring company? Global surveillance has become a daily issue, outlined by disclosures of files from the United States National Security Agency (NSA). To keep one's data protected from unauthorized access, a user optimally needs to trust as few other parties as possible. We should aim for a future, in which users are able to protect their data without having to trust the cloud provider who stores their data. This can be achieved by using strong, auditable client-side encryption. This paper presents a first step towards this goal. Starting from a basic requirement-the principle of least privilege-requirements are derived that again result in an architecture to build end-to-end-encrypted file synchronization systems. The resulting architecture's practical applicability is shown by a concrete implementation.
引用
收藏
页码:170 / 175
页数:6
相关论文
共 50 条
  • [1] Threat models over space and time: A case study of end-to-end-encrypted messaging applications
    Das Chowdhury, Partha
    Sameen, Maria
    Blessing, Jenny
    Boucher, Nicholas
    Gardiner, Joseph
    Burrows, Tom
    Anderson, Ross
    Rashid, Awais
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2024,
  • [2] Functional Architecture of End-to-End Reconfigurable Systems
    Moessner, Klaus
    Luo, Jesse
    Mohyeldin, Eliman
    Grandblaise, David
    Kloeck, Clemens
    Martoyo, Ihan
    Sallent, Oriol
    Demestichas, P.
    Dimitrakopoulos, G.
    Tsagkaris, K.
    Olaziregi, N.
    [J]. 2006 IEEE 63RD VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 196 - +
  • [3] End-to-End Architecture for Adaptive Communication Systems
    Boufidis, Z.
    Alonistioti, N.
    Stamatelatos, M.
    Vogler, J.
    Luecking, U.
    Kloeck, C.
    Grandblaise, D.
    Bourse, D.
    [J]. 2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 3027 - +
  • [4] Traceback for End-to-End Encrypted Messaging
    Tyagi, Nirvan
    Miers, Ian
    Ristenpart, Thomas
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
  • [5] End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Haller, Miro
    Paterson, Kenny
    [J]. IEEE SECURITY & PRIVACY, 2024, 22 (02) : 69 - 74
  • [6] End-to-end Flow Inference of Encrypted MANET
    Chang, Huijun
    Shan, Hong
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 1104 - 1109
  • [7] End-to-end Learning for Encrypted Image Retrieval
    Feng, Qihua
    Li, Peiya
    Lu, ZhiXun
    Liu, Guan
    Huang, Feiran
    [J]. 2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1839 - 1845
  • [8] End-to-End Encrypted Messaging Protocols: An Overview
    Ermoshina, Ksenia
    Musiani, Francesca
    Halpin, Harry
    [J]. INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
  • [9] DeepHash: An End-to-End Learning Approach for Metadata Management in Distributed File Systems
    Gao, Yuanning
    Gao, Xiaofeng
    Chen, Guihai
    [J]. PROCEEDINGS OF THE 48TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP 2019), 2019,
  • [10] Towards General Purpose Vision Systems: An End-to-End Task-Agnostic Vision-Language Architecture
    Gupta, Tanmay
    Kamath, Amita
    Kembhavi, Aniruddha
    Hoiem, Derek
    [J]. 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 16378 - 16388