Towards an architecture for end-to-end-encrypted file synchronization systems

被引:1
|
作者
Hoffmann, Christian [1 ]
Brand, Christoph [1 ]
Heinzl, Steffen [1 ]
机构
[1] Univ Appl Sci Wurzburg, Sanderheinrichsleitenweg 20, D-97074 Wurzburg, Germany
关键词
D O I
10.1109/WETICE.2015.30
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Users often utilize Dropbox and similar services to store their data in a cloud. They protect their data through encryption services offered by the cloud provider. But how reasonable is such a protection? The cloud provider is usually able to (at least theoretically) read the encrypted data, since he is the one holding the encryption keys. And even if you trust a cloud provider, what happens if the cloud provider is acquired by another company? Do you also trust the acquiring company? Global surveillance has become a daily issue, outlined by disclosures of files from the United States National Security Agency (NSA). To keep one's data protected from unauthorized access, a user optimally needs to trust as few other parties as possible. We should aim for a future, in which users are able to protect their data without having to trust the cloud provider who stores their data. This can be achieved by using strong, auditable client-side encryption. This paper presents a first step towards this goal. Starting from a basic requirement-the principle of least privilege-requirements are derived that again result in an architecture to build end-to-end-encrypted file synchronization systems. The resulting architecture's practical applicability is shown by a concrete implementation.
引用
收藏
页码:170 / 175
页数:6
相关论文
共 50 条
  • [31] "End to End" Towards a Framework for Reducing Biases and Promoting Transparency of Algorithmic Systems
    Tal, Avital Shulner
    Batsuren, Khuyagbaatar
    Bogina, Veronika
    Giunchiglia, Fausto
    Hartman, Alan
    Loizou, Styliani Kleanthous
    Kuflik, Tsvi
    Otterbacher, Jahna
    [J]. 2019 14TH INTERNATIONAL WORKSHOP ON SEMANTIC AND SOCIAL MEDIA ADAPTATION AND PERSONALIZATION (SMAP), 2019, : 54 - 59
  • [32] Towards improved end-to-end system efficiency of photon pair systems
    Ling, Alexander
    Fan, Jingyun
    Migdall, Alan
    [J]. QUANTUM COMMUNICATIONS AND QUANTUM IMAGING VIII, 2010, 7815
  • [33] Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things
    Gendreau, Audrey A.
    Moorman, Michael
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, : 84 - 90
  • [34] End-to-end Encrypted Scalable Abstract Data Types over ICN
    Tschudin, Christian
    [J]. PROCEEDINGS OF THE 5TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN'18), 2018, : 88 - 94
  • [35] End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness
    Dodis, Yevgeniy
    Jost, Daniel
    Kesavan, Balachandar
    Marcedone, Antonio
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT V, 2023, 14008 : 157 - 189
  • [36] A Proposal of QUIC-based CYPHONIC for Encrypted End-to-End Communications
    Horisaki, Shota
    Matama, Kazushige
    Naito, Katsuhiro
    Suzuki, Hidekazu
    [J]. 2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING, CANDAR, 2022, : 27 - 35
  • [37] Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy
    Wei, Jianghong
    Chen, Xiaofeng
    Wang, Jianfeng
    Hu, Xuexian
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2318 - 2332
  • [38] Towards Contextual Spelling Correction for Customization of End-to-End Speech Recognition Systems
    Wang, Xiaoqiang
    Liu, Yanqing
    Li, Jinyu
    Miljanic, Veljko
    Zhao, Sheng
    Khalil, Hosam
    [J]. IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2022, 30 : 3089 - 3097
  • [39] Towards Deterministic End-to-end Latency for Medical AI Systems in NVIDIA Holoscan
    Sinha, Soham
    Dwivedi, Shekhar
    Azizian, Mandi
    [J]. PROCEEDINGS 15TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, ICCPS 2024, 2024, : 235 - 246
  • [40] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366