Towards an architecture for end-to-end-encrypted file synchronization systems

被引:1
|
作者
Hoffmann, Christian [1 ]
Brand, Christoph [1 ]
Heinzl, Steffen [1 ]
机构
[1] Univ Appl Sci Wurzburg, Sanderheinrichsleitenweg 20, D-97074 Wurzburg, Germany
关键词
D O I
10.1109/WETICE.2015.30
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Users often utilize Dropbox and similar services to store their data in a cloud. They protect their data through encryption services offered by the cloud provider. But how reasonable is such a protection? The cloud provider is usually able to (at least theoretically) read the encrypted data, since he is the one holding the encryption keys. And even if you trust a cloud provider, what happens if the cloud provider is acquired by another company? Do you also trust the acquiring company? Global surveillance has become a daily issue, outlined by disclosures of files from the United States National Security Agency (NSA). To keep one's data protected from unauthorized access, a user optimally needs to trust as few other parties as possible. We should aim for a future, in which users are able to protect their data without having to trust the cloud provider who stores their data. This can be achieved by using strong, auditable client-side encryption. This paper presents a first step towards this goal. Starting from a basic requirement-the principle of least privilege-requirements are derived that again result in an architecture to build end-to-end-encrypted file synchronization systems. The resulting architecture's practical applicability is shown by a concrete implementation.
引用
收藏
页码:170 / 175
页数:6
相关论文
共 50 条
  • [41] An end-to-end QoS management architecture
    Shankar, M
    De Miguel, M
    Liu, JWS
    [J]. PROCEEDINGS OF THE FIFTH IEEE REAL-TIME TECHNOLOGY AND APPLICATIONS SYMPOSIUM, 1999, : 176 - 189
  • [42] A scalable end-to-end QoS architecture
    Hoang, Doan B.
    Phan, H. T.
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 677 - 682
  • [43] An end to end robotics architecture for planetary exploration
    Reedman, T
    Dupuis, E
    Béland, S
    Dunlop, J
    [J]. PROCEEDINGS OF THE 11TH CONFERENCE ON ASTRONAUTICS: OPPORTUNITIES AND CHALLENGES FOR SPACE APPLICATIONS AND TECHNOLOGY, 2000, : 169 - 175
  • [44] End of file -: Can content do that?
    Bates, ME
    [J]. ECONTENT, 2001, 24 (02) : 72 - 72
  • [45] End of file - You call that "research"?
    Bates, ME
    [J]. ECONTENT, 2001, 24 (04) : 64 - 64
  • [46] Do encrypted disks spell the end of forensics?
    Forte, Dario
    [J]. Computer Fraud and Security, 2009, 2009 (02): : 18 - 20
  • [47] The end of end-to-end: Preserving the architecture of the Internet in the broadband era
    Lemley, MA
    Lessig, L
    [J]. UCLA LAW REVIEW, 2001, 48 (04) : 925 - 972
  • [48] END-TO-END SYNCHRONIZATION IN PACKET-SWITCHED NETWORKS
    ALMEIDA, N
    CABRAL, J
    ALVES, A
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 614 : 84 - 93
  • [49] End-to-end synchronization control support for multiservice applications
    Chen, XB
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, 1996, : 382 - 385
  • [50] Towards scalable event tracing for high end systems
    Mohror, Kathryn
    Karavanic, Karen L.
    [J]. HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, 4782 : 695 - 706