Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment

被引:3
|
作者
da Rocha, Marciano [1 ]
Gomes Valadares, Dalton Cezane [2 ]
Perkusich, Angelo [3 ]
Gorgonio, Kyller Costa [4 ]
Pagno, Rodrigo Tomaz [1 ]
Will, Newton Carlos [1 ]
机构
[1] Fed Univ Technol, Dept Comp Sci, Dois Vizinhos, Parana, Brazil
[2] Fed Inst Pernambuco, Dept Mech Engn, Caruaru, Brazil
[3] Univ Fed Campina Grande, Dept Elect Engn, Campina Grande, Paraiba, Brazil
[4] Univ Fed Campina Grande, Dept Comp Sci, Campina Grande, Paraiba, Brazil
关键词
Intel SGX; Data Sealing; File Encryption; Confidentiality; Integrity; Secure Storage; Cloud Storage;
D O I
10.5220/0009130600310043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users. Currently, with devices always connected to the Internet, the use of cloud data storage services has become practical and common, allowing quick access to such data wherever the user is. Such practicality brings with it a concern, precisely the confidentiality of the data which is delivered to third parties for storage. In the home environment, disk encryption tools have gained special attention from users, being used on personal computers and also having native options in some smartphone operating systems. The present work uses the data sealing, feature provided by the Intel Software Guard Extensions (Intel SGX) technology, for file encryption. A virtual file system is created in which applications can store their data, keeping the security guarantees provided by the Intel SGX technology, before send the data to a storage provider. This way, even if the storage provider is compromised, the data are safe. To validate the proposal, the Cryptomator software, which is a free client-side encryption tool for cloud files, was integrated with an Intel SGX application (enclave) for data sealing. The results demonstrate that the solution is feasible, in terms of performance and security, and can be expanded and refined for practical use and integration with cloud synchronization services.
引用
收藏
页码:31 / 43
页数:13
相关论文
共 50 条
  • [21] A Secure Client-Side Deduplication Scheme Based on Updatable Server-Aided Encryption
    Ha, Guanxiong
    Jia, Chunfu
    Chen, Yuchen
    Chen, Hang
    Li, Mingyue
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3672 - 3684
  • [22] Low-cost client-side encryption and secure Internet of things(IoT) provisioning
    Joseph MAMVONG
    Gokop GOTENG
    Yue GAO
    [J]. Frontiers of Computer Science, 2022, 16 (06) : 189 - 191
  • [23] A Secure Client-Side Framework for Protecting the Privacy of Health Data Stored on the Cloud
    Sakr, Ali
    Yaacoub, Elias
    Noura, Hassan
    Al-Husseini, Mohammed
    Abualsaud, Khalid
    Khattab, Tamer
    Guizani, Mohsen
    [J]. 2018 IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), 2018, : 13 - 18
  • [24] NEXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-side SGX
    Djoko, Judicael B.
    Lange, Jack
    Lee, Adam J.
    [J]. 2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 401 - 413
  • [25] Low-cost client-side encryption and secure Internet of things (IoT) provisioning
    Mamvong, Joseph
    Goteng, Gokop
    Gao, Yue
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (06)
  • [26] Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds
    Lei, Lei
    Cai, Quanwei
    Chen, Bo
    Lin, Jingqiang
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 71 - 84
  • [27] Counteracting Side Channels in Cross-User Client-Side Deduplicated Cloud Storage
    Yu, Chia-Mu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (17) : 15604 - 15616
  • [28] Secure web forms with client-side signatures
    Honkala, M
    Vuorimaa, P
    [J]. WEB ENGINEERING, PROCEEDINGS, 2005, 3579 : 340 - 351
  • [29] Client-side access control enforcement using trusted computing and PEI models
    Sandhu, Ravi
    Zhang, Xinwen
    Ranganathan, Kumar
    Covington, Michael J.
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2006, 15 (03) : 229 - 245
  • [30] Cloud Key Management using Trusted Execution Environment
    Bouamama, Jaouhara
    Hedabou, Mustapha
    Erradi, Mohammed
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 560 - 567