securing cloud under key exposure


Backup Data Locally.
Avoid Storing Sensitive Information.
Use Cloud Services that Encrypt Data.
Encrypt Your Data.
Install Anti-virus Software.
Make Passwords Stronger.
Test the Security Measures in Place.

securing cloud under key exposure -IEEE
free download

The world just witnessed the surge of a new and powerful attacker, which was able to coerce operators and acquire the necessary keys to break the privacy of users. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the adversary’s access to the ciphertext. This may be achieved, for example, using multi-cloud storage systems. These systems spread data across multiple servers in different administrative domains, to cater for availability and fault tolerance. If the adversary can only compromise a subset of these domains, multi-cloud storage systems may prevent the adversary from accessing the entire ciphertext. However, if data is encrypted using existing encryption schemes, spreading the ciphertext on multiple servers does not entirely solve the problem since an adversary which has the encryption key, can still compromise single servers and decrypt the ciphertext stored therein. In this paper, we leverage multi-cloud storage systems to provide data confidentiality against an adversary which has access to the encryption key, and can compromise a large fraction of the storage servers. For this purpose, we first introduce a novel security definition that captures data confidentiality in the new adversarial model. We then propose Bastion, a primitive that is secure according to our definition and, therefore, guarantees data confidentiality even when the encryption key is exposed, as long as the adversary cannot compromise all storage servers. We analyze the security of Bastion, and we evaluate its performance by means of a prototype implementation. Our results show that Bastion incurs less than 5% overhead compared to existing semantically secure encryption modes. We also discuss practical insights with respect to the integration of Bastion in commercial multi-cloud storage systems.

Securing cloud data under key exposure
free download

Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys , by means of coercion or backdoors in cryptographic software. Once the encryption key is exposed , the only viable measure to preserve data confidentiality is to limit

A Survey of: Securing Cloud Data under Key Exposure
free download

Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys , by means of coercion or backdoors in cryptographic software. Once the encryption key is exposed , the only viable measure to preserve data confidentiality is to limit

Enabling cloud storage auditing with verifiable outsourcing of key updates
free download

proposed a public cloud auditing protocol for securing big data All above auditing protocols are all built on the assumption that the secret key of the client is absolutely secure and would not 1364 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , VOL

Securing Cloud Data under Key Exposure
free download

Social networks area unit a form of social group structure that consists of multiple nodes and therefore the relationships among them. Through these relationships, social networks connect all types of participants, from casual speaking acquaintances to closely related

Securing Cloud Data under Key Exposure
free download

Social networks area unit a form of social group structure that consists of multiple nodes and therefore the relationships among them. Through these relationships, social networks connect all types of participants, from casual speaking acquaintances to closely related

What is cloud computing
free download

SecuringCloud Data underKey Exposure

Securing Cloud Data in the New Attacker Model.
free download

Page 1. SecuringCloud Data in the New Attacker Model In this section, we present an efficient (n − 2)ke secure encryption scheme, called Bastion On input a security parameter k, the key generation algorithm of Bastion outputs a key K ∈ {0, 1}k for the underlying block-cipher

Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure
free download

The secure fragmentation and dispersal scheme separates con- secutive blocks of a ciphertext, as well as consecutive bits of cipher Conference On Trust, Security And Privacy In Computing And CommunicationsSecuringCloud Data underKeyExposure

Securing Cloud Information Under Key Presentation
free download

The enemy can secure the key either by misusing flaws or indirect accesses in the key -age of our insight, this is the first work that tends to the issue of securing information put Incline plans constitute an exchange off between the security certifications of mystery sharing and the

Implementing a Secure Data Storage on the Cloud under Key Exposure State
free download

Now a days cloud computing has become one of the fascinating domain which was accessed by almost all users in order to store, retrieve and access the data from remote systems rather than from the local machines. We propose a novel and efficient scheme that However, it still needs a secure channel between the KGC and all non-revoked data Section we present our concrete construction of RABE and its application in IoT cloud We describe the security model called indistinguishable against chosen plaintext attack (IND-CPA) for

Schemes for Securing Cloud Data when the Cryptographic Material is Exposed : A Review
free download

Shucheng Yu, Cong Wang, Kui Ren and Wenjing Lou, Achieving Secure , Scalable, and Fine-grained Data Access Anup Mathew, Survey Paper on Security Privacy Issues in Cloud Y. Chen and R. Sion, On Securing untrusted clouds with cryptography, In

A Novel Approach for Data Confidentiality Under Key Exposure in Clouds
free download

and only incurs a negligible overhead when compared to existing semantically secure encryption modes our knowledge, this is the first work that addresses the problem of securing data stored than the one, however the proposal does not provide any security guarantees when

A Key -insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment.
free download

which is properly protected by key -insulation mechanism, the data stored on the cloud server is can get SKi− SKi and SKi.) We argue that our scheme has securekey update, since proven hard in the generic group by Dodis and Yampolskiy ). Moreover, the security of our Securingcloud data underkeyexposure techniques that can be used to monitor patients efficiently and enhance the security of m In cloud -assisted m-healthcare social networks, since the mobile patients behave as the It is also assumed that there exists a secure communication channel established among data sinks

Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
free download

incident, a Department of Veterans Affairs database containing sensitive PHI of 26.5 million military veterans, including their social security numbers and 1. We propose a novel ABE-based framework for patient-centric secure sharing of PHRs in cloud computing environments

Toward publicly auditable secure cloud data storage services
free download

and cryptographically desirable properties that should apply to practical deployment for securing the cloud a network architecture for effectively describing, developing, and evaluating secure data storage We believe security in cloud computing, an area full of challenges and of all of which focused on the problem of cloud auditing under However, as mentioned previously, these solutions only provide forward securityand do not consider the

A Survey on Confidential Cloud Data under Secure Key Exposure
free download

Latest records display an effective attacker which breaks facts confidentiality with the resource of obtaining cryptographic keys , by using the usage of a way of coercion or backdoors in cryptographic software program. As soon as the encryption secrets uncovered


COMMENT computer-science, security, technology



FREE IEEE PAPER