Abstract
This paper presents Encrypted Cloud (EnCloud), a system designed for providing end-to-end encryption between cloud applications to facilitate their operation and enable users trust in providers. EnCloud relieves end-users’ privacy concerns about the data stored in cloud services so that the private data are securely stored on the cloud server in an encrypted form while the data owner’s EnCloud applications are only allowed to decrypt the encrypted data. To show the feasibility of EnCloud, we implemented a prototype for Dropbox. The experimental results of the prototype demonstrate that the additional time delay incurred by EnCloud operations is acceptable (within 11.5% of the total execution-time).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ball, J., Borger, J., Greenwald, G.: Revealed: How US and UK spy agencies defeat internet privacy and security (2013)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. of Computing 32(3), 586–615 (2003); extended abstract in Crypto 2001
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer-Verlag New York, Inc. (2002)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium (2004)
Fujitsu Research Institute: Personal data in the cloud: A global survey of customer attitudes (2010)
Gellman, B., Poitras, L.: U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program (2013)
Ion, I., Sachdeva, N., Kumaraguru, P., Čapkun, S.: Home is safer than the cloud!: Privacy concerns for consumer cloud storage. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, pp. 13:1–13:20. ACM (2011)
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp. 136–149 (2010)
Khan, S., Hamlen, K.: Anonymouscloud: A data ownership privacy provider framework in cloud computing. In: Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 170–176 (2012)
Kincaid, J.: Dropbox security bug made passwords optional for four hours (2012)
Mearian, L.: No, your data isn’t secure in the cloud (2013)
Mell, P., Grance, T.: The NIST definition of cloud computing (2011), http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
Slamanig, D.: More privacy for cloud users: Privacy-preserving resource usage in the cloud. In: 4th Hot Topics in Privacy Enhancing Technologies, HotPETs (2011)
Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Security and Privacy 8(6), 24–31 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Song, Y., Kim, H., Mohaisen, A. (2014). A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2014. Lecture Notes in Computer Science, vol 8647. Springer, Cham. https://doi.org/10.1007/978-3-319-09770-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-09770-1_7
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09769-5
Online ISBN: 978-3-319-09770-1
eBook Packages: Computer ScienceComputer Science (R0)