skip to main content
10.1145/2181196.2181197acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

SecureSafe: a highly secure online data safe industrial use case

Published: 10 April 2012 Publication History

Abstract

In this paper, we present the core security architecture of SecureSafe, a cloud service that provides a highly secure online storage for sensitive data. The architecture combines best practices in cryptography and security protocols with novel approaches to offer high security while providing good usability and performance. More than two years of successful operation with many satisfied customers and no security incidents demonstrate the soundness of the architecture. In addition to granting insight into the security architecture of a field-proven service to provide inputs for other services that have similar requirements, there's another motivation for this paper: We believe that to increase trust in cloud services, service providers should be more open about internal security details -- although this is in contrast to what typical cloud service providers do today.

References

[1]
T. Wu. The SRP Authentication and Key Exchange System. RFC 2945, September 2000.
[2]
B. Kaliski. PKCS #5: Password-Based Cryptography Specification Version 2.0. RFC 2898, September 2000.
[3]
Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networking. In Proceedings of the 7th International Workshop on Security Protocols, Springer-Verlag Lecture Notes in Computer Science No. 1796, April 2000.
[4]
Frank Stajano. The Resurrecting Duckling -- What Next? In Proceedings of the 8th International Workshop on Security Protocols, Springer-Verlag Lecture Notes in Computer Science No. 2133, April 2000.

Index Terms

  1. SecureSafe: a highly secure online data safe industrial use case

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        MPM '12: Proceedings of the First Workshop on Measurement, Privacy, and Mobility
        April 2012
        55 pages
        ISBN:9781450311632
        DOI:10.1145/2181196
        • Program Chairs:
        • Hamed Haddadi,
        • Eiko Yoneki
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 10 April 2012

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. DoubleSec
        2. cloud security
        3. security architecture

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        EuroSys '12
        Sponsor:
        EuroSys '12: Seventh EuroSys Conference 2012
        April 10, 2012
        Bern, Switzerland

        Acceptance Rates

        Overall Acceptance Rate 6 of 20 submissions, 30%

        Upcoming Conference

        EuroSys '25
        Twentieth European Conference on Computer Systems
        March 30 - April 3, 2025
        Rotterdam , Netherlands

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 288
          Total Downloads
        • Downloads (Last 12 months)1
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 01 Mar 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media