skip to main content
10.1145/2517488.2517495acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

CloudSweeper: enabling data-centric document management for secure cloud archives

Published:08 November 2013Publication History

ABSTRACT

Cloud based storage accounts like web email are compromised on a daily basis. At the same time, billions of Internet users store private information in these accounts. As the Internet matures and these accounts accrue more information, these accounts become a single point of failure for both users' online identities and large amounts of their private information. This paper presents two contributions: the first, the heterogeneous documents abstraction, is a data-centric strategy for protecting high value information stored in globally accessible storage. Secondly, we present drano, an implementation of the heterogeneous documents strategy as a cloud-based email protection system. drano gives users the opportunity to remove or "lock up" sensitive, unexpected, and rarely used information to mitigate the risks of cloud storage accounts without sacrificing the benefits of cloud storage or computation. We show that drano can efficiently assist users in pinpointing and protecting passwords emailed to them in cleartext. We present performance measurements showing that the system can rewrite past emails stored at cloud providers quickly, along with initial results regarding user preferences for redacted cloud storage.

References

  1. J. Bonneau, M. Just, and G. Matthews. What's in a name? evaluating statistical attacks on personal knowledge questions. In Proceedings of the 17th International Conference on Financial Cryptography and Data Security, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Coviello. Open letter to rsa customers. http://www.sec.gov/Archives/edgar/data/790070/000119312511070159/dex991.htm, 2011.Google ScholarGoogle Scholar
  3. P. Crosman. New breed of banking malware hijacks text messages. http://www.americanbanker.com/issues/178_111/new-breed-of-banking-malware-hijacks-text-messages-1059745--1.html, 2013.Google ScholarGoogle Scholar
  4. M. Czerwinski, D. Gage, J. Gemmell, C. Marshall, M. Pérez-Quinones, M. Skeels, and T. Catarci. Digital memories in an era of ubiquitous computing and abundant storage. Communications of the ACM, 49 (1), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Geambasu, T. Kohno, A. Levy, and H. Levy. Vanish: Increasing data privacy with self-destructing data. In Proc. of the 18th USENIX Security Symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Geambasu, J. John, S. Gribble, T. Kohno, and H. Levy. Keypad: an auditing file system for theft-prone devices. In Proceedings of the sixth conference on Computer systems, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. Gondi, P. Bisht, P. Venkatachari, A. Sistla, and V. Venkatakrishnan. Swipe: eager erasure of sensitive data in large scale systems software. In Proceedings of the second ACM conference on Data and Application Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. I. Ion, N. Sachdeva, P. Kumaraguru, and S.Capkun. Home is safer than the cloud!: privacy concerns for consumer cloud storage. In Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. W. Jones. Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management. Morgan Kaufmann, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Just and D. Aspinall. Personal choice and challenge questions: a security and usability assessment. In Proceedings of the 5th Symposium on Usable Privacy and Security, page 8. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Kanich, C. Kreibich, K. Levchenko, B. Enright, V. Paxson, G. M. Voelker, and S. Savage. Spamalytics: an Empirical Analysis of Spam Marketing Conversion. In Proceedings of the ACM Conference on Computer and Communications Security, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In phProceedings of the IEEE Symposium and Security and Privacy, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Parno, J. M. McCune, D. Wendlandt, D. G. Andersen, and A. Perrig. Clamp: Practical prevention of large-scale data leaks. In Proceedings of the 30th IEEE Symposium on Security and Privacy, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. M. Voelker, V. Paxson, N. Weaver, and S. Savage. Botnet Judo: Fighting Spam with Itself. In Proceedings of the Network and Diestributed System Security Symposium (NDSS), 2010.Google ScholarGoogle Scholar
  15. A. Rabkin. Personal knowledge questions for fallback authentication: security questions in the era of facebook. In Proceedings of the 4th Symposium on Usable Privacy and Security, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Resnick. Internet Message Format, 2001. RFC 2822. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Schechter and R. Reeder. 1+1 = you: Measuring the comprehensibility of metaphors for configuring backup authentication. In phProceedings of the 5th Symposium on Usable Privacy and Security. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Schechter, A. Brush, and S. Egelman. It's no secret. measuring the security and reliability of authentication via "secret" questions. In Proceedings of the 2009 IEEE Symposium on Security and Privacy, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. I. Tabachnik and O. van Kloeten. Plain text offenders. http://plaintextoffenders.com/, 2013.Google ScholarGoogle Scholar
  20. Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambasu, and N. Sarda. Cleanos: Limiting mobile data exposure with idle eviction. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. N. Vachharajani, M. Bridges, J. Chang, R. Rangan, G. Ottoni, J. Blome, G. Reis, M. Vachharajani, and D. August. Rifle: An architectural framework for user-centric information-flow security. In Proceedings of the IEEE/ACM International Symposium on Microarchitecture, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. Leon, and L. Cranor. I regretted the minute I pressed share: A qualitative study of regrets on facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Whittaker, V. Bellotti, and J. Gwizdka. Email in personal information management. Communications of the ACM, 49 (1), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Yumerefendi, B. Mickle, and L. Cox. Tightlip: Keeping applications from spilling the beans. In Proceedings of the 4th USENIX Symposium on Networked Systems Design and Implementation, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. CloudSweeper: enabling data-centric document management for secure cloud archives

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCSW '13: Proceedings of the 2013 ACM workshop on Cloud computing security workshop
        November 2013
        132 pages
        ISBN:9781450324908
        DOI:10.1145/2517488

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 November 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCSW '13 Paper Acceptance Rate11of28submissions,39%Overall Acceptance Rate37of108submissions,34%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader