ABSTRACT
Cloud based storage accounts like web email are compromised on a daily basis. At the same time, billions of Internet users store private information in these accounts. As the Internet matures and these accounts accrue more information, these accounts become a single point of failure for both users' online identities and large amounts of their private information. This paper presents two contributions: the first, the heterogeneous documents abstraction, is a data-centric strategy for protecting high value information stored in globally accessible storage. Secondly, we present drano, an implementation of the heterogeneous documents strategy as a cloud-based email protection system. drano gives users the opportunity to remove or "lock up" sensitive, unexpected, and rarely used information to mitigate the risks of cloud storage accounts without sacrificing the benefits of cloud storage or computation. We show that drano can efficiently assist users in pinpointing and protecting passwords emailed to them in cleartext. We present performance measurements showing that the system can rewrite past emails stored at cloud providers quickly, along with initial results regarding user preferences for redacted cloud storage.
- J. Bonneau, M. Just, and G. Matthews. What's in a name? evaluating statistical attacks on personal knowledge questions. In Proceedings of the 17th International Conference on Financial Cryptography and Data Security, 2010. Google ScholarDigital Library
- A. Coviello. Open letter to rsa customers. http://www.sec.gov/Archives/edgar/data/790070/000119312511070159/dex991.htm, 2011.Google Scholar
- P. Crosman. New breed of banking malware hijacks text messages. http://www.americanbanker.com/issues/178_111/new-breed-of-banking-malware-hijacks-text-messages-1059745--1.html, 2013.Google Scholar
- M. Czerwinski, D. Gage, J. Gemmell, C. Marshall, M. Pérez-Quinones, M. Skeels, and T. Catarci. Digital memories in an era of ubiquitous computing and abundant storage. Communications of the ACM, 49 (1), 2006. Google ScholarDigital Library
- R. Geambasu, T. Kohno, A. Levy, and H. Levy. Vanish: Increasing data privacy with self-destructing data. In Proc. of the 18th USENIX Security Symposium, 2009. Google ScholarDigital Library
- R. Geambasu, J. John, S. Gribble, T. Kohno, and H. Levy. Keypad: an auditing file system for theft-prone devices. In Proceedings of the sixth conference on Computer systems, 2011. Google ScholarDigital Library
- K. Gondi, P. Bisht, P. Venkatachari, A. Sistla, and V. Venkatakrishnan. Swipe: eager erasure of sensitive data in large scale systems software. In Proceedings of the second ACM conference on Data and Application Security and Privacy, 2012. Google ScholarDigital Library
- I. Ion, N. Sachdeva, P. Kumaraguru, and S.Capkun. Home is safer than the cloud!: privacy concerns for consumer cloud storage. In Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011. Google ScholarDigital Library
- W. Jones. Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management. Morgan Kaufmann, 2007. Google ScholarDigital Library
- M. Just and D. Aspinall. Personal choice and challenge questions: a security and usability assessment. In Proceedings of the 5th Symposium on Usable Privacy and Security, page 8. ACM, 2009. Google ScholarDigital Library
- C. Kanich, C. Kreibich, K. Levchenko, B. Enright, V. Paxson, G. M. Voelker, and S. Savage. Spamalytics: an Empirical Analysis of Spam Marketing Conversion. In Proceedings of the ACM Conference on Computer and Communications Security, 2008. Google ScholarDigital Library
- K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In phProceedings of the IEEE Symposium and Security and Privacy, 2011. Google ScholarDigital Library
- B. Parno, J. M. McCune, D. Wendlandt, D. G. Andersen, and A. Perrig. Clamp: Practical prevention of large-scale data leaks. In Proceedings of the 30th IEEE Symposium on Security and Privacy, 2009. Google ScholarDigital Library
- A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. M. Voelker, V. Paxson, N. Weaver, and S. Savage. Botnet Judo: Fighting Spam with Itself. In Proceedings of the Network and Diestributed System Security Symposium (NDSS), 2010.Google Scholar
- A. Rabkin. Personal knowledge questions for fallback authentication: security questions in the era of facebook. In Proceedings of the 4th Symposium on Usable Privacy and Security, 2008. Google ScholarDigital Library
- P. Resnick. Internet Message Format, 2001. RFC 2822. Google ScholarDigital Library
- S. Schechter and R. Reeder. 1+1 = you: Measuring the comprehensibility of metaphors for configuring backup authentication. In phProceedings of the 5th Symposium on Usable Privacy and Security. ACM, 2009. Google ScholarDigital Library
- S. Schechter, A. Brush, and S. Egelman. It's no secret. measuring the security and reliability of authentication via "secret" questions. In Proceedings of the 2009 IEEE Symposium on Security and Privacy, 2009. Google ScholarDigital Library
- I. Tabachnik and O. van Kloeten. Plain text offenders. http://plaintextoffenders.com/, 2013.Google Scholar
- Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambasu, and N. Sarda. Cleanos: Limiting mobile data exposure with idle eviction. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012. Google ScholarDigital Library
- N. Vachharajani, M. Bridges, J. Chang, R. Rangan, G. Ottoni, J. Blome, G. Reis, M. Vachharajani, and D. August. Rifle: An architectural framework for user-centric information-flow security. In Proceedings of the IEEE/ACM International Symposium on Microarchitecture, 2004. Google ScholarDigital Library
- Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. Leon, and L. Cranor. I regretted the minute I pressed share: A qualitative study of regrets on facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011. Google ScholarDigital Library
- S. Whittaker, V. Bellotti, and J. Gwizdka. Email in personal information management. Communications of the ACM, 49 (1), 2006. Google ScholarDigital Library
- A. Yumerefendi, B. Mickle, and L. Cox. Tightlip: Keeping applications from spilling the beans. In Proceedings of the 4th USENIX Symposium on Networked Systems Design and Implementation, 2007. Google ScholarDigital Library
Index Terms
- CloudSweeper: enabling data-centric document management for secure cloud archives
Recommendations
CloudFilter: practical control of sensitive data propagation to the cloud
CCSW '12: Proceedings of the 2012 ACM Workshop on Cloud computing security workshopA major obstacle for the adoption of cloud services in enterprises is the potential loss of control over sensitive data. Companies often have to safeguard a subset of their data because it is crucial to their business or they are required to do so by ...
MyCassandra: a cloud storage supporting both read heavy and write heavy workloads
SYSTOR '12: Proceedings of the 5th Annual International Systems and Storage ConferenceA cloud storage with persistence shows solid performance only with a read heavy or write heavy workload. There is a trade-off between the read-optimized and write-optimized design of a cloud storage. This is dominated by its storage engine, which is a ...
Middleware enabled data sharing on cloud storage services
MW4SOC '10: Proceedings of the 5th International Workshop on Middleware for Service Oriented ComputingWith the emergence of public cloud storage platforms like Amazon, Microsoft and Google etc, individual applications and some enterprise storage are being increasingly deployed on Clouds. However, dynamic data sharing in public clouds face problems of ...
Comments