skip to main content
10.1145/3056662.3056705acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicscaConference Proceedingsconference-collections
research-article

TrustDocs: Google Docs add-on securing document in untrusted cloud-based environment

Published: 26 February 2017 Publication History

Abstract

SaaS applications such as Google Documents have been increasingly widely-used to handle user documents stored in cloud storage. To ensure secured access in untrustworthy cloud environment, all documents in cloud storage must be encrypted and protected from unauthorized stakeholders. There are several automated solutions available. However, most solutions are straight-forward encryption without providing the protection from the system administrators of the cloud storage providers. In this paper, we propose TrustDocs, a new client side cryptography Google Docs Add-on application. Our proposed solution ciphers and deciphers user documents in Google Drive. Using multiple cloud service providers and key-distribution-like methodology, our proposed solution provide secured mechanism for protecting the risk of user data even from brute-force attack by system administrators of the cloud storage providers. Our method supports both real-time standalone and version control collaborative edition for ensuring the security, privacy and usability of user document and can protect user secret information in untrustworthy cloud-based environment.

References

[1]
D. Sheng, D. Kondo, and F. Cappello, October 2013, Characterizing cloud applications on a Google data center, IEEE 42nd International Conference on Parallel Processing. Lyon, pp. 468--473,
[2]
J. Kincaid, September 2010, Google confirms that it fired engineer for breaking internal privacy policies, Available:http://techcrunch.com/2010/09/14/google-engineer-spying-fired/Chu (last access June 21, 2016)
[3]
Google, Google terms of service, April 2014, https://www.google.com/intl/en/policies/terms
[4]
Bicakci, K., Yavuz, D. D., & Gurkan, S. (2016). TwinCloud: Secure Cloud Sharing Without Explicit Key Management. arXiv preprint arXiv:1606.04705.DOI= https://arxiv.org/abs/1606.04705
[5]
Bamrah,G. S., & Pandey, 2014 A. Analyzing the Security Schemes of Various Cloud Storage Services. http://ece.gmu.edu/coursewebpages/ECE/ECE646/F15/project/F15_Project_Resources/F14_Cloud_Storage_report.pdf
[6]
Best Free Encryption Utility for Cloud Storage http://www.techsupportalert.com/best-free-encryption-utility-for-cloud-stora
[7]
A. Ferdowsi, Yesterday's Authentication Bug,Dropbox Blog, June 2011, https://blogs.dropbox.com/dropbox/2011/06/yesterdays-authentication-bug/
[8]
Michalas, A., & Bakopoulos, M. (2012, December) SecGOD Google Docs: Now i feel safer!. In Internet Technology and Secured Transactions, 2012 International Conference for (pp. 589--595). IEEE.
[9]
Feldman, A. J., Zeller, W. P., Freedman, M. J., & Felten, E. W. (2010, October). SPORC: Group Collaboration using Untrusted Cloud Resources. In OSDI (Vol. 10, pp. 337--350).decisions. J. Syst. Softw. 79, 5 (May. 2006), 577590.
[10]
SafeGDocs, A secure way to work with Google Docs documents, http://www.safegdocs.com/
[11]
Boxcryptor - Chrome Web Store - Google, https://chrome.google.com/webstore/detail/boxcryptor/ijmndaodmdjamfepoijpolhjddgfgmme
[12]
Fogpad - Chrome Web Store - Google; https://chrome.google.com/webstore/detail/fogpad/akpccnipkpejnigppmpalammcodfbonj
[13]
TrustDocs - Google Docs add-on. https://chrome.google.com/webstore/detail/trustdocs/mghcpeobheaiohijlhbdgeeagbjhadok
[14]
Lerman, L., Markowitch, O., Nakahara Jr, J., & Samarati, P. P. (2012, July). Key Management as a Service. In SECRYPT (pp. 276--281).
[15]
Parvathi, S. S. L., & Reddy, B. S. Trust Your Cloud, 2014, Service Provider: User Based Crypto Model., Research and Applications, ISSN : 2248--9622, Vol. 4, Issue 10(Part - 6), pp. 127--134

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICSCA '17: Proceedings of the 6th International Conference on Software and Computer Applications
February 2017
339 pages
ISBN:9781450348577
DOI:10.1145/3056662
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 February 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Google Docs add-on
  2. Google Docs cryptography
  3. client side security
  4. multiple cloud service provider key distribution
  5. trusted model
  6. untrustworthy cloud environment

Qualifiers

  • Research-article

Conference

ICSCA 2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 107
    Total Downloads
  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media