WESHARE: A Coercion-Resistant and Scalable Storage Cloud
نویسندگان
چکیده
Several cloud providers encrypt user data as best practices to protect against internal data theft. However, recent incidents have shown that cloud providers can be forced or coerced by governments, legal authorities or overtly malicious external attackers to decrypt user data when necessary. We define a property called coercion-resistance that frees cloud providers from the liability to decrypting client data under such external coercion. We study the challenges in building a coercion-resistant storage cloud that gracefully scales with large number of users and massive data. We discuss why existing solutions fail to achieve the desirable properties of a scalable, coercion-resistant cloud. We propose a new cryptographic primitive that achieves nearideal storage and computation costs when scaled to millions of users sharing large datasets. Using these techniques, we build a cloud storage system called WESHARE that securely handles cryptographic access control and efficient ciphertext re-encryption under the assumptions of the coercion-resistance property. Our prototype integrates seamlessly with a commercial cloud service (Box) and with existing key directory services. We demonstrate that WESHARE achieves strong scalability as data sizes or users increase.
منابع مشابه
An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملData Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملSecure Access Mechanism for Cloud Storage
Emerging storage cloud systems provide continuously available and highly scalable storage services to millions of geographically distributed clients. A secure access control mechanism is a crucial prerequisite for allowing clients to entrust their data to such cloud services. The seamlessly unlimited scale of the cloud and the new usage scenarios that accompany it pose new challenges in the des...
متن کاملScalable Cluster Based Cloud Storage
We consider a cloud system that has to save lots of files and has to use hundreds of computers. The existing cloud storage designs are not scalable enough to support such a huge number of nodes. In this paper, we propose a novel cloud storage system containing thousands of virtual file servers on hundreds of computers. We group these virtual servers into clusters. This system is perfectly scala...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015