TY - GEN
T1 - Deniable cloud storage
T2 - 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10
AU - Gasti, Paolo
AU - Ateniese, Giuseppe
AU - Blanton, Marina
PY - 2010
Y1 - 2010
N2 - Cloud computing provides users with ample computing resources, storage, and bandwidth to meet their computing needs, often at minimal cost. As such services become popular and available to a larger body of users, security mechanisms become an integral part of them. Conventional means for protecting data privacy, such as encryption, can protect communication and stored data from unauthorized access including the service provider itself. Such tools, however, are not sufficient against powerful adversaries who can force users into opening their encrypted content. In this work we introduce the concept of deniable cloud storage that guarantees privacy of data even when one's communication and storage can be opened by an adversary. We show that existing techniques and systems do not adequately solve this problem. We design the first sender-and-receiver deniable public-key encryption scheme that is both practical and is built from standard tools. Furthermore, we treat practical aspects of user collaboration and provide an implementation of a deniable shared file system, DenFS.
AB - Cloud computing provides users with ample computing resources, storage, and bandwidth to meet their computing needs, often at minimal cost. As such services become popular and available to a larger body of users, security mechanisms become an integral part of them. Conventional means for protecting data privacy, such as encryption, can protect communication and stored data from unauthorized access including the service provider itself. Such tools, however, are not sufficient against powerful adversaries who can force users into opening their encrypted content. In this work we introduce the concept of deniable cloud storage that guarantees privacy of data even when one's communication and storage can be opened by an adversary. We show that existing techniques and systems do not adequately solve this problem. We design the first sender-and-receiver deniable public-key encryption scheme that is both practical and is built from standard tools. Furthermore, we treat practical aspects of user collaboration and provide an implementation of a deniable shared file system, DenFS.
KW - cloud computing
KW - cryptography
KW - deniable encryption
KW - deniable file system
KW - steganographic file system
UR - http://www.scopus.com/inward/record.url?scp=78650197977&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650197977&partnerID=8YFLogxK
U2 - 10.1145/1866919.1866925
DO - 10.1145/1866919.1866925
M3 - Conference contribution
AN - SCOPUS:78650197977
SN - 9781450300964
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 31
EP - 42
BT - Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10
Y2 - 4 October 2010 through 8 October 2010
ER -