Deniable cloud storage: Sharing files via public-key deniability

Paolo Gasti, Giuseppe Ateniese, Marina Blanton

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

28 Scopus citations

Abstract

Cloud computing provides users with ample computing resources, storage, and bandwidth to meet their computing needs, often at minimal cost. As such services become popular and available to a larger body of users, security mechanisms become an integral part of them. Conventional means for protecting data privacy, such as encryption, can protect communication and stored data from unauthorized access including the service provider itself. Such tools, however, are not sufficient against powerful adversaries who can force users into opening their encrypted content. In this work we introduce the concept of deniable cloud storage that guarantees privacy of data even when one's communication and storage can be opened by an adversary. We show that existing techniques and systems do not adequately solve this problem. We design the first sender-and-receiver deniable public-key encryption scheme that is both practical and is built from standard tools. Furthermore, we treat practical aspects of user collaboration and provide an implementation of a deniable shared file system, DenFS.

Original languageEnglish
Title of host publicationProceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10
Pages31-42
Number of pages12
DOIs
StatePublished - 2010
Event9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10 - Chicago, IL, United States
Duration: 4 Oct 20108 Oct 2010

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10
Country/TerritoryUnited States
CityChicago, IL
Period4/10/108/10/10

Keywords

  • cloud computing
  • cryptography
  • deniable encryption
  • deniable file system
  • steganographic file system

Fingerprint

Dive into the research topics of 'Deniable cloud storage: Sharing files via public-key deniability'. Together they form a unique fingerprint.

Cite this