1/7/2024 0 Comments Wuala expression![]() MSR-TR-2011-58, Microsoft Technical Report (May 2011), Kamara, S., Papamanthou, C., Roeder, T.: CS2: A semantic cryptographic cloud storage system. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. Kamara, S., Lauter, K.: Cryptographic Cloud Storage. Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. In: Symposium on Reliable Distributed Systems, pp. Grolimund, D., Meisser, L., Schmid, S., Wattenhofer, R.: Cryptree: A folder tree structure for cryptographic file systems. IEEE Computer Society, Washington, DC, USA (2002)ĭropbox: Dropbox - simplify your life, (accessed May 17, 2011)ĮUR-Lex - Access to European Union law: 32006l0024 - en (2012), (accessed February 20, 2012) In: ICDCS 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002), p. In: Proceedings of the 13th USENIX Security Symposium (August 2004)ĭouceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. ![]() CRC Press (2007)ĭingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Attacks, Defences and Public Policy Issues. IEEE Internet Computing 6(1), 40–49 (2002)ĭanezis, G., Clayton, R.: Introducing traffic analysis. UCB/EECS-2010-5, EECS Department, University of California, Berkeley (January 2010), Ĭlarke, I., Miller, S.G., Hong, T.W., Sandberg, O., Wiley, B.: Protecting free expression online with freenet. Springer, Heidelberg (2001)Ĭhen, Y., Paxson, V., Katz, R.H.: What’s new about cloud computing security? Tech. Springer, Heidelberg (2009)Ĭamenisch, J.L., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. This process is experimental and the keywords may be updated as the learning algorithm improves.īerthold, S., Böhme, R., Köpsell, S.: Data Retention and Anonymity Services. These keywords were added by machine and not by the authors. Our conclusions are that cross-user deduplication should be disabled by default and that public cloud storage services need to be designed to provide unlinkability of users and data, even if the data is encrypted by users before storing it in the cloud. These side channels are present in several public cloud storage services that are marketed as secure and privacy-friendly. This paper investigates side channels in public cloud storage services that allow the service provider, and in some cases users of the same service, to learn who has stored a given file and to profile users’ usage of the service. Public cloud storage services are gaining in popularity and several commercial actors are offering their services for users, however, not always with the security and privacy of their users as the primary design goal.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |