OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices
نویسندگان
چکیده
Cloud storage services like Dropbox, Google Drive and OneDrive are becoming increasingly popular. Two major reasons for the success of cloud storage services are 1) their ability to synchronize stored data across multiple client devices and 2) the possibility of sharing a subset of this data with other people. But privacy of cloud data is a growing concern. Encrypting data on the client-side before uploading it to cloud storage servers is an effective way to ensure privacy of data. However, in order to allow users to access their data from multiple devices, current solutions resort to deriving encryption keys solely from userchosen passwords which may have low entropy. We present OmniShare, the first scheme to allow client-side encryption with high-entropy keys whilst providing an intuitive key distribution mechanism enabling data access from multiple client devices. It allows users to authorize their devices to access encrypted storage and makes use of out-of-band channels for distributing the relevant keys to authorized devices. OmniShare uses the cloud storage itself as a communication channel between devices to ensure that user actions needed during authorization are minimal and consistent. Furthermore, OmniShare allows the possibility of sharing selected encrypted files with other people. OmniShare is open source and currently available for Android and Windows with other other platforms in development.
منابع مشابه
Fuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملCloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
Cloud services are blooming recently. They provide a convenient way for data accessing, sharing, and processing. A key ingredient for successful cloud services is to control data access while considering the specific features of cloud services. The specific features include great quantity of outsourced data, large number of users, honest-but-curious cloud servers, frequently changed user set, d...
متن کاملOS2: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain
Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted da...
متن کاملTCLOUD: A Trusted Storage Architecture for Cloud Computing
The cloud storage provides a least cost means of data storage for the small and large enterprises across the globe. But the main barricade to wide spread adoption of cloud storage is the lake of trust in the technology by its user. The data is stored on multiple servers and the location is concealed from the customers and they are no more in control of the data. This distinctive feature of the ...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1511.02119 شماره
صفحات -
تاریخ انتشار 2015