Skip to main content

A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8647))

Abstract

This paper presents Encrypted Cloud (EnCloud), a system designed for providing end-to-end encryption between cloud applications to facilitate their operation and enable users trust in providers. EnCloud relieves end-users’ privacy concerns about the data stored in cloud services so that the private data are securely stored on the cloud server in an encrypted form while the data owner’s EnCloud applications are only allowed to decrypt the encrypted data. To show the feasibility of EnCloud, we implemented a prototype for Dropbox. The experimental results of the prototype demonstrate that the additional time delay incurred by EnCloud operations is acceptable (within 11.5% of the total execution-time).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ball, J., Borger, J., Greenwald, G.: Revealed: How US and UK spy agencies defeat internet privacy and security (2013)

    Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. of Computing 32(3), 586–615 (2003); extended abstract in Crypto 2001

    Google Scholar 

  3. Daemen, J., Rijmen, V.: The Design of Rijndael. Springer-Verlag New York, Inc. (2002)

    Google Scholar 

  4. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium (2004)

    Google Scholar 

  5. Fujitsu Research Institute: Personal data in the cloud: A global survey of customer attitudes (2010)

    Google Scholar 

  6. Gellman, B., Poitras, L.: U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program (2013)

    Google Scholar 

  7. Ion, I., Sachdeva, N., Kumaraguru, P., Čapkun, S.: Home is safer than the cloud!: Privacy concerns for consumer cloud storage. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, pp. 13:1–13:20. ACM (2011)

    Google Scholar 

  8. Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp. 136–149 (2010)

    Google Scholar 

  9. Khan, S., Hamlen, K.: Anonymouscloud: A data ownership privacy provider framework in cloud computing. In: Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 170–176 (2012)

    Google Scholar 

  10. Kincaid, J.: Dropbox security bug made passwords optional for four hours (2012)

    Google Scholar 

  11. Mearian, L.: No, your data isn’t secure in the cloud (2013)

    Google Scholar 

  12. Mell, P., Grance, T.: The NIST definition of cloud computing (2011), http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf

  13. Slamanig, D.: More privacy for cloud users: Privacy-preserving resource usage in the cloud. In: 4th Hot Topics in Privacy Enhancing Technologies, HotPETs (2011)

    Google Scholar 

  14. Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Security and Privacy 8(6), 24–31 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Song, Y., Kim, H., Mohaisen, A. (2014). A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2014. Lecture Notes in Computer Science, vol 8647. Springer, Cham. https://doi.org/10.1007/978-3-319-09770-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09770-1_7

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09769-5

  • Online ISBN: 978-3-319-09770-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics