Cryptology ePrint Archive: Report 2014/556
Securing Cloud Data in the New Attacker Model
Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
Abstract: The world just witnessed the surge of a new and powerful attacker,
which was able to coerce operators and acquire the necessary keys to break the privacy of users. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the adversary’s access to the ciphertext. This may be achieved, for example, using multi-cloud storage systems. These systems spread data across multiple servers in different administrative domains, to cater for availability and fault tolerance. If the adversary can only compromise a subset of these domains, multi-cloud storage systems may prevent the adversary from accessing the entire ciphertext. However, if data is encrypted using existing encryption schemes, spreading the ciphertext on multiple servers does not entirely solve the problem since an adversary which has the encryption key, can still compromise single servers and decrypt the ciphertext stored therein.
In this paper, we leverage multi-cloud storage systems to provide data confidentiality against an adversary which has access to the encryption key, and can compromise a large fraction of the storage servers. For this purpose, we first introduce a novel security definition that captures data confidentiality in the new adversarial
model. We then propose Bastion, a primitive that is secure according to our definition and, therefore, guarantees data confidentiality even when the encryption key is exposed, as long as the adversary cannot compromise all storage servers. We analyze the security of Bastion, and we evaluate its performance by means of a prototype implementation. Our results show that Bastion incurs less than 5%
overhead compared to existing semantically secure encryption modes. We also discuss practical insights with respect to the integration of Bastion in commercial multi-cloud storage systems.
Category / Keywords: secret-key cryptography / New Attacker Model
Date: received 16 Jul 2014
Contact author: ghassan at karame org
Available format(s): PDF | BibTeX Citation
Version: 20140718:123221 (All versions of this report)
Short URL: ia.cr/2014/556
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]