Paper 2014/556

Securing Cloud Data in the New Attacker Model

Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, and Srdjan Capkun

Abstract

The world just witnessed the surge of a new and powerful attacker, which was able to coerce operators and acquire the necessary keys to break the privacy of users. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the adversary’s access to the ciphertext. This may be achieved, for example, using multi-cloud storage systems. These systems spread data across multiple servers in different administrative domains, to cater for availability and fault tolerance. If the adversary can only compromise a subset of these domains, multi-cloud storage systems may prevent the adversary from accessing the entire ciphertext. However, if data is encrypted using existing encryption schemes, spreading the ciphertext on multiple servers does not entirely solve the problem since an adversary which has the encryption key, can still compromise single servers and decrypt the ciphertext stored therein. In this paper, we leverage multi-cloud storage systems to provide data confidentiality against an adversary which has access to the encryption key, and can compromise a large fraction of the storage servers. For this purpose, we first introduce a novel security definition that captures data confidentiality in the new adversarial model. We then propose Bastion, a primitive that is secure according to our definition and, therefore, guarantees data confidentiality even when the encryption key is exposed, as long as the adversary cannot compromise all storage servers. We analyze the security of Bastion, and we evaluate its performance by means of a prototype implementation. Our results show that Bastion incurs less than 5% overhead compared to existing semantically secure encryption modes. We also discuss practical insights with respect to the integration of Bastion in commercial multi-cloud storage systems.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
New Attacker Model
Contact author(s)
ghassan @ karame org
History
2014-07-18: received
Short URL
https://ia.cr/2014/556
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/556,
      author = {Ghassan O.  Karame and Claudio Soriente and Krzysztof Lichota and Srdjan Capkun},
      title = {Securing Cloud Data in the New Attacker Model},
      howpublished = {Cryptology ePrint Archive, Paper 2014/556},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/556}},
      url = {https://eprint.iacr.org/2014/556}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.