Paper 2024/1616

End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem

Jonas Hofmann, ETH Zurich, TU Darmstadt
Kien Tuong Truong, ETH Zurich
Abstract

End-to-end encrypted cloud storage offers a way for individuals and organisations to delegate their storage needs to a third-party, while keeping control of their data using cryptographic techniques. We conduct a cryptographic analysis of various products in the ecosystem, showing that many providers fail to provide an adequate level of security. In particular, we provide an in-depth analysis of five end-to-end encrypted cloud storage systems, namely Sync, pCloud, Icedrive, Seafile, and Tresorit, in the setting of a malicious server. These companies cumulatively have over 22 million users and are major providers in the field. We unveil severe cryptographic vulnerabilities in four of them. Our attacks invalidate the marketing claims made by the providers of these systems, showing that a malicious server can, in some cases, inject files in the encrypted storage of users, tamper with file data, and even gain direct access to the content of the files. Many of our attacks affect multiple providers in the same way, revealing common failure patterns in independent cryptographic designs. We conclude by discussing the significance of these patterns beyond the security of the specific providers.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. Minor revision. 31st ACM Conference on Computer and Communications Security (CCS 2024)
DOI
10.1145/3658644.3690309
Keywords
cloud-storageend-to-end encryptioncryptoanalysiskey replacementkey overwriting
Contact author(s)
jonas hofmann1 @ tu-darmstadt de
kientuong truong @ inf ethz ch
History
2024-10-11: revised
2024-10-10: received
See all versions
Short URL
https://ia.cr/2024/1616
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1616,
      author = {Jonas Hofmann and Kien Tuong Truong},
      title = {End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1616},
      year = {2024},
      doi = {10.1145/3658644.3690309},
      url = {https://eprint.iacr.org/2024/1616}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.