![]() ![]() SpiderOak: Zero-knowledge data backup, sync, access, storage and share from any device -, (accessed November 15, 2011) Journal on Telecommunications and High Technology Law 8(2), 359–424 (2010), Soghoian, C.: Caught in the cloud: Privacy, encryption, and government back doors in the Web 2.0 era. Slamanig, D.: Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources. Paysafecard: Discover the prepaid solution for the internet :, (accessed November 20, 2011) Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2009), Mell, P., Grance, T.: The NIST definition of cloud computing, Le-Blond, S., Legout, A., Fessant, F.L., Dabbous, W., Kâafar, M.A.: Spying the world from your laptop – identifying and profiling content providers and big downloaders in bittorrent. Le-Blond, S., Chao, Z., Legout, A., Ross, K.W., Dabbous, W.: I know where you are and what you are sharing: Exploiting P2P communications to invade users’ privacy. MSR-TR-2011-58, Microsoft Technical Report (May 2011), Kamara, S., Papamanthou, C., Roeder, T.: CS2: A semantic cryptographic cloud storage system. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. ![]() Kamara, S., Lauter, K.: Cryptographic Cloud Storage. Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. In: Symposium on Reliable Distributed Systems, pp. Grolimund, D., Meisser, L., Schmid, S., Wattenhofer, R.: Cryptree: A folder tree structure for cryptographic file systems. ![]() IEEE Computer Society, Washington, DC, USA (2002)ĭropbox: Dropbox - simplify your life, (accessed May 17, 2011)ĮUR-Lex - Access to European Union law: 32006l0024 - en (2012), (accessed February 20, 2012) ![]() In: ICDCS 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002), p. In: Proceedings of the 13th USENIX Security Symposium (August 2004)ĭouceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. CRC Press (2007)ĭingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Attacks, Defences and Public Policy Issues. IEEE Internet Computing 6(1), 40–49 (2002)ĭanezis, G., Clayton, R.: Introducing traffic analysis. #Free secure cloud wuala free#UCB/EECS-2010-5, EECS Department, University of California, Berkeley (January 2010), Ĭlarke, I., Miller, S.G., Hong, T.W., Sandberg, O., Wiley, B.: Protecting free expression online with freenet. Springer, Heidelberg (2001)Ĭhen, Y., Paxson, V., Katz, R.H.: What’s new about cloud computing security? Tech. Springer, Heidelberg (2009)Ĭamenisch, J.L., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. This process is experimental and the keywords may be updated as the learning algorithm improves.īerthold, S., Böhme, R., Köpsell, S.: Data Retention and Anonymity Services. These keywords were added by machine and not by the authors. Our conclusions are that cross-user deduplication should be disabled by default and that public cloud storage services need to be designed to provide unlinkability of users and data, even if the data is encrypted by users before storing it in the cloud. These side channels are present in several public cloud storage services that are marketed as secure and privacy-friendly. This paper investigates side channels in public cloud storage services that allow the service provider, and in some cases users of the same service, to learn who has stored a given file and to profile users’ usage of the service. Public cloud storage services are gaining in popularity and several commercial actors are offering their services for users, however, not always with the security and privacy of their users as the primary design goal. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |