Cloud Data Sharing And Device-Loss Recovery With Hardware-Bound Keys

Felix Hörandner, Franco Nieddu

INFORMATION SYSTEMS SECURITY (ICISS 2019)(2019)

引用 0|浏览0
暂无评分
摘要
Cloud-based storage services, such as Dropbox, Google Drive, or NextCloud, are broadly used to share data with others or between the individual devices of one user due to their convenience. Various end-to-end encryption mechanisms can be applied to protect the confidentiality of sensitive data in a not fully trusted cloud environment. As all such encryption mechanisms require to store keys on the client's device, losing a device (and key) might lead to catastrophic consequences: Losing access to all outsourced data. Strategies to recover from key-loss have various trade-offs. For example, storing the key on a flash drive burdens the user to keep it secure and available, while encrypting the key with a password before uploading it to the cloud requires users to remember a complex password. These strategies also require that the key can be extracted from the device's hardware, which risks the confidentiality of the key and data once a curious person finds a lost device or a thief steals it.In this paper, we propose and implement a cloud-based data sharing system that supports recovery after key-loss while binding the keys to the devices' hardware. By using multi-use proxy re-encryption, we build a network of re-encryption keys that enables users to use any of their devices to access data or share it with other users. In case of device-loss, we amend this network of re-encryption keys - potentially with the help of one or more user-selected recovery users - to restore data access to the user's new device. Our implementation highlights the system's feasibility and underlines its practical performance.
更多
查看译文
关键词
Cloud data sharing, Key-loss recovery, Hardware-protected keys
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要