Deniable cloud storage: sharing files via public-key deniability

@inproceedings{Gasti2010DeniableCS,
  title={Deniable cloud storage: sharing files via public-key deniability},
  author={Paolo Gasti and Giuseppe Ateniese and Marina Blanton},
  booktitle={WPES '10},
  year={2010}
}
Cloud computing provides users with ample computing resources, storage, and bandwidth to meet their computing needs, often at minimal cost. As such services become popular and available to a larger body of users, security mechanisms become an integral part of them. Conventional means for protecting data privacy, such as encryption, can protect communication and stored data from unauthorized access including the service provider itself. Such tools, however, are not sufficient against powerful… Expand
Secure and Error-Free Data Storage on Cloud via Deniable CP-ABE Scheme
Cloud storage services are quickly increasing and more prevalent. CSP-cloud storage providers offer storage as a service to all the users. It is a paid facility that allows association to outsourceExpand
A Survey on Audit Free Cloud Storage via Deniable Attribute Based Encryption
TLDR
To fully make sure the data integrity and save the cloud users’ calculation resources as well as online burden, it is of critical importance to allow public auditing service for cloud data, so that users may choice to an independent third party auditor (TPA) to audit the contract out data when needed. Expand
Framework for securing data in cloud storage services
  • M. Dahshan, S. Elkassas
  • Computer Science
  • 2014 11th International Conference on Security and Cryptography (SECRYPT)
  • 2014
TLDR
A secure cloud storage system framework that simultaneously achieves data confidentiality and fine-grained access control on encrypted data is designed by designing a trusted third party service that can be employed either locally on users' machine or premises, or remotely on top of cloud storage services for ensuring data confidentiality. Expand
Audit-Free Cloud Storage via Deniable Attribute-Based Encryption
TLDR
This paper presents a new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy and explains why coercers cannot tell if obtained secrets are true or not. Expand
Data security in cloud storage services
TLDR
This paper proposes a novel data sharing mechanism that simultaneously achieves data confidentiality, fine-grained access control on encrypted data and user revocation by combining ciphertext policy attribute-based encryption (CPABE), and proxy re-encryption (PRE). Expand
DEFY: A Deniable, Encrypted File System for Log-Structured Storage
TLDR
D DEFY is presented, a deniable file system following a log-structured design that provides features not offered by prior work, including authenticated encryption, fast secure deletion, and support for multiple layers of deniability. Expand
A Survey on Cloud Storage Auditing Free Through Denial-Based Encryption Attribute
TLDR
This paper presents a new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy and explains why coercers cannot tell if obtained secrets are true or not. Expand
REVIEW-FREE DISTRIBUTED STORAGE BY MEANS OF DENIABLE ATTRIBUTE BASED ENCRYPTION
Transformations square measure obligatory to mount the unstoppable stream of amendment. The majority of associations are endeavoring to lessen their registering cost through the methods forExpand
Privacy Preserving and Consistency Check Of Data Store in Cloud Using Attribute Based Encryption
Cloud computing is a promising knowledge which provider an assortment of opportunities for online distribution of resources or services. The most effective benefit of using cloud computing is higherExpand
Do not ask me what I am looking for: Index deniable encryption
  • Po-Wen Chi, Yu-Lun Chang
  • Computer Science
  • Future Gener. Comput. Syst.
  • 2021
TLDR
An index deniable encryption scheme that supports both searchability and deniability is proposed to ensure user privacy in the cloud storage and the outside coercion case and is integrates the Bloom filter and the CP-ABE technique to construct a searchable encryption scheme. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 33 REFERENCES
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers
TLDR
This work adapts a formal model for group signatures capturing the state-of-the-art requirements in the area and constructs an efficient scheme and proves its security, discovering that in the basic construction, anonymity does not depend on factoring-based assumptions, which allows the natural separation of user join management and anonymity revocation authorities. Expand
StegFS: a steganographic file system
TLDR
StegFS securely hides user-selected files in a file system so that, without the corresponding access keys, an attacker would not be able to deduce their existence, even if the attacker is thoroughly familiar with the implementation of the file system and has gained full access to it. Expand
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
TLDR
This research highlights several fundamental challenges to the creation and use of any DFS: even when the file system may be deniable in the pure, mathematical sense, the environment surrounding that file system can undermine its deniability, as well as its contents. Expand
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
TLDR
This work presents a scalable forward-secure HIBE (fs-HIBE) scheme, which can be used for secure communications with entities having multiple roles in role-based access control and generalizes it into a collusion-resistant multiple hierarchical ID-based encryption scheme. Expand
Practical Deniable Encryption
TLDR
It is shown that deniable encryption can be implemented in a different way so that it does not point to exploiting deniability, and that even the special purpose original scheme can be extended to allow, in some circumstances, any "depth" of deniability. Expand
A Forward-Secure Public-Key Encryption Scheme
TLDR
The first constructions of (non-interactive) forward-secure public-key encryption schemes are presented and the main construction achieves security against chosen-plaintext attacks in the standard model, and all parameters are poly-logarithmic in the total number of time periods. Expand
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications
TLDR
This paper shows how to construct a perfectly hiding commitment schemes that allows for an on-line / off-line efficiency tradeoff and is computationally binding under the assumption that factoring is hard, thus improving on the previous construction by Catalano et al. Expand
Hiding data accesses in steganographic file system
TLDR
This work proposes two mechanisms, in the context of a steganographic file system, to mitigate the risk of attacks initiated through analyzing data accesses from user applications, intended to counter attempts to locate data through updates in between snapshots. Expand
Receiver-deniable Public-Key Encryption
  • M. Ibrahim
  • Computer Science
  • Int. J. Netw. Secur.
  • 2009
TLDR
A scheme for receiver-deniable public-key encryption, by which, the receiver is able to lie about the decrypted message to a coercer and hence, escape a coercion. Expand
Toward Hierarchical Identity-Based Encryption
TLDR
A two-level HIBE system with total collusion resistance at the upper (domain) level and partial collusion resistance in the lower (user) level, which has chosen-ciphertext security in the random-oracle model is presented. Expand
...
1
2
3
4
...