ABSTRACT
SaaS applications such as Google Documents have been increasingly widely-used to handle user documents stored in cloud storage. To ensure secured access in untrustworthy cloud environment, all documents in cloud storage must be encrypted and protected from unauthorized stakeholders. There are several automated solutions available. However, most solutions are straight-forward encryption without providing the protection from the system administrators of the cloud storage providers. In this paper, we propose TrustDocs, a new client side cryptography Google Docs Add-on application. Our proposed solution ciphers and deciphers user documents in Google Drive. Using multiple cloud service providers and key-distribution-like methodology, our proposed solution provide secured mechanism for protecting the risk of user data even from brute-force attack by system administrators of the cloud storage providers. Our method supports both real-time standalone and version control collaborative edition for ensuring the security, privacy and usability of user document and can protect user secret information in untrustworthy cloud-based environment.
- D. Sheng, D. Kondo, and F. Cappello, October 2013, Characterizing cloud applications on a Google data center, IEEE 42nd International Conference on Parallel Processing. Lyon, pp. 468--473, Google ScholarDigital Library
- J. Kincaid, September 2010, Google confirms that it fired engineer for breaking internal privacy policies, Available:http://techcrunch.com/2010/09/14/google-engineer-spying-fired/Chu (last access June 21, 2016)Google Scholar
- Google, Google terms of service, April 2014, https://www.google.com/intl/en/policies/termsGoogle Scholar
- Bicakci, K., Yavuz, D. D., & Gurkan, S. (2016). TwinCloud: Secure Cloud Sharing Without Explicit Key Management. arXiv preprint arXiv:1606.04705.DOI= https://arxiv.org/abs/1606.04705Google Scholar
- Bamrah,G. S., & Pandey, 2014 A. Analyzing the Security Schemes of Various Cloud Storage Services. http://ece.gmu.edu/coursewebpages/ECE/ECE646/F15/project/F15_Project_Resources/F14_Cloud_Storage_report.pdfGoogle Scholar
- Best Free Encryption Utility for Cloud Storage http://www.techsupportalert.com/best-free-encryption-utility-for-cloud-storaGoogle Scholar
- A. Ferdowsi, Yesterday's Authentication Bug,Dropbox Blog, June 2011, https://blogs.dropbox.com/dropbox/2011/06/yesterdays-authentication-bug/Google Scholar
- Michalas, A., & Bakopoulos, M. (2012, December) SecGOD Google Docs: Now i feel safer!. In Internet Technology and Secured Transactions, 2012 International Conference for (pp. 589--595). IEEE.Google Scholar
- Feldman, A. J., Zeller, W. P., Freedman, M. J., & Felten, E. W. (2010, October). SPORC: Group Collaboration using Untrusted Cloud Resources. In OSDI (Vol. 10, pp. 337--350).decisions. J. Syst. Softw. 79, 5 (May. 2006), 577590. Google ScholarDigital Library
- SafeGDocs, A secure way to work with Google Docs documents, http://www.safegdocs.com/Google Scholar
- Boxcryptor - Chrome Web Store - Google, https://chrome.google.com/webstore/detail/boxcryptor/ijmndaodmdjamfepoijpolhjddgfgmmeGoogle Scholar
- Fogpad - Chrome Web Store - Google; https://chrome.google.com/webstore/detail/fogpad/akpccnipkpejnigppmpalammcodfbonjGoogle Scholar
- TrustDocs - Google Docs add-on. https://chrome.google.com/webstore/detail/trustdocs/mghcpeobheaiohijlhbdgeeagbjhadokGoogle Scholar
- Lerman, L., Markowitch, O., Nakahara Jr, J., & Samarati, P. P. (2012, July). Key Management as a Service. In SECRYPT (pp. 276--281).Google Scholar
- Parvathi, S. S. L., & Reddy, B. S. Trust Your Cloud, 2014, Service Provider: User Based Crypto Model., Research and Applications, ISSN : 2248--9622, Vol. 4, Issue 10(Part - 6), pp. 127--134Google Scholar
Index Terms
- TrustDocs: Google Docs add-on securing document in untrusted cloud-based environment
Recommendations
An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective
WWW '17: Proceedings of the 26th International Conference on World Wide WebWith the prevalence of smartphones, app markets such as Apple App Store and Google Play has become the center stage in the mobile app ecosystem, with millions of apps developed by tens of thousands of app developers in each major market. This paper ...
CCA-secure ABE with outsourced decryption for fog computing
Fog computing is not a replacement but an extension of cloud computing for the prevalence of the Internet of Things (IoT) applications. In particular, fog computing inserts a middle layer named fog into the infrastructure of cloud computing to obtain ...
Public-Key encryption from ID-Based encryption without one-time signature
OTM'06: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part IDesign a secure public key encryption scheme and its security proof are one of the main interests in cryptography In 2004, Canetti, Halevi and Katz [8] constructed a public key encryption (PKE) from a selective identity-based encryption scheme with a ...
Comments