skip to main content
10.1145/3056662.3056705acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicscaConference Proceedingsconference-collections
research-article

TrustDocs: Google Docs add-on securing document in untrusted cloud-based environment

Published:26 February 2017Publication History

ABSTRACT

SaaS applications such as Google Documents have been increasingly widely-used to handle user documents stored in cloud storage. To ensure secured access in untrustworthy cloud environment, all documents in cloud storage must be encrypted and protected from unauthorized stakeholders. There are several automated solutions available. However, most solutions are straight-forward encryption without providing the protection from the system administrators of the cloud storage providers. In this paper, we propose TrustDocs, a new client side cryptography Google Docs Add-on application. Our proposed solution ciphers and deciphers user documents in Google Drive. Using multiple cloud service providers and key-distribution-like methodology, our proposed solution provide secured mechanism for protecting the risk of user data even from brute-force attack by system administrators of the cloud storage providers. Our method supports both real-time standalone and version control collaborative edition for ensuring the security, privacy and usability of user document and can protect user secret information in untrustworthy cloud-based environment.

References

  1. D. Sheng, D. Kondo, and F. Cappello, October 2013, Characterizing cloud applications on a Google data center, IEEE 42nd International Conference on Parallel Processing. Lyon, pp. 468--473, Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Kincaid, September 2010, Google confirms that it fired engineer for breaking internal privacy policies, Available:http://techcrunch.com/2010/09/14/google-engineer-spying-fired/Chu (last access June 21, 2016)Google ScholarGoogle Scholar
  3. Google, Google terms of service, April 2014, https://www.google.com/intl/en/policies/termsGoogle ScholarGoogle Scholar
  4. Bicakci, K., Yavuz, D. D., & Gurkan, S. (2016). TwinCloud: Secure Cloud Sharing Without Explicit Key Management. arXiv preprint arXiv:1606.04705.DOI= https://arxiv.org/abs/1606.04705Google ScholarGoogle Scholar
  5. Bamrah,G. S., & Pandey, 2014 A. Analyzing the Security Schemes of Various Cloud Storage Services. http://ece.gmu.edu/coursewebpages/ECE/ECE646/F15/project/F15_Project_Resources/F14_Cloud_Storage_report.pdfGoogle ScholarGoogle Scholar
  6. Best Free Encryption Utility for Cloud Storage http://www.techsupportalert.com/best-free-encryption-utility-for-cloud-storaGoogle ScholarGoogle Scholar
  7. A. Ferdowsi, Yesterday's Authentication Bug,Dropbox Blog, June 2011, https://blogs.dropbox.com/dropbox/2011/06/yesterdays-authentication-bug/Google ScholarGoogle Scholar
  8. Michalas, A., & Bakopoulos, M. (2012, December) SecGOD Google Docs: Now i feel safer!. In Internet Technology and Secured Transactions, 2012 International Conference for (pp. 589--595). IEEE.Google ScholarGoogle Scholar
  9. Feldman, A. J., Zeller, W. P., Freedman, M. J., & Felten, E. W. (2010, October). SPORC: Group Collaboration using Untrusted Cloud Resources. In OSDI (Vol. 10, pp. 337--350).decisions. J. Syst. Softw. 79, 5 (May. 2006), 577590. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. SafeGDocs, A secure way to work with Google Docs documents, http://www.safegdocs.com/Google ScholarGoogle Scholar
  11. Boxcryptor - Chrome Web Store - Google, https://chrome.google.com/webstore/detail/boxcryptor/ijmndaodmdjamfepoijpolhjddgfgmmeGoogle ScholarGoogle Scholar
  12. Fogpad - Chrome Web Store - Google; https://chrome.google.com/webstore/detail/fogpad/akpccnipkpejnigppmpalammcodfbonjGoogle ScholarGoogle Scholar
  13. TrustDocs - Google Docs add-on. https://chrome.google.com/webstore/detail/trustdocs/mghcpeobheaiohijlhbdgeeagbjhadokGoogle ScholarGoogle Scholar
  14. Lerman, L., Markowitch, O., Nakahara Jr, J., & Samarati, P. P. (2012, July). Key Management as a Service. In SECRYPT (pp. 276--281).Google ScholarGoogle Scholar
  15. Parvathi, S. S. L., & Reddy, B. S. Trust Your Cloud, 2014, Service Provider: User Based Crypto Model., Research and Applications, ISSN : 2248--9622, Vol. 4, Issue 10(Part - 6), pp. 127--134Google ScholarGoogle Scholar

Index Terms

  1. TrustDocs: Google Docs add-on securing document in untrusted cloud-based environment

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICSCA '17: Proceedings of the 6th International Conference on Software and Computer Applications
        February 2017
        339 pages
        ISBN:9781450348577
        DOI:10.1145/3056662

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 February 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)8
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader