2FE: Two-Factor Encryption for Cloud Storage

10/27/2020
by   Anders Dalskov, et al.
0

Encrypted cloud storage services are steadily increasing in popularity, with many commercial solutions currently available. In such solutions, the cloud storage is trusted for data availability, but not for confidentiality. Additionally, the user's device is considered secure, and the user is expected to behave correctly. We argue that such assumptions are not met in reality: e.g., users routinely forget passwords and fail to make backups, and users' devices get stolen or become infected with malware. Therefore, we consider a more extensive threat model, where users' devices are susceptible to attacks and common human errors are possible. Given this model, we analyze 10 popular commercial services and show that none of them provides good confidentiality and data availability. Motivated by the lack of adequate solutions in the market, we design a novel scheme called Two-Factor Encryption (2FE) that draws inspiration from two-factor authentication and turns file encryption and decryption into an interactive process where two user devices, like a laptop and a smartphone, must interact. 2FE provides strong confidentiality and availability guarantees, as it withstands compromised cloud storage, one stolen or compromised user device at a time, and various human errors. 2FE achieves this by leveraging secret sharing with additional techniques such as oblivious pseudorandom functions and zero-knowledge proofs. We evaluate 2FE experimentally and show that its performance overhead is small. Finally, we explain how our approach can be adapted to other related use cases such as cryptocurrency wallets.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/09/2020

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

With the evolution of computer systems, the amount of sensitive data to ...
research
06/06/2023

A Practical Framework for Storing and Searching Encrypted Data on Cloud Storage

Security has become a significant concern with the increased popularity ...
research
08/22/2017

S4: A New Secure Scheme for Enforcing Privacy in Cloud Data Warehouses

Outsourcing data into the cloud becomes popular thanks to the pay-as-you...
research
06/01/2020

An End-to-End Encryption Solution for Enterprise Content Applications

The content host services (like Dropbox, OneDrive, and Google Drive) use...
research
06/12/2022

RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis

Encryption ransomware has become a notorious malware. It encrypts user d...
research
09/22/2021

Privacy-preserving Credit Scoring via Functional Encryption

The majority of financial organizations managing confidential data are a...
research
09/06/2020

Efficiency Improvements for Encrypt-to-Self

Recent work by Pijnenburg and Poettering (ESORICS'20) explores the novel...

Please sign up or login with your details

Forgot password? Click here to reset