ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work

08/31/2020
by   Moe Sabry, et al.
0

Data breaches-mass leakage of stored information-are a major security concern. Encryption can provide confidentiality, but encryption depends on a key which, if compromised, allows the attacker to decrypt everything, effectively instantly. Security of encrypted data thus becomes a question of protecting the encryption keys. In this paper, we propose using keyless encryption to construct a mass leakage resistant archiving system, where decryption of a file is only possible after the requester, whether an authorized user or an adversary, completes a proof of work in the form of solving a cryptographic puzzle. This proposal is geared towards protection of infrequently-accessed archival data, where any one file may not require too much work to decrypt, decryption of a large number of files-mass leakage-becomes increasingly expensive for an attacker. We present a prototype implementation realized as a user-space file system driver for Linux. We report experimental results of system behaviour under different file sizes and puzzle difficulty levels. Our keyless encryption technique can be added as a layer on top of traditional encryption: together they provide strong security against adversaries without the key and resistance against mass decryption by an attacker.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/04/2022

ID-based self-encryption via Hyperledger Fabric based smart contract

This paper offers a prototype of a Hyperledger Fabric-IPFS based network...
research
06/08/2018

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Most encrypted data formats, such as PGP, leak substantial metadata in t...
research
01/23/2019

Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure

Rivest's seminal paper introduced the first All-Or-Nothing (AON) method ...
research
10/30/2019

Secure Logging with Security against Adaptive Crash Attack

Logging systems are an essential component of security systems and their...
research
09/09/2022

Minimizing Information Leakage under Padding Constraints

An attacker can gain information of a user by analyzing its network traf...
research
02/25/2018

Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator

Modern high-performance as well as power-constrained System-on-Chips (So...
research
10/24/2022

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Ransomware is a malicious class of software that utilises encryption to ...

Please sign up or login with your details

Forgot password? Click here to reset