Title :
CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era
Author :
Zhang, Nan ; Jing, Jiwu ; Liu, Peng
Author_Institution :
Grad. Univ. of Chinese Acad. of Sci., Beijing, China
Abstract :
Data Disclosure due to laptop loss, especially in travel, is a top threat to businesses, governments, and non- profit organizations. An effective protection against this threat should guarantee the data confidentiality, even if the adversary has physically possessed the laptop. Current technology does not satisfy this requirement. This paper proposes a novel approach to remove the threat under the emerging condition of ubiquitous internet access and cloud computing. We name this approach "Cloud Shredder", implying that the confidential files are shredded and hidden in the semi-trusted cloud storage service. Cloud Shredder is a generic and transparent security service that allows legitimate user access the files in exactly the same way as with commodity file systems, whereas the attackers only get meaningless junk even if they have obtained every byte on the hard drive. Rather than the traditional encryption-based protection, Cloud Shredder limits the attacker\´s opportunity in a short time window. We implemented a prototype that is compatible with the typical cloud storage service, Amazon S3, and supports two popular document applications, Acrobat Reader and Open Office. Our experiments show that the influence on file access performance is reasonable and should not ruin the user experience. Cloud Shredder is also applicable to smart phone, netbook and other computing devices with internet connection.
Keywords :
authorisation; cloud computing; laptop computers; ubiquitous computing; Acrobat Reader; Amazon S3; Cloud Shredder; Open Office; cloud computing era; data confidentiality; file access performance; laptop on-road data disclosure threat removal; security service; semitrusted cloud storage service; ubiquitous Internet access; Cloud computing; Encryption; Kernel; Portable computers; Prototypes; cloud computing; data protection; laptop theft; secret sharing;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on
Conference_Location :
Changsha
Print_ISBN :
978-1-4577-2135-9
DOI :
10.1109/TrustCom.2011.221