An End-to-End Encryption Solution for Enterprise Content Applications

06/01/2020
by   Chaoting Xuan, et al.
0

The content host services (like Dropbox, OneDrive, and Google Drive) used by enterprise customers are deployed either on premise or in cloud. Because users may store business-sensitive data (contents) in these hosting services, they may want to protect their data from disclosure to anyone else, even IT administrators. Unfortunately, even contents (files) are encrypted in the hosting services, they sometimes are still accessible to IT administrators today. The sensitive data could be exposed to public if the IT administrator turns malicious (like disgruntled employee) or his account is compromised by hackers. We propose an end-to-end encryption (E2EE) solution to address this challenge. The user data is encrypted at client side (mobile device) and remains encrypted in transit and at rest on server. Specifically, we design a new method to allow master secret recover and escrow, while protecting them from being accessed by malicious administrators. In addition, we present a content (file) encryption scheme that achieves privacy, and granular access control. And it can be seamlessly integrated with major content host services used by business users today.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/07/2023

Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems

End-to-End Encryption (E2EE) aims to make all messages impossible to rea...
research
07/26/2019

Secure Distribution of Protected Content in Information-Centric Networking

The benefits of the ubiquitous caching in ICN are profound, such feature...
research
05/24/2018

SEVered: Subverting AMD's Virtual Machine Encryption

AMD SEV is a hardware feature designed for the secure encryption of virt...
research
02/09/2022

Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems

In this paper, we assess existing technical proposals for content modera...
research
03/07/2023

SoK: Content Moderation for End-to-End Encryption

Popular messaging applications now enable end-to-end-encryption (E2EE) b...
research
07/24/2019

A Forensic Audit of the Tor Browser Bundle

The increasing use of encrypted data within file storage and in network ...
research
10/27/2020

2FE: Two-Factor Encryption for Cloud Storage

Encrypted cloud storage services are steadily increasing in popularity, ...

Please sign up or login with your details

Forgot password? Click here to reset