11Dec
A security analysis of techniques for long-term integrity protection
The amount of security critical information that is only available in digital form is increasing constantly. Some of these data, such as medical or tax data, need to be preserved for long periods of time. Thus, several schemes for...
Details11Dec
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems
Distributed storage allows to outsource a document to the cloud such that multiple users can easily access the file. The protection of the document stored relies on secret sharing, which generates and distributes shares of the document to the...
Details27Oct
Formal Policy-based Provenance Audit
Denis Butin, Denise Demirel, and Johannes Buchmann (TU Darmstadt). Formal Policy-based Provenance Audit. 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings.
Details27Oct
Dynamic and Verifiable Hierarchical Secret Sharing
Giulia Traverso, Denise Demirel, Johannes Buchmann. Dynamic and Verifiable Hierarchical Secret Sharing. 9th International Conference on Information Theoretic Security (ICITS 2016). Tacoma, Washington, USA, 9-12 August 2016. Proceedings.
Details29Sep
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT
Digitally signing data allows to verify authenticity and thus provides strong data quality assurance or forensic evidence even in the presence of an active attacker. A drawback of cryptographic standard signatures is that the signed data set can not...
Details29Sep
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing
David Derler, Stephan Krenn, and Daniel Slamanig. “Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing“, in: CANS 2016, LNCS, Milan/Italy, Springer. (in press)
Details08Sep
PRISMACLOUD Presentation at ENISA Annual Privacy Forum 2016
Thomas Länger (University of Lausanne) presented "Selected Cloud Security Patterns For Improving End User Security and Privacy in Public Clouds" at the 4th Annual Privacy Forum organised by ENISA on 7th - 8th September in Frankfurt, Germany! Download the presentation!
Details08Sep
Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds
Länger, T., Pöhls, H. C., Ghernaouti, S: "Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds"; in: Privacy Technologies and Policy, Proceedings of the 4th Annual Privacy Forum APF 2016, Springer LNCS, ISBN 978-3-319-44759-9
Details29Aug
Efficient Third Party Auditing for a Distributed Storage System
When using distributed storage systems to outsource data storage into the cloud, it is often vital that this is done in a privacy preserving way, i.e., without the storage servers learning anything about the stored data. Especially when storing...
Details29Aug
PRISMACLOUD Tools: A cryptographic toolbox for increasing security in cloud services
The EC Horizon 2020 project PRISMACLOUD aims at cryptographically addressing several severe risks threatening end user security and privacy in current cloud settings. This shall be achieved by the provision of a reusable toolbox encapsulating cryptographic functionality from which...
Details