Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
For some eyes only: protecting online information sharing
Beato F., Ion I., Čapkun S., Preneel B., Langheinrich M.  CODASPY 2013 (Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, San Antonio, TX, Feb 18-20, 2013)1-12.2013.Type:Proceedings
Date Reviewed: Jul 12 2013

This paper addresses an interesting data security and privacy issue on online sharing platforms. The authors propose a carefully designed system with strong user-side encryption. A notable feature of this system is that the ciphertext that is transmitted is invisible to unauthorized parties. Their idea is inspired by techniques from social steganography.

The system needs an online sharing platform, as well as a storage service and a hash map directory. Using the paper’s example, assume that Alice and Bob want to exchange protected messages on a sharing platform. Once they have exchanged cryptographic keys, Alice encrypts the intended message and stores the ciphertext c in the storage service. What Alice posts on the sharing platform is actually dummy data d that looks like a genuine file. Bob computes a keyed hash value of d and uses it as an index to fetch the (encrypted) address of c in the storage service from the hash map directory. With this address, Bob can get c and recover Alice’s message by decryption.

The paper provides a key management and security analysis, and addresses issues of semantics and mining attacks. A proof-of-concept implementation of the system is publicly available as a Firefox plug-in.

Reviewer:  Guangwu Xu Review #: CR141356 (1309-0817)
Bookmark and Share
 
Data Encryption (E.3 )
 
 
Unauthorized Access (K.6.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy