POSTER: CipherLocker: Encrypted File Sharing with Ranked Search https://cipherlocker.com

0Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Today's (predominantly cloud-based) file sharing products leave users at the mercy of providers and nation-state adversaries with subpoena and National Security Letter (NSL) powers. In-Transit and provider-side at-rest encryption do little to handle this.Almostweekly breaches [7-13, 17] and NSL revelations [2] show that the problembecomes onlyworsewith increasingly privacy-unfriendly regulation [14]. We believe it is important to provide hype-free, easy-To-use strongly-secure solutions that protect individual privacy while also defeating cloud breaches and compromises. CipherLocker provides practical, easy-To-use, client-side encrypted file sharing with integrated ranked search. All data and metadata is strongly encrypted before leaving the client. Users can securely store, share, sync, and search. The design does not allow even a compromised or compelled cloud provider to ever access user data or search queries. CipherLocker shows that highly-scalable, fast ranked search on encrypted data is possible without the deployment of expensive and often insecure server-side search-on-encrypted-data cryptographywhichwould require 3-5 orders of magnitude more resources and cannot scale to even thousands of users, or the simplest sharing scenarios without breaking security. CipherLocker is the result of several years of work and it cannot be exhaustively detailed and analyzed in this space. This is the first of a series of papers discussing CipherLocker design, implementation and security properties. The main goal here is to briefly overview and introduce key design decisions and behaviors.

Cite

CITATION STYLE

APA

Kasiak, J., Carbunar, B., Christensen, J., Lyukova, M., Bajaj, S., Boruta, M., … Stan, G. (2018). POSTER: CipherLocker: Encrypted File Sharing with Ranked Search https://cipherlocker.com. In Proceedings of the ACM Conference on Computer and Communications Security (Vol. 2018-January, pp. 2234–2236). Association for Computing Machinery. https://doi.org/10.1145/3243734.3278500

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free