SHARING SECURE DOCUMENTS IN THE CLOUD - A Secure Layer for Google Docs

Lilian Adkinson-Orellana, Daniel A. Rodríguez-Silva, Francisco J. González-Castaño, David González-Martínez

2011

Abstract

With the advent of Web 2.0, end users generate and share more and more content. One of the most representative services in this context is the collaborative edition of online documents. This service is commonly provided through Cloud Computing as Software as a Service. However, the Cloud paradigm still requires users to place their trust in Cloud providers with regard to privacy. This is the case of Google Docs, a very popular service without privacy support for the documents stored on its servers. In this paper we present and discuss a secure layer to guarantee privacy of shared Google Docs documents. To our knowledge, this is one of the first approaches to private shared edition with real Cloud tools.

References

  1. Adkinson-Orellana, L., Rodríguez-Silva, D., GilCastiñeira, F. and Burguillo-Rial J. C. (2010). Privacy for google docs: Implementing a transparent encryption layer. In Proceedings of the CloudViews 2010 - 2nd Cloud Computing International Conference, pages 21-22, Porto, Portugal.
  2. Adkinson-Orellana, L., Rodríguez-Silva, D., GilCastiñeira, F. and Burguillo-Rial J. C. (2010). Privacy for google docs: Implementing a transparent encryption layer. In Proceedings of the CloudViews 2010 - 2nd Cloud Computing International Conference, pages 21-22, Porto, Portugal.
  3. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I. and Zaharia, M. (2009). Above the Clouds: A Berkeley View of Cloud Computing, Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley, USA.
  4. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I. and Zaharia, M. (2009). Above the Clouds: A Berkeley View of Cloud Computing, Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley, USA.
  5. CSA (2010). Domain 10: Guidance for Application Security V2.1. Cloud Security Alliance Whitepaper. Retrieved December 16, 2010 from http://www.cloudsecurityalliance.org/guidance/csagui de-dom10-v2.10.pdf.
  6. CSA (2010). Domain 10: Guidance for Application Security V2.1. Cloud Security Alliance Whitepaper. Retrieved December 16, 2010 from http://www.cloudsecurityalliance.org/guidance/csagui de-dom10-v2.10.pdf.
  7. D'Angelo, G., Vitali, F. and Zacchiroli, S. (2010). Content cloaking: Preserving privacy with Google Docs and other web applications. In 2010 ACM Symposium on Applied Computing, pages 22-26, Sierre, Switzerland.
  8. D'Angelo, G., Vitali, F. and Zacchiroli, S. (2010). Content cloaking: Preserving privacy with Google Docs and other web applications. In 2010 ACM Symposium on Applied Computing, pages 22-26, Sierre, Switzerland.
  9. DocCloak (2010). DocCloak website. Retrieved December 16, 2010 from http://www.gwebs.com/doccloak.html.
  10. DocCloak (2010). DocCloak website. Retrieved December 16, 2010 from http://www.gwebs.com/doccloak.html.
  11. Google (2010). Google Docs API website. Retrieved December 16, 2010 from
  12. Google (2010). Google Docs API website. Retrieved December 16, 2010 from
  13. Huang Y. and Evans D. (2010). Secure Google Docs Extension website. Retrieved December 16, 2010 from http://www.mightbeevil.org/securedocs/.
  14. Huang Y. and Evans D. (2010). Secure Google Docs Extension website. Retrieved December 16, 2010 from http://www.mightbeevil.org/securedocs/.
  15. Lederer, S., Hong, J. I., Dey, A. K. and Landay, J. A (2004). Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing 8/ 6, pp. 440-54.
  16. Lederer, S., Hong, J. I., Dey, A. K. and Landay, J. A (2004). Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing 8/ 6, pp. 440-54.
  17. Nadeem, A. and Javed, M.Y. (2005). A Performance Comparison of Data Encryption Algorithms. In Information and Communication Technologies 2005, ICICT 2005, Cairo, Egypt
  18. Nadeem, A. and Javed, M.Y. (2005). A Performance Comparison of Data Encryption Algorithms. In Information and Communication Technologies 2005, ICICT 2005, Cairo, Egypt
  19. O'Reilly, T. (2004). The Fuss About Gmail and Privacy: Nine Reasons Why It's Bogus. Retrieved December 16, 2010 from http://oreillynet.com/pub/wlg/4707.
  20. O'Reilly, T. (2004). The Fuss About Gmail and Privacy: Nine Reasons Why It's Bogus. Retrieved December 16, 2010 from http://oreillynet.com/pub/wlg/4707.
  21. O'Reilly, T. (2007). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. Communications & Strategies, 1st Quarter 2007, p. 17.
  22. O'Reilly, T. (2007). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. Communications & Strategies, 1st Quarter 2007, p. 17.
  23. Park H., Lee K., Lee Y., Kim S. and Won D (2009). Security Analysis on the Online Office and Proposal of the Evaluation Criteria. World Academy of Science, Engineering and Technology. Issue 59, pp. 198-204.
  24. Park H., Lee K., Lee Y., Kim S. and Won D (2009). Security Analysis on the Online Office and Proposal of the Evaluation Criteria. World Academy of Science, Engineering and Technology. Issue 59, pp. 198-204.
  25. Rinne, S., Eisenbarth, T. and Paar, C. (2007). Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers. In ECRYPT Workshop SPEED - Software Performance Enhancement for Encryption and Decryption, Amsterdam, Netherlands.
  26. Rinne, S., Eisenbarth, T. and Paar, C. (2007). Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers. In ECRYPT Workshop SPEED - Software Performance Enhancement for Encryption and Decryption, Amsterdam, Netherlands.
  27. Ristenpart, T., Tromer. E., Shacham, H. and Savage S. (2009). Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS'09: Proceedings of, the 16th ACM Conf. on Computer and Comm. Security, pp. 199-212.
  28. Ristenpart, T., Tromer. E., Shacham, H. and Savage S. (2009). Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS'09: Proceedings of, the 16th ACM Conf. on Computer and Comm. Security, pp. 199-212.
Download


Paper Citation


in Harvard Style

Adkinson-Orellana L., A. Rodríguez-Silva D., J. González-Castaño F. and González-Martínez D. (2011). SHARING SECURE DOCUMENTS IN THE CLOUD - A Secure Layer for Google Docs . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 439-444. DOI: 10.5220/0003391904390444


in Harvard Style

Adkinson-Orellana L., A. Rodríguez-Silva D., J. González-Castaño F. and González-Martínez D. (2011). SHARING SECURE DOCUMENTS IN THE CLOUD - A Secure Layer for Google Docs . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 439-444. DOI: 10.5220/0003391904390444


in Bibtex Style

@conference{closer11,
author={Lilian Adkinson-Orellana and Daniel A. Rodríguez-Silva and Francisco J. González-Castaño and David González-Martínez},
title={SHARING SECURE DOCUMENTS IN THE CLOUD - A Secure Layer for Google Docs},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={439-444},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003391904390444},
isbn={978-989-8425-52-2},
}


in Bibtex Style

@conference{closer11,
author={Lilian Adkinson-Orellana and Daniel A. Rodríguez-Silva and Francisco J. González-Castaño and David González-Martínez},
title={SHARING SECURE DOCUMENTS IN THE CLOUD - A Secure Layer for Google Docs},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={439-444},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003391904390444},
isbn={978-989-8425-52-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - SHARING SECURE DOCUMENTS IN THE CLOUD - A Secure Layer for Google Docs
SN - 978-989-8425-52-2
AU - Adkinson-Orellana L.
AU - A. Rodríguez-Silva D.
AU - J. González-Castaño F.
AU - González-Martínez D.
PY - 2011
SP - 439
EP - 444
DO - 10.5220/0003391904390444


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - SHARING SECURE DOCUMENTS IN THE CLOUD - A Secure Layer for Google Docs
SN - 978-989-8425-52-2
AU - Adkinson-Orellana L.
AU - A. Rodríguez-Silva D.
AU - J. González-Castaño F.
AU - González-Martínez D.
PY - 2011
SP - 439
EP - 444
DO - 10.5220/0003391904390444