TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud

  • Julien Bringer
  • Beatriz Gallego
  • Ghassan Karame
  • Mathias Kohler
  • Panos Louridas
  • Melek ÖnenEmail author
  • Hubert Ritzdorf
  • Alessandro Sorniotti
  • David Vallejo
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 570)


While the revolutionary cloud computing paradigm offers substantial benefits to businesses, recent data breaches and the lack of dedicated end-to-end security solutions refrain the rapid adoption of this technology. The TREDISEC project aims at increasing trust in cloud computing by designing new security primitives ensuring data security and user privacy and supporting the underlying storage and computation technology at the same time.


Cloud security Data reduction Privacy Verifiability Multi-tenancy Access-control 



This work was supported by the TREDISEC project (G.A. no 644412), funded by the European Union (EU) under the Information and Communication Technologies (ICT) theme of the Horizon 2020 (H2020) research and innovation programme.


  1. 1.
    Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2008)Google Scholar
  2. 2.
    Azraoui, M., Elkhiyaoui, K., Molva, R., Önen, M.: StealthGuard: proofs of retrievability with hidden watchdogs. In: Proceedings of 19th European Symposium on Research in Computer Security (ESORICS), pp. 239–256 (2014)Google Scholar
  3. 3.
    Bellare, M., Keelveedhi, S., Ristenpart, T.: Dupless: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd USENIX Conference on Security, pp. 179–194 (2013)Google Scholar
  4. 4.
    Blasco, J., Di Pietro, R., Orfila, A., Sorniotti, A.: A tunable proof of ownership scheme for deduplication using bloom filters. In: Proceedings of IEEE Conference on Communications and Network Security (CNS), pp. 481–489 (2014)Google Scholar
  5. 5.
    Blass, E.-O., Di Pietro, R., Molva, R., Önen, M.: PRISM – privacy-preserving search in mapreduce. In: Fischer-Hübner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 180–200. Springer, Heidelberg (2012) CrossRefGoogle Scholar
  6. 6.
    Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 79–88. ACM (2006). ISBN 1-59593-518-5Google Scholar
  7. 7.
    Douceur, J.R., Adya, A., Bolosky, W.J., Simon, P., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: 22nd International Conference on Distributed Computing Systems, pp. 617–624. IEEE (2002)Google Scholar
  8. 8.
    Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 213–222 (2009)Google Scholar
  9. 9.
    Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, (CCS), pp. 491–500 (2011)Google Scholar
  10. 10.
    Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. In: IEEE Security and Privacy, pp. 40–47 (2010)Google Scholar
  11. 11.
    Jin, X., Krishnan, R., Sandhu, R.S.: A unified attribute-based access control model covering DAC, MAC and BAC. In: DBSec (2012)Google Scholar
  12. 12.
    Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: Ning, P., De Capitani di Vimercati, S., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 584–597. ACM (2007). ISBN 978-1-59593-703-2
  13. 13.
    Kerschbaum, F., Härterich, M., Grofig, P., Kohler, M., Schaad, A., Schröpfer, A., Tighzert, W.: Optimal re-encryption strategy for joins in encrypted databases. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 195–210. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  14. 14.
    Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: Proceedings of IEEE Conference on Communications Security (CCS) (2015)Google Scholar
  15. 15.
    Popa, R.A., Redfield, C.S., Zeldovich, N., Balakrishnan, H., Catherine, M.: Cryptdb: protecting confidentiality with encrypted query processing. In: Symposium on Operating Systems Principles (SOSP) (2011)Google Scholar
  16. 16.
    Puzio, P., Molva, R., Önen, M., Loureiro, S.: Cloudedup: secure deduplication with encrypted data for cloud storage. In: Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 363–370 (2013)Google Scholar
  17. 17.
    Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  18. 18.
    Storer, M.W., Greenan, K., DE Long, D., Miller, E.L.: Secure data deduplication. In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, pp. 1–10 (2008)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Julien Bringer
    • 1
  • Beatriz Gallego
    • 2
  • Ghassan Karame
    • 3
  • Mathias Kohler
    • 4
  • Panos Louridas
    • 5
  • Melek Önen
    • 6
    Email author
  • Hubert Ritzdorf
    • 7
  • Alessandro Sorniotti
    • 8
  • David Vallejo
    • 9
  1. 1.MORPHOParisFrance
  2. 2.ATOSBezonsFrance
  3. 3.NECHeidelbergGermany
  4. 4.SAPWeinheimGermany
  5. 5.GRNETAthinaGreece
  6. 6.EURECOMBiotFrance
  7. 7.ETHZZurichSwitzerland
  8. 8.IBMNew York CityUSA
  9. 9.ARSYSLogronoSpain

Personalised recommendations