{"id":932,"date":"2024-10-24T20:54:01","date_gmt":"2024-10-25T02:54:01","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=932"},"modified":"2024-10-24T20:54:05","modified_gmt":"2024-10-25T02:54:05","slug":"vulnerabilities-in-e2ee-cloud-storage","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/24\/vulnerabilities-in-e2ee-cloud-storage\/","title":{"rendered":"Vulnerabilities in E2EE Cloud Storage"},"content":{"rendered":"\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img decoding=\"async\" width=\"1024\" height=\"574\" class=\"wp-block-cover__image-background wp-image-945 lazyload\" alt=\"\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/broken-cloud-security-1024x574.jpg\" data-object-fit=\"cover\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/broken-cloud-security-1024x574.jpg 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/broken-cloud-security-300x168.jpg 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/broken-cloud-security-768x430.jpg 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/broken-cloud-security.jpg 1080w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/574;\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-left has-large-font-size\">Vulnerabilities in E2EE Cloud Storage<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"574\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/cloud-E2EE-1024x574.jpg\" alt=\"\" class=\"wp-image-947 lazyload\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/574;width:289px;height:auto\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/cloud-E2EE-1024x574.jpg 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/cloud-E2EE-300x168.jpg 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/cloud-E2EE-768x431.jpg 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/cloud-E2EE-1536x861.jpg 1536w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/cloud-E2EE-1568x879.jpg 1568w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/cloud-E2EE.jpg 1600w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<p>During ACM CCS 2024, held October 14-18, 2024, researchers from ETH Zurich, Jonas Hofmann and Kien Tuong Truong, indicated severe security flaws in the end-to-end encryption (E2EE) systems of several cloud storage service providers. These flaws can pose a significant threat to user information and undermine the promised security standards of those providers.<\/p>\n\n\n\n<p>The research studied five cloud storage service providers: Sync, pCloud, Icedrive, Seafile, and Tresorit, with over 22 million users. The academics investigated these cloud service companies and found them vulnerable to various types of attacks, including unauthorized access to key material, protocol downgrades, and data tampering. However, some of the companies have acknowledged the issue and are considering addressing it, while others, such as Icedrive, have publicly stated their intention not to fix the vulnerabilities. This raises concerns for E2EE cloud storage users regarding the use of cloud storage services with proper data privacy and security.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">End-to-end encryption&nbsp;(E2EE)<\/h5>\n\n\n\n<p>In E2EE only the sender and receiver can read or modify the content as they have the only relevant keys, and it uses private communication using Public key encryption based on two keys instead of one: a public key and a private key. E2EE is a type of messaging that keeps messages private from everyone, including the messaging service (cloud service provider). When E2EE is used the message only exists in decrypted form for the sender and receiver. It\u2019s like a letter goes over the mail in a sealed envelope.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"2048\" height=\"1024\" data-id=\"948\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/EndToEndEncryp_Aug24-2048x1024-1.jpg\" alt=\"\" class=\"wp-image-948 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/EndToEndEncryp_Aug24-2048x1024-1.jpg 2048w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/EndToEndEncryp_Aug24-2048x1024-1-300x150.jpg 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/EndToEndEncryp_Aug24-2048x1024-1-1024x512.jpg 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/EndToEndEncryp_Aug24-2048x1024-1-768x384.jpg 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/EndToEndEncryp_Aug24-2048x1024-1-1536x768.jpg 1536w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/EndToEndEncryp_Aug24-2048x1024-1-1568x784.jpg 1568w\" data-sizes=\"(max-width: 2048px) 100vw, 2048px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 2048px; --smush-placeholder-aspect-ratio: 2048\/1024;\" \/><\/figure>\n<\/figure>\n\n\n\n<p>Image: E2EE Scenario showing encrypted movement between sender and receiver  <\/p>\n\n\n\n<p><strong>Description of the protocol and key hierarchy used by those five providers<\/strong><\/p>\n\n\n\n<p>Considering protocols due to the dependence on a user-chosen password \u03c1 (generally dissimilar from the one used to validate for the server) -derived key material, the security of the systems researcher\u2019s analysis is highly dependent on the strength of the user\u2019s password. A malicious provider can always attempt an offline brute-force attack or a dictionary attack to recover a password, which is a fundamental limitation of password-based encryption. Good password policies along with multifactor authentication and the usage of a memory-hard password hashing function help to mitigate this risk.<\/p>\n\n\n\n<p>The Key hierarchies for those providers are summarized in the following figure:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"624\" height=\"271\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-14.png\" alt=\"\" class=\"wp-image-936 lazyload\" style=\"--smush-placeholder-width: 624px; --smush-placeholder-aspect-ratio: 624\/271;width:871px;height:auto\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-14.png 624w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-14-300x130.png 300w\" data-sizes=\"(max-width: 624px) 100vw, 624px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/figure>\n\n\n\n<p><strong>Figure 1: <\/strong>Key hierarchies of all providers researched. Symbols shown \u2217 indicate a one-to-many relationship. All the key material that is not obtained from something else is indirectly generated using relevant suitable key generation functions.<\/p>\n\n\n\n<p><strong>Combination of attacks to test Confidentiality, Integrity and Availability (CIA)<\/strong><\/p>\n\n\n\n<p>The researchers tested 10 possible attacks against E2EE cloud storage services; all these activities would require the attacker to have already gained control of a server with the ability to read, modify and inject data. The researchers mentioned that they study this to be a convincing threat model for E2EE services, as these service industries are meant to protect files even if such a compromise has happened.<\/p>\n\n\n\n<p>These attacks were categorized into ten broad categories, which can compromise confidentiality, damage file data and metadata, and enable the injection of unauthorized files and directory manipulation.<\/p>\n\n\n\n<p>The researchers identified the following vulnerabilities:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unauthenticated key material (Sync and pCloud)<\/li>\n\n\n\n<li>Unauthenticated public keys (Sync and Tresorit)<\/li>\n\n\n\n<li>Protocol downgrade (Seafile),<\/li>\n\n\n\n<li>Link-sharing leakage (Sync)<\/li>\n\n\n\n<li>Use of unauthenticated encryption (Icedrive and Seafile)<\/li>\n\n\n\n<li>Unauthenticated chunking of contents (Icedrive , Seafile and pCloud)<\/li>\n\n\n\n<li>Tampering with content and details of files (Sync, pCloud, Seafile, and Icedrive)<\/li>\n\n\n\n<li>Tampering with file metadata (all five providers)<\/li>\n\n\n\n<li>Injection of folders (Sync, pCloud and Seafile)<\/li>\n\n\n\n<li>Injection of malicious files into a user&#8217;s storage (pCloud)<\/li>\n<\/ul>\n\n\n\n<p>In the following table the research findings are given:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"624\" height=\"217\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-15.png\" alt=\"\" class=\"wp-image-937 lazyload\" style=\"--smush-placeholder-width: 624px; --smush-placeholder-aspect-ratio: 624\/217;width:927px;height:auto\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-15.png 624w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-15-300x104.png 300w\" data-sizes=\"(max-width: 624px) 100vw, 624px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/figure>\n\n\n\n<p>Table 1: Summary of the providers examined with the attacks and leakages that affect them.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>This analysis could lead to the development of stronger and more secure key hierarchy models and protocols. It also highlights the need for a more comprehensive threat model specifically designed for E2EE cloud storage systems. The researchers highlighted that the identified flaws are not isolated incidents but rather indicative of a widespread problem within the E2EE cloud storage market. They asked for further analysis of deployed E2EE cloud storage systems to better understand and address existing challenges. Additionally, they promoted the development of a standardized protocol for secure E2EE cloud storage.<\/p>\n\n\n\n<p>The study revealed that these vulnerabilities originate from common cryptographic design flaws, affecting multiple providers in similar ways. This underscores the broader systemic issues within the development of E2EE cloud storage solutions. <\/p>\n\n\n\n<p>&#8220;However, our research demonstrates that the practical reality is quite different, and that the ecosystem is fundamentally flawed. Our findings strongly suggest that, in its current state, the ecosystem of E2EE cloud storage is largely broken and requires significant reevaluation of its foundations. &#8221; Hofmann and Tuong Truong advised.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>[1]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=\"https:\/\/brokencloudstorage.info\/paper.pdf\">https:\/\/brokencloudstorage.info\/paper.pdf<\/a><\/p>\n\n\n\n<p>[2]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=\"https:\/\/brokencloudstorage.info\/\">https:\/\/brokencloudstorage.info\/<\/a><\/p>\n\n\n\n<p>[3]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/severe-flaws-in-e2ee-cloud-storage-platforms-used-by-millions\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/severe-flaws-in-e2ee-cloud-storage-platforms-used-by-millions\/<\/a><\/p>\n\n\n\n<p>[4]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=\"https:\/\/www.cyberkendra.com\/2024\/10\/flaws-in-e2ee-cloud-storage-system.html#google_vignette\">https:\/\/www.cyberkendra.com\/2024\/10\/flaws-in-e2ee-cloud-storage-system.html#google_vignette<\/a><\/p>\n\n\n\n<p><strong>Image Link<\/strong> <a href=\"https:\/\/www.preveil.com\/wp-content\/uploads\/2024\/08\/EndToEndEncryp_Aug24-2048x1024.png\">https:\/\/www.preveil.com\/wp-content\/uploads\/2024\/08\/EndToEndEncryp_Aug24-2048&#215;1024.png<\/a><\/p>\n\n\n\n<p><strong>Figure 1<\/strong>, Link: <a href=\"https:\/\/brokencloudstorage.info\/paper.pdf\">https:\/\/brokencloudstorage.info\/paper.pdf<\/a><\/p>\n\n\n\n<p><strong>Table 1, <\/strong>Link: <a href=\"https:\/\/brokencloudstorage.info\/paper.pdf\">https:\/\/brokencloudstorage.info\/paper.pdf<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During ACM CCS 2024, held October 14-18, 2024, researchers from ETH Zurich, Jonas Hofmann and Kien Tuong Truong, indicated severe security flaws in the end-to-end encryption (E2EE) systems of several cloud storage service providers. These flaws can pose a significant threat to user information and undermine the promised security standards of those providers. The research &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/24\/vulnerabilities-in-e2ee-cloud-storage\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Vulnerabilities in E2EE Cloud Storage&#8221;<\/span><\/a><\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-932","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"FAHIM UDDIN","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/fahim-uddin\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=932"}],"version-history":[{"count":5,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/932\/revisions"}],"predecessor-version":[{"id":950,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/932\/revisions\/950"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}