Monday, 2 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > Security gaps found in encrypted cloud storage services
Cloud Computing

Security gaps found in encrypted cloud storage services

Last updated: November 2, 2024 3:25 am
Published November 2, 2024
Share
Security gaps found in encrypted cloud storage services
SHARE

Researchers from ETH Zurich have uncovered significant security vulnerabilities in a number of broadly used end-to-end encrypted (E2EE) cloud storage providers.

The cryptographic flaws may permit attackers to bypass encryption, compromise file confidentiality, tamper with information, and even inject unauthorised information into customers’ storage.

The research analysed 5 E2EE cloud storage suppliers—Sync, pCloud, Seafile, Icedrive, and Tresorit—which collectively serve an estimated 22 million customers worldwide. Every of the providers guarantees sturdy encryption to safeguard information from unauthorised entry, even by the service supplier.

Nevertheless, researchers Jonas Hofmann and Kien Tuong Truong found that 4 of the 5 have extreme flaws that may weaken protections. Introduced on the ACM Convention on Pc and Communications Safety (CCS), their findings spotlight potential gaps within the E2EE safety guarantees made by suppliers.

Tresorit stands out however isn’t flawless

Of the providers examined, Tresorit demonstrated the fewest vulnerabilities, with solely minor dangers of metadata tampering and non-authentic keys throughout file sharing. Though much less extreme, these points may nonetheless pose dangers in sure eventualities. In distinction, the opposite 4 providers exhibited extra substantial safety gaps, rising the possibilities of information publicity or tampering.

Key vulnerabilities and real looking threats to E2EE

To guage the power of E2EE safety, researchers examined ten totally different assault eventualities, assuming the attacker had already gained management over a cloud server with permissions to learn, modify, or inject information. Although this stage of entry is unlikely, the research contends that E2EE ought to be efficient even underneath such circumstances. Some notable vulnerabilities are:

  • Unauthenticated Key Materials: Each Sync and pCloud have been discovered to have unauthenticated encryption keys, permitting attackers to insert their very own keys, decrypt information, and entry delicate information.
  • Public key substitution: Sync and Tresorit have been susceptible to unauthorised key alternative throughout file sharing, permitting attackers to intercept or change information.
  • Protocol downgrade assault: The protocols utilized by Seafile allowed for a downgrade to weaker encryption requirements, making it extra susceptible to brute-force assaults.
See also  UK Government ranks data centres alongside NHS and power grid

Different dangers have been recognized in Icedrive and Seafile, which used unauthenticated encryption modes, permitting attackers to change and corrupt file contents. Moreover, vulnerabilities within the “chunking” course of throughout a number of providers may compromise file integrity by permitting attackers to reorder, take away, or alter file items.

Supplier gives responses and subsequent steps

In April 2024, the researchers shared their findings with Sync, pCloud, Seafile, and Icedrive, adopted by Tresorit in September. Responses diversified, with Sync and pCloud but to reply, Seafile getting ready to patch the protocol downgrade subject, and Icedrive declining to deal with the considerations. Tresorit acknowledged receipt however declined to talk extra.

In line with a latest BleepingComputer report, Sync indicated that they’re “fast-tracking fixes” and have already resolved a number of the documented information leak points with file-sharing hyperlinks.

ETH Zurich researchers imagine these safety flaws are widespread throughout many E2EE cloud storage platforms, underscoring the necessity for additional investigation and a standardised protocol to make sure safe encryption within the trade.

(Picture by Roman)

See additionally: Why corporations proceed to wrestle with cloud visibility – and code vulnerabilities

Wish to be taught extra about cybersecurity and the cloud from trade leaders? Try Cyber Security & Cloud Expo happening in Amsterdam, California, and London. Discover different upcoming enterprise expertise occasions and webinars powered by TechForge here.

Tags: cloud, Cloud Safety, cybersecurity, Safety

Source link

TAGGED: cloud, encrypted, Gaps, security, services, Storage
Share This Article
Twitter Email Copy Link Print
Previous Article trading How Does Capital Markets Software Boost Tech Adoption?
Next Article Drone with its own 'nervous system' trialed by scientists Drone with its own ‘nervous system’ trialed by scientists
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

New sustainable data centres under construction in Spain

Quetta Information Facilities, a undertaking by Azora in collaboration with Core Tech Capital, is ready to…

January 5, 2026

Accenture to Acquire Yumemi

Accenture (NYSE: ACN) is to accumulate Yumemi, a Tokyo, Japan-based supplier of digital providers and merchandise.…

May 10, 2025

AI model using AMD GPUs for training hits milestone

Zyphra, AMD, and IBM spent a yr testing whether or not AMD’s GPUs and platform…

November 25, 2025

Kyndryl signs three-year deal to manage Bord Gáis Energy’s entire hyperscaler and private cloud environment 

Kyndryl, an IT infrastructure companies supplier, has renewed its three-year settlement with Bord Gáis Vitality…

June 22, 2024

Will Artificial Intelligence Revolutionize DCIM? Maybe Not | DCN

People as of late are predicting that AI is poised to revolutionize nearly the whole…

February 21, 2024

You Might Also Like

5g cellular tower
Global Market

Cisco and AT&T partner for 5G IoT services

By saad
Juniper Networks
Global Market

Security hole could let hackers take over Juniper Networks PTX core routers

By saad
What is Famous Labs? Building an autonomous creation ecosystem
Cloud Computing

What is Famous Labs? Building an autonomous creation ecosystem

By saad
Genetec unveils UK data centre for Security Center SaaS
Colocation

Genetec unveils UK data centre for Security Center SaaS

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.