Monday, 12 Jan 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > Security gaps found in encrypted cloud storage services
Cloud Computing

Security gaps found in encrypted cloud storage services

Last updated: November 2, 2024 3:25 am
Published November 2, 2024
Share
Security gaps found in encrypted cloud storage services
SHARE

Researchers from ETH Zurich have uncovered significant security vulnerabilities in a number of broadly used end-to-end encrypted (E2EE) cloud storage providers.

The cryptographic flaws may permit attackers to bypass encryption, compromise file confidentiality, tamper with information, and even inject unauthorised information into customers’ storage.

The research analysed 5 E2EE cloud storage suppliers—Sync, pCloud, Seafile, Icedrive, and Tresorit—which collectively serve an estimated 22 million customers worldwide. Every of the providers guarantees sturdy encryption to safeguard information from unauthorised entry, even by the service supplier.

Nevertheless, researchers Jonas Hofmann and Kien Tuong Truong found that 4 of the 5 have extreme flaws that may weaken protections. Introduced on the ACM Convention on Pc and Communications Safety (CCS), their findings spotlight potential gaps within the E2EE safety guarantees made by suppliers.

Tresorit stands out however isn’t flawless

Of the providers examined, Tresorit demonstrated the fewest vulnerabilities, with solely minor dangers of metadata tampering and non-authentic keys throughout file sharing. Though much less extreme, these points may nonetheless pose dangers in sure eventualities. In distinction, the opposite 4 providers exhibited extra substantial safety gaps, rising the possibilities of information publicity or tampering.

Key vulnerabilities and real looking threats to E2EE

To guage the power of E2EE safety, researchers examined ten totally different assault eventualities, assuming the attacker had already gained management over a cloud server with permissions to learn, modify, or inject information. Although this stage of entry is unlikely, the research contends that E2EE ought to be efficient even underneath such circumstances. Some notable vulnerabilities are:

  • Unauthenticated Key Materials: Each Sync and pCloud have been discovered to have unauthenticated encryption keys, permitting attackers to insert their very own keys, decrypt information, and entry delicate information.
  • Public key substitution: Sync and Tresorit have been susceptible to unauthorised key alternative throughout file sharing, permitting attackers to intercept or change information.
  • Protocol downgrade assault: The protocols utilized by Seafile allowed for a downgrade to weaker encryption requirements, making it extra susceptible to brute-force assaults.
See also  How to Select the Right Cloud GPU Instance for Deploying AI Models

Different dangers have been recognized in Icedrive and Seafile, which used unauthenticated encryption modes, permitting attackers to change and corrupt file contents. Moreover, vulnerabilities within the “chunking” course of throughout a number of providers may compromise file integrity by permitting attackers to reorder, take away, or alter file items.

Supplier gives responses and subsequent steps

In April 2024, the researchers shared their findings with Sync, pCloud, Seafile, and Icedrive, adopted by Tresorit in September. Responses diversified, with Sync and pCloud but to reply, Seafile getting ready to patch the protocol downgrade subject, and Icedrive declining to deal with the considerations. Tresorit acknowledged receipt however declined to talk extra.

In line with a latest BleepingComputer report, Sync indicated that they’re “fast-tracking fixes” and have already resolved a number of the documented information leak points with file-sharing hyperlinks.

ETH Zurich researchers imagine these safety flaws are widespread throughout many E2EE cloud storage platforms, underscoring the necessity for additional investigation and a standardised protocol to make sure safe encryption within the trade.

(Picture by Roman)

See additionally: Why corporations proceed to wrestle with cloud visibility – and code vulnerabilities

Wish to be taught extra about cybersecurity and the cloud from trade leaders? Try Cyber Security & Cloud Expo happening in Amsterdam, California, and London. Discover different upcoming enterprise expertise occasions and webinars powered by TechForge here.

Tags: cloud, Cloud Safety, cybersecurity, Safety

Source link

TAGGED: cloud, encrypted, Gaps, security, services, Storage
Share This Article
Twitter Email Copy Link Print
Previous Article trading How Does Capital Markets Software Boost Tech Adoption?
Next Article Drone with its own 'nervous system' trialed by scientists Drone with its own ‘nervous system’ trialed by scientists
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Smart Spatial and Hyperview unite

Good Spatial is worked up to announce its partnership with Hyperview, the main cloud-based DCIM…

January 17, 2025

Chartis Receives Majority Investment from Blackstone

Chartis, a Chicago, IL-based healthcare advisory agency, entered right into a definitive settlement to obtain…

August 14, 2024

IBM Cloud delivers enterprise sovereign cloud capabilities

As we see enterprises more and more face geographic necessities round sovereignty, IBM Cloud® is…

February 23, 2024

Arsenal Capital Partners to Acquire Knowtion Health

Arsenal Capital Partners, a NYC-based non-public fairness agency specializing in constructing technology-rich healthcare and industrial…

August 25, 2024

Niural Raises $31M in Series A Funding

Niural, a NYC-based AI-native world PEO (Skilled Employment Group) for fast-growing corporations, raised $31m in Collection A funding. The…

June 27, 2025

You Might Also Like

Engineer
Global Market

AI, edge, and security: Shaping the need for modern infrastructure management

By saad
Best 5 AI semantic reasoning tools for databases
Cloud Computing

Best 5 AI semantic reasoning tools for databases

By saad
Aumovio turns to cloud computing to scale autonomous vehicle testing
Cloud Computing

Aumovio turns to the cloud to scale autonomous vehicle testing

By saad
From cloud to factory – humanoid robots coming to workplaces
AI

From cloud to factory – humanoid robots coming to workplaces

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.