Monday, 23 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > Security gaps found in encrypted cloud storage services
Cloud Computing

Security gaps found in encrypted cloud storage services

Last updated: November 2, 2024 3:25 am
Published November 2, 2024
Share
Security gaps found in encrypted cloud storage services
SHARE

Researchers from ETH Zurich have uncovered significant security vulnerabilities in a number of broadly used end-to-end encrypted (E2EE) cloud storage providers.

The cryptographic flaws may permit attackers to bypass encryption, compromise file confidentiality, tamper with information, and even inject unauthorised information into customers’ storage.

The research analysed 5 E2EE cloud storage suppliers—Sync, pCloud, Seafile, Icedrive, and Tresorit—which collectively serve an estimated 22 million customers worldwide. Every of the providers guarantees sturdy encryption to safeguard information from unauthorised entry, even by the service supplier.

Nevertheless, researchers Jonas Hofmann and Kien Tuong Truong found that 4 of the 5 have extreme flaws that may weaken protections. Introduced on the ACM Convention on Pc and Communications Safety (CCS), their findings spotlight potential gaps within the E2EE safety guarantees made by suppliers.

Tresorit stands out however isn’t flawless

Of the providers examined, Tresorit demonstrated the fewest vulnerabilities, with solely minor dangers of metadata tampering and non-authentic keys throughout file sharing. Though much less extreme, these points may nonetheless pose dangers in sure eventualities. In distinction, the opposite 4 providers exhibited extra substantial safety gaps, rising the possibilities of information publicity or tampering.

Key vulnerabilities and real looking threats to E2EE

To guage the power of E2EE safety, researchers examined ten totally different assault eventualities, assuming the attacker had already gained management over a cloud server with permissions to learn, modify, or inject information. Although this stage of entry is unlikely, the research contends that E2EE ought to be efficient even underneath such circumstances. Some notable vulnerabilities are:

  • Unauthenticated Key Materials: Each Sync and pCloud have been discovered to have unauthenticated encryption keys, permitting attackers to insert their very own keys, decrypt information, and entry delicate information.
  • Public key substitution: Sync and Tresorit have been susceptible to unauthorised key alternative throughout file sharing, permitting attackers to intercept or change information.
  • Protocol downgrade assault: The protocols utilized by Seafile allowed for a downgrade to weaker encryption requirements, making it extra susceptible to brute-force assaults.
See also  Revolutionising data centre sustainability with power capping

Different dangers have been recognized in Icedrive and Seafile, which used unauthenticated encryption modes, permitting attackers to change and corrupt file contents. Moreover, vulnerabilities within the “chunking” course of throughout a number of providers may compromise file integrity by permitting attackers to reorder, take away, or alter file items.

Supplier gives responses and subsequent steps

In April 2024, the researchers shared their findings with Sync, pCloud, Seafile, and Icedrive, adopted by Tresorit in September. Responses diversified, with Sync and pCloud but to reply, Seafile getting ready to patch the protocol downgrade subject, and Icedrive declining to deal with the considerations. Tresorit acknowledged receipt however declined to talk extra.

In line with a latest BleepingComputer report, Sync indicated that they’re “fast-tracking fixes” and have already resolved a number of the documented information leak points with file-sharing hyperlinks.

ETH Zurich researchers imagine these safety flaws are widespread throughout many E2EE cloud storage platforms, underscoring the necessity for additional investigation and a standardised protocol to make sure safe encryption within the trade.

(Picture by Roman)

See additionally: Why corporations proceed to wrestle with cloud visibility – and code vulnerabilities

Wish to be taught extra about cybersecurity and the cloud from trade leaders? Try Cyber Security & Cloud Expo happening in Amsterdam, California, and London. Discover different upcoming enterprise expertise occasions and webinars powered by TechForge here.

Tags: cloud, Cloud Safety, cybersecurity, Safety

Source link

TAGGED: cloud, encrypted, Gaps, security, services, Storage
Share This Article
Twitter Email Copy Link Print
Previous Article trading How Does Capital Markets Software Boost Tech Adoption?
Next Article Drone with its own 'nervous system' trialed by scientists Drone with its own ‘nervous system’ trialed by scientists
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

ghSMART Receives Minority Investment from KKR

ghSMART, a NYC-based management advisory agency, obtained a minority funding from KKR. Monetary phrases of…

July 18, 2025

Data Center Modernization: 6 Alternatives To Retrofits

When knowledge middle expertise can not meet efficiency, capability, or effectivity necessities, organizations should determine…

November 20, 2025

Moongate Raises $2.7M Seed Round to Develop a Modular Web3 Engagement Layer for Real-World Activations

Hong Kong, Hong Kong, April 2nd, 2024, Chainwire Moongate pronounces the closing of a $2.7M…

April 2, 2024

Dell Technologies expands AI capabilities with new edge collaborations

In a bid to reinforce AI deployment on the edge, Dell Applied sciences has introduced…

May 28, 2024

Vertiv and Oxigen collaborate | Data Centre Solutions

Vertiv is collaborating with Oxigen, a frontrunner in knowledge internet hosting, processing and distribution providers,…

February 20, 2025

You Might Also Like

The European Commission headquarters in Brussels (8)
Global Market

Beware hyperscalers’ ‘sovereignty washing,’ Euro cloud operators tell EU

By saad
Achieving success with the cloud continuum
Global Market

Democratising cloud skills could be Europe’s next competitive edge

By saad
NTT commits to billions in investment into DCs
Cloud Computing

NTT commits to billions in investment into DCs

By saad
Cloud demand shifts toward AI as enterprise usage deepens
Cloud Computing

Cloud demand shifts toward AI as enterprise usage deepens

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.