|  | 
| | Download PDFOpen PDF in browser Download PDFOpen PDF in browserSecuring Cloud Data Under Key ExposureEasyChair Preprint 127595 pages•Date: March 27, 2024AbstractRecent revelations of a sophisticated attackerhave underscored the vulnerability of data privacy, as they
 have been able to breach encryption by acquiring
 cryptographic keys through coercion or exploiting
 weaknesses in cryptographic software. Once these keys are
 compromised, the only recourse to safeguard data privacy is
 to restrict the attacker's access to the ciphertext. This can be
 achieved by dispersing fragments of the encrypted data
 across multiple servers in diverse administrative domains,
 assuming that the attacker cannot compromise all of them.
 Nevertheless, conventional encryption methods still leave
 data vulnerable, as an attacker with the encryption key can
 compromise a single server and gain access to the ciphertext
 blocks stored within it. In response to this pressing challenge,
 we introduce Bastion, a pioneering and efficient solution
 designed to protect data privacy even in the event of key
 exposure and an attacker's access to all ciphertext fragments.
 We scrutinize Bastion's security features and assess its
 performance through a prototype implementation.
 Additionally, we explore practical insights regarding the
 integration of Bastion into existing distributed storage
 systems. Our findings suggest that Bastion is well-suited for
 integration into current systems, as it incurs less than 5%
 overhead compared to existing semantically secure
 encryption modes.
 Keyphrases: Bastion, Cryptographic Keys, Encryption, Information Privacy. | 
 | 
|