• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » What is Deniable Encryption in Cloud Storage?

By Abhishek Ghosh March 18, 2019 6:40 pm Updated on March 18, 2019

What is Deniable Encryption in Cloud Storage?

Advertisement

Deniable Encryption is like tit for tat. Let us as assume, you want to decipher an encrypted file of your enemy. If an encrypted file gives you wrong information, you are likely to miss it. The required effort to find the correct file will consume too much time. Deniable encryption is a type of encryption that allows to convincingly deny that usable data is encrypted or keeps no way to be able to decipher real data.

Deniable Encryption

As for example, a plain text file with the need to hide content from goverment may face an adversary where goverment can prove that the plaintext data exists. Instead, they will get useless dummy text files.

Normally, an encrypted text can be deciphered into a single simple text. The deniable encryption allows the user to decipher the encrypted text and produce, if necessary, a different simple text that functions as a decoy. The attacker, although in a condition to force the production of a simple text, can not reveal any difference between the true text and the alternative text. The user can always defend himself by choosing, from time to time, which of the texts to produce from the same encrypted text. The concept of “deniable encryption” was used by Julian Assange and Ralf Weinmann in 1996.

Advertisement

---

Modern techniques of deniable encryption exploit the pseudorandom permutation properties of block ciphers, by which it is not possible to prove that the ciphertext does not coincide with random data generated by a cryptographically secure pseudo-random number generator. Some decoy data is also used, which the user supposedly wants to keep secret and which will be revealed in case of attack, stating that this is all there is. This form of deniable encryption is sometimes referred to as steganography.

Another example of deniable encryption is the encrypted file system that uses the concept of abstract levels, where each level is encrypted with a different key, and special additional levels, with a “chaff” function, full of random data. The user stores decoy files in one or more levels and denies the existence of other levels with hidden files, stating that the rest of the space is occupied only by chaff levels. Physically, these file systems are stored in a single directory and all files have the same size and random timestamp. The names are random – if they belong to chaff levels – or they are cryptographic hashes of the strings that identify the blocks. The Rubberhose and PhoneBookFS file system uses this approach.

Another method, used by some disk encryption software, is the creation of a second encrypted volume within a container volume. The container volume is formatted with random encrypted data and then initialized with a file system that the user fills with credible sensitive data. Then a second hidden and encrypted volume is inserted internally into the container volume, in which the user stores secret data. As in the other examples, the protection of the encrypted volume brings origin of the pseudo-random permutation properties of the ciphers by blocks.

The integrity of the encrypted volume depends on the possibility of not increasing the size of the data contained in the container volume until overwriting the hidden space assigned to the internal encryption. Perhaps it may be necessary to “freeze” the container volume in time to preserve that hidden, running the risk of making it suspect in consequence of the timestamps of the last access and modification never more updated. FreeOTFE and BestCrypt can contain more encrypted volumes inside a container volume; TrueCrypt is limited to a hidden volume.

The denial, although false, can not be verified by the attacker without the cooperation of the user, who might not really be able to decipher the data. The deniable encryption serves to undermine the attacker’s confidence and his doubt becomes another form of protection.

Using cloud storage have grown too higher. For the sake of privacy, some of the cloud storage encryption schemas has been proposed to secure the data from the unwanted. Such schemes assume that providers are secure and are not hackable. Since govermental agencies can not guess whether the obtained secrets are true or false, the providers may ensure that the users’ privacy is securely provided. The deniable encryption schemes rely on the fact that the cloud storage service providers handling key management are trusted. However interception of the communication between the users and cloud storage providers compel storage providers to release user secrets. In such case the encrypted data are assumed to be known and storage providers. Deniable schemes are built to form an audit free cloud storage service. The deniability makes the effort of coercion invalid.

The existence of hidden encrypted data may be revealed by flaws in the implementation, watermarking attack, leaking into non-encrypted disk space. Deniable encryption does not defend users from revealing keys under coercion. Possession of deniable encryption tools could lead the attackers to continue the exploits.

This Article Has Been Shared 295 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What is Deniable Encryption in Cloud Storage?

  • Pricing War in Cloud Computing Storage Started Again

    Like We Have Seen In The Past, Pricing War in Cloud Computing Storage Started Again. A Downward Pricing For The Next 18 Months is Predicted.

  • Integration of Apache Hadoop With OpenStack Swift

    The Topic Integration of Apache Hadoop With OpenStack Swift Is Not Exactly New. You Can Follow Our Guide Specially For Handling OpenStack.

  • Cheapest CDNs With HTTPS, IPv6, HTTP/2, Brotli

    What Are The Cheapest CDNs With HTTPS, IPv6, HTTP/2, Brotli Support At This Moment? For A Website Origin Pull Is Preferred Over Origin Push.

  • Object Storage vs. Block Storage

    Block storage is as simple as like normal hard drives. In object storage, storage architecture manages data as objects. Both has pros & cons.

  • Methods of Encryption in Cloud Object Storage : OpenStack & IBM Cloud

    Here Are Some Methods of Encryption in Cloud Object Storage. Examples Given With OpenStack & IBM Cloud, Although the Technology Behind is Complex for IBM.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • The Importance of Voice and Style in Essay Writing April 1, 2023
  • What Online Casinos Have No Deposit Bonus in Australia March 30, 2023
  • Four Foolproof Tips To Never Run Out Of Blog Ideas For Your Website March 28, 2023
  • The Interactive Entertainment Serving as a Tech Proving Ground March 28, 2023
  • Is it Good to Run Apache Web server and MySQL Database on Separate Cloud Servers? March 27, 2023

About This Article

Cite this article as: Abhishek Ghosh, "What is Deniable Encryption in Cloud Storage?," in The Customize Windows, March 18, 2019, April 1, 2023, https://thecustomizewindows.com/2019/03/what-is-deniable-encryption-in-cloud-storage/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT