• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » What is Deniable Encryption in Cloud Storage?

By Abhishek Ghosh March 18, 2019 6:40 pm Updated on March 18, 2019

What is Deniable Encryption in Cloud Storage?

Advertisement

Deniable Encryption is like tit for tat. Let us as assume, you want to decipher an encrypted file of your enemy. If an encrypted file gives you wrong information, you are likely to miss it. The required effort to find the correct file will consume too much time. Deniable encryption is a type of encryption that allows to convincingly deny that usable data is encrypted or keeps no way to be able to decipher real data.

Deniable Encryption

As for example, a plain text file with the need to hide content from goverment may face an adversary where goverment can prove that the plaintext data exists. Instead, they will get useless dummy text files.

Normally, an encrypted text can be deciphered into a single simple text. The deniable encryption allows the user to decipher the encrypted text and produce, if necessary, a different simple text that functions as a decoy. The attacker, although in a condition to force the production of a simple text, can not reveal any difference between the true text and the alternative text. The user can always defend himself by choosing, from time to time, which of the texts to produce from the same encrypted text. The concept of “deniable encryption” was used by Julian Assange and Ralf Weinmann in 1996.

Advertisement

---

Modern techniques of deniable encryption exploit the pseudorandom permutation properties of block ciphers, by which it is not possible to prove that the ciphertext does not coincide with random data generated by a cryptographically secure pseudo-random number generator. Some decoy data is also used, which the user supposedly wants to keep secret and which will be revealed in case of attack, stating that this is all there is. This form of deniable encryption is sometimes referred to as steganography.

Another example of deniable encryption is the encrypted file system that uses the concept of abstract levels, where each level is encrypted with a different key, and special additional levels, with a “chaff” function, full of random data. The user stores decoy files in one or more levels and denies the existence of other levels with hidden files, stating that the rest of the space is occupied only by chaff levels. Physically, these file systems are stored in a single directory and all files have the same size and random timestamp. The names are random – if they belong to chaff levels – or they are cryptographic hashes of the strings that identify the blocks. The Rubberhose and PhoneBookFS file system uses this approach.

Another method, used by some disk encryption software, is the creation of a second encrypted volume within a container volume. The container volume is formatted with random encrypted data and then initialized with a file system that the user fills with credible sensitive data. Then a second hidden and encrypted volume is inserted internally into the container volume, in which the user stores secret data. As in the other examples, the protection of the encrypted volume brings origin of the pseudo-random permutation properties of the ciphers by blocks.

The integrity of the encrypted volume depends on the possibility of not increasing the size of the data contained in the container volume until overwriting the hidden space assigned to the internal encryption. Perhaps it may be necessary to “freeze” the container volume in time to preserve that hidden, running the risk of making it suspect in consequence of the timestamps of the last access and modification never more updated. FreeOTFE and BestCrypt can contain more encrypted volumes inside a container volume; TrueCrypt is limited to a hidden volume.

The denial, although false, can not be verified by the attacker without the cooperation of the user, who might not really be able to decipher the data. The deniable encryption serves to undermine the attacker’s confidence and his doubt becomes another form of protection.

Using cloud storage have grown too higher. For the sake of privacy, some of the cloud storage encryption schemas has been proposed to secure the data from the unwanted. Such schemes assume that providers are secure and are not hackable. Since govermental agencies can not guess whether the obtained secrets are true or false, the providers may ensure that the users’ privacy is securely provided. The deniable encryption schemes rely on the fact that the cloud storage service providers handling key management are trusted. However interception of the communication between the users and cloud storage providers compel storage providers to release user secrets. In such case the encrypted data are assumed to be known and storage providers. Deniable schemes are built to form an audit free cloud storage service. The deniability makes the effort of coercion invalid.

The existence of hidden encrypted data may be revealed by flaws in the implementation, watermarking attack, leaking into non-encrypted disk space. Deniable encryption does not defend users from revealing keys under coercion. Possession of deniable encryption tools could lead the attackers to continue the exploits.

This Article Has Been Shared 552 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What is Deniable Encryption in Cloud Storage?

  • Pricing War in Cloud Computing Storage Started Again

    Like We Have Seen In The Past, Pricing War in Cloud Computing Storage Started Again. A Downward Pricing For The Next 18 Months is Predicted.

  • Integration of Apache Hadoop With OpenStack Swift

    The Topic Integration of Apache Hadoop With OpenStack Swift Is Not Exactly New. You Can Follow Our Guide Specially For Handling OpenStack.

  • Cheapest CDNs With HTTPS, IPv6, HTTP/2, Brotli

    What Are The Cheapest CDNs With HTTPS, IPv6, HTTP/2, Brotli Support At This Moment? For A Website Origin Pull Is Preferred Over Origin Push.

  • Object Storage vs. Block Storage

    Block storage is as simple as like normal hard drives. In object storage, storage architecture manages data as objects. Both has pros & cons.

  • Methods of Encryption in Cloud Object Storage : OpenStack & IBM Cloud

    Here Are Some Methods of Encryption in Cloud Object Storage. Examples Given With OpenStack & IBM Cloud, Although the Technology Behind is Complex for IBM.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (22.1K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Samsung Galaxy S22 Ultra: Long Term Review June 30, 2022
  • How to Make the Most of Your S Pen (S22 Ultra) June 29, 2022
  • Safe Chargers for Samsung Galaxy S22 Ultra June 27, 2022
  • How Telecoms Can Use The Cloud To Power Their 5G Network June 24, 2022
  • A Beginner Guide to Cloud Computing for Development June 22, 2022

About This Article

Cite this article as: Abhishek Ghosh, "What is Deniable Encryption in Cloud Storage?," in The Customize Windows, March 18, 2019, July 1, 2022, https://thecustomizewindows.com/2019/03/what-is-deniable-encryption-in-cloud-storage/.

Source:The Customize Windows, JiMA.in

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Privacy Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2022 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy