Your Cloud in My Company: Modern Rights Management Services Revisited
We provide a security analysis of modern Enterprise Rights Management (ERM) solutions and reveal security threats. We first take a look on Microsoft Azure, and discuss severe attack surfaces that companies enabling Azure in their own trusted infrastructure have to take care of. In addition, we analy...
Saved in:
Published in | 2016 11th International Conference on Availability, Reliability and Security (ARES) pp. 217 - 222 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | We provide a security analysis of modern Enterprise Rights Management (ERM) solutions and reveal security threats. We first take a look on Microsoft Azure, and discuss severe attack surfaces that companies enabling Azure in their own trusted infrastructure have to take care of. In addition, we analyze Tresorit, one of the most frequently used End-to-End encrypted cloud storage systems. Tresorit can use Azure and its Rights Management Services (RMS) module as an additional security layer: a user should be able to either trust Tresorit or Azure. Our systematic evaluation reveals a serious breach to their security architecture: we show that the whole security of Tresorit RMS relies on Tresorit being trusted, independent of trusting Azure. |
---|---|
AbstractList | We provide a security analysis of modern Enterprise Rights Management (ERM) solutions and reveal security threats. We first take a look on Microsoft Azure, and discuss severe attack surfaces that companies enabling Azure in their own trusted infrastructure have to take care of. In addition, we analyze Tresorit, one of the most frequently used End-to-End encrypted cloud storage systems. Tresorit can use Azure and its Rights Management Services (RMS) module as an additional security layer: a user should be able to either trust Tresorit or Azure. Our systematic evaluation reveals a serious breach to their security architecture: we show that the whole security of Tresorit RMS relies on Tresorit being trusted, independent of trusting Azure. |
Author | Kaiser, Jan Schwenk, Jorg Grothe, Martin Jupke, Johanna Rosler, Paul Mainka, Christian |
Author_xml | – sequence: 1 givenname: Martin surname: Grothe fullname: Grothe, Martin email: martin.grothe@rub.de organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany – sequence: 2 givenname: Christian surname: Mainka fullname: Mainka, Christian email: paul.roesler@rub.de organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany – sequence: 3 givenname: Paul surname: Rosler fullname: Rosler, Paul email: johanna.jupke@rub.de organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany – sequence: 4 givenname: Johanna surname: Jupke fullname: Jupke, Johanna email: jan.kaiser-e5q@rub.de organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany – sequence: 5 givenname: Jan surname: Kaiser fullname: Kaiser, Jan email: christian.mainka@rub.de organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany – sequence: 6 givenname: Jorg surname: Schwenk fullname: Schwenk, Jorg email: joerg.schwenk@rub.de organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany |
BookMark | eNotzMFKwzAYAOAICrq5mzcveYHW_GnSJt5GqVNYETo9eBpp8mdG1nS03aBv70FP3-1bkOvYRyTkAVgKwPTTuql2KWeQp7m-IguQTDOmNctvyWocfxhjoHMFPLsj1Vd_Hmh57M-OhkjrmZZ9dzJxfqZ173CItAmH72mktYnmgB3Gie5wuASLI23wEsYwobsnN94cR1z9uySfL9VH-Zps3zdv5XqbBCjklBTAheBWuxa4BM-4ah1YZYVTxkhAj145aQ0HUXDphW-FzTOhTA6ctV5nS_L49wZE3J-G0Jlh3heFErLIsl_NXkmy |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ARES.2016.69 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 1509009906 9781509009909 |
EndPage | 222 |
ExternalDocumentID | 7784573 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIB RIC RIE RIL |
ID | FETCH-LOGICAL-i175t-712442c9db1251f028bd1c8c4d8aa51efef8d5ca214725f4fb4c6348a6120bf93 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:38:08 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-712442c9db1251f028bd1c8c4d8aa51efef8d5ca214725f4fb4c6348a6120bf93 |
PageCount | 6 |
ParticipantIDs | ieee_primary_7784573 |
PublicationCentury | 2000 |
PublicationDate | 2016-Aug. |
PublicationDateYYYYMMDD | 2016-08-01 |
PublicationDate_xml | – month: 08 year: 2016 text: 2016-Aug. |
PublicationDecade | 2010 |
PublicationTitle | 2016 11th International Conference on Availability, Reliability and Security (ARES) |
PublicationTitleAbbrev | ARES |
PublicationYear | 2016 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001968123 |
Score | 1.6662027 |
Snippet | We provide a security analysis of modern Enterprise Rights Management (ERM) solutions and reveal security threats. We first take a look on Microsoft Azure, and... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 217 |
SubjectTerms | Azure Cloud Cloud computing Companies Copyright protection Cryptography ERM RMS Servers Tresorit |
Title | Your Cloud in My Company: Modern Rights Management Services Revisited |
URI | https://ieeexplore.ieee.org/document/7784573 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3mauom_ycGj7bo2aRJvMjaGMJHhYLfR_IKhdDLbg_71Jmm7gnjwFnpJ-8LL9yX93vsA7riMmUmY67GPeYDTmAYi5SQgUZSlgmNDvdfh4jmdr_DTmqw7cH-ohdFae_GZDt3Q_8tXO1m6q7IRpQwTmnShSzmvarXa-xTuOmklB207Hz3aT3DarTT0aubWO8VDx6wPi2bSSjHyFpaFCOX3r36M_32rYxi2RXro5QA_J9DR-Sn0G5cGVCftAKY2ofdo8r4rFdrmaPGF6j3gAVVGaGjpDuifqFXCoGYHQUtffG5Z6RBWs-nrZB7U5gnB1jKCIqAOuGPJlXAUxlgaIdRYMokVyzIy1kYbpojMnE9RTAw2Ass0wSyzlCcShidn0Mt3uT4HFBGdSIf8qbDHMerirFXMjREiUmYsLmDgorL5qPpjbOqAXP79-AqO3KJUIrpr6BX7Ut9YYC_ErV_RH0deoqc |
link.rule.ids | 310,311,783,787,792,793,799,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH5BPOgJFYy_7cGjG2PrutabIRBURgyBhBtZfyVEMwxuB_3rbbfBEuPBW7NLt9e8fl-7770P4I4Jn-qA2h77mDmY-JHDCQud0PMSwhnWUeF1GE_IaI6fF-GiAfe7WhilVCE-U64dFv_y5Vrk9qqsG0UUh1GwB_uGV1NSVmvVNyrM9tIKdup21n00H2HVW8Qt9My1e0oBHsMWxNtpS83Im5tn3BXfvzoy_ve9jqBTl-mh1x0AHUNDpSfQ2vo0oCpt2zAwKb1B_fd1LtEqRfEXqnaBB1RaoaGpPaJ_oloLg7Z7CJoW5eeGl3ZgPhzM-iOnsk9wVoYTZE5kodsXTHJLYrQhElz2BBVY0iQJe0orTWUoEutU5Icaa44FCTBNDOnxuGbBKTTTdarOAHmhCoTFfsLNgSyycVbSZ1pz7knd4-fQtlFZfpQdMpZVQC7-fnwLB6NZPF6OnyYvl3BoF6iU1F1BM9vk6trAfMZvitX9AfeDpfI |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+11th+International+Conference+on+Availability%2C+Reliability+and+Security+%28ARES%29&rft.atitle=Your+Cloud+in+My+Company%3A+Modern+Rights+Management+Services+Revisited&rft.au=Grothe%2C+Martin&rft.au=Mainka%2C+Christian&rft.au=Rosler%2C+Paul&rft.au=Jupke%2C+Johanna&rft.date=2016-08-01&rft.pub=IEEE&rft.spage=217&rft.epage=222&rft_id=info:doi/10.1109%2FARES.2016.69&rft.externalDocID=7784573 |