Your Cloud in My Company: Modern Rights Management Services Revisited

We provide a security analysis of modern Enterprise Rights Management (ERM) solutions and reveal security threats. We first take a look on Microsoft Azure, and discuss severe attack surfaces that companies enabling Azure in their own trusted infrastructure have to take care of. In addition, we analy...

Full description

Saved in:
Bibliographic Details
Published in2016 11th International Conference on Availability, Reliability and Security (ARES) pp. 217 - 222
Main Authors Grothe, Martin, Mainka, Christian, Rosler, Paul, Jupke, Johanna, Kaiser, Jan, Schwenk, Jorg
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2016
Subjects
Online AccessGet full text

Cover

Loading…
Abstract We provide a security analysis of modern Enterprise Rights Management (ERM) solutions and reveal security threats. We first take a look on Microsoft Azure, and discuss severe attack surfaces that companies enabling Azure in their own trusted infrastructure have to take care of. In addition, we analyze Tresorit, one of the most frequently used End-to-End encrypted cloud storage systems. Tresorit can use Azure and its Rights Management Services (RMS) module as an additional security layer: a user should be able to either trust Tresorit or Azure. Our systematic evaluation reveals a serious breach to their security architecture: we show that the whole security of Tresorit RMS relies on Tresorit being trusted, independent of trusting Azure.
AbstractList We provide a security analysis of modern Enterprise Rights Management (ERM) solutions and reveal security threats. We first take a look on Microsoft Azure, and discuss severe attack surfaces that companies enabling Azure in their own trusted infrastructure have to take care of. In addition, we analyze Tresorit, one of the most frequently used End-to-End encrypted cloud storage systems. Tresorit can use Azure and its Rights Management Services (RMS) module as an additional security layer: a user should be able to either trust Tresorit or Azure. Our systematic evaluation reveals a serious breach to their security architecture: we show that the whole security of Tresorit RMS relies on Tresorit being trusted, independent of trusting Azure.
Author Kaiser, Jan
Schwenk, Jorg
Grothe, Martin
Jupke, Johanna
Rosler, Paul
Mainka, Christian
Author_xml – sequence: 1
  givenname: Martin
  surname: Grothe
  fullname: Grothe, Martin
  email: martin.grothe@rub.de
  organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 2
  givenname: Christian
  surname: Mainka
  fullname: Mainka, Christian
  email: paul.roesler@rub.de
  organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 3
  givenname: Paul
  surname: Rosler
  fullname: Rosler, Paul
  email: johanna.jupke@rub.de
  organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 4
  givenname: Johanna
  surname: Jupke
  fullname: Jupke, Johanna
  email: jan.kaiser-e5q@rub.de
  organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 5
  givenname: Jan
  surname: Kaiser
  fullname: Kaiser, Jan
  email: christian.mainka@rub.de
  organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 6
  givenname: Jorg
  surname: Schwenk
  fullname: Schwenk, Jorg
  email: joerg.schwenk@rub.de
  organization: Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany
BookMark eNotzMFKwzAYAOAICrq5mzcveYHW_GnSJt5GqVNYETo9eBpp8mdG1nS03aBv70FP3-1bkOvYRyTkAVgKwPTTuql2KWeQp7m-IguQTDOmNctvyWocfxhjoHMFPLsj1Vd_Hmh57M-OhkjrmZZ9dzJxfqZ173CItAmH72mktYnmgB3Gie5wuASLI23wEsYwobsnN94cR1z9uySfL9VH-Zps3zdv5XqbBCjklBTAheBWuxa4BM-4ah1YZYVTxkhAj145aQ0HUXDphW-FzTOhTA6ctV5nS_L49wZE3J-G0Jlh3heFErLIsl_NXkmy
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ARES.2016.69
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 1509009906
9781509009909
EndPage 222
ExternalDocumentID 7784573
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i175t-712442c9db1251f028bd1c8c4d8aa51efef8d5ca214725f4fb4c6348a6120bf93
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:08 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-712442c9db1251f028bd1c8c4d8aa51efef8d5ca214725f4fb4c6348a6120bf93
PageCount 6
ParticipantIDs ieee_primary_7784573
PublicationCentury 2000
PublicationDate 2016-Aug.
PublicationDateYYYYMMDD 2016-08-01
PublicationDate_xml – month: 08
  year: 2016
  text: 2016-Aug.
PublicationDecade 2010
PublicationTitle 2016 11th International Conference on Availability, Reliability and Security (ARES)
PublicationTitleAbbrev ARES
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001968123
Score 1.6662027
Snippet We provide a security analysis of modern Enterprise Rights Management (ERM) solutions and reveal security threats. We first take a look on Microsoft Azure, and...
SourceID ieee
SourceType Publisher
StartPage 217
SubjectTerms Azure
Cloud
Cloud computing
Companies
Copyright protection
Cryptography
ERM
RMS
Servers
Tresorit
Title Your Cloud in My Company: Modern Rights Management Services Revisited
URI https://ieeexplore.ieee.org/document/7784573
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3mauom_ycGj7bo2aRJvMjaGMJHhYLfR_IKhdDLbg_71Jmm7gnjwFnpJ-8LL9yX93vsA7riMmUmY67GPeYDTmAYi5SQgUZSlgmNDvdfh4jmdr_DTmqw7cH-ohdFae_GZDt3Q_8tXO1m6q7IRpQwTmnShSzmvarXa-xTuOmklB207Hz3aT3DarTT0aubWO8VDx6wPi2bSSjHyFpaFCOX3r36M_32rYxi2RXro5QA_J9DR-Sn0G5cGVCftAKY2ofdo8r4rFdrmaPGF6j3gAVVGaGjpDuifqFXCoGYHQUtffG5Z6RBWs-nrZB7U5gnB1jKCIqAOuGPJlXAUxlgaIdRYMokVyzIy1kYbpojMnE9RTAw2Ass0wSyzlCcShidn0Mt3uT4HFBGdSIf8qbDHMerirFXMjREiUmYsLmDgorL5qPpjbOqAXP79-AqO3KJUIrpr6BX7Ut9YYC_ErV_RH0deoqc
link.rule.ids 310,311,783,787,792,793,799,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH5BPOgJFYy_7cGjG2PrutabIRBURgyBhBtZfyVEMwxuB_3rbbfBEuPBW7NLt9e8fl-7770P4I4Jn-qA2h77mDmY-JHDCQud0PMSwhnWUeF1GE_IaI6fF-GiAfe7WhilVCE-U64dFv_y5Vrk9qqsG0UUh1GwB_uGV1NSVmvVNyrM9tIKdup21n00H2HVW8Qt9My1e0oBHsMWxNtpS83Im5tn3BXfvzoy_ve9jqBTl-mh1x0AHUNDpSfQ2vo0oCpt2zAwKb1B_fd1LtEqRfEXqnaBB1RaoaGpPaJ_oloLg7Z7CJoW5eeGl3ZgPhzM-iOnsk9wVoYTZE5kodsXTHJLYrQhElz2BBVY0iQJe0orTWUoEutU5Icaa44FCTBNDOnxuGbBKTTTdarOAHmhCoTFfsLNgSyycVbSZ1pz7knd4-fQtlFZfpQdMpZVQC7-fnwLB6NZPF6OnyYvl3BoF6iU1F1BM9vk6trAfMZvitX9AfeDpfI
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+11th+International+Conference+on+Availability%2C+Reliability+and+Security+%28ARES%29&rft.atitle=Your+Cloud+in+My+Company%3A+Modern+Rights+Management+Services+Revisited&rft.au=Grothe%2C+Martin&rft.au=Mainka%2C+Christian&rft.au=Rosler%2C+Paul&rft.au=Jupke%2C+Johanna&rft.date=2016-08-01&rft.pub=IEEE&rft.spage=217&rft.epage=222&rft_id=info:doi/10.1109%2FARES.2016.69&rft.externalDocID=7784573