Innovations
image_only
text_background
Innovations Banner
text_background
Printer Friendly, PDF & Email

Secure Cloud Encryption

Categories for this invention

Cybersecurity

Computer Science

 

Intellectual Property

A METHOD AND SYSTEM FOR STORING AND ACCESSING DATA

PCT

Image Gallery

SITC DIagram.png

Questions about this Technology?

Contact: Joe Rouse

 

Summary

Safe In The Cloud offers a business compatible, enterprise-grade searchable encryption scheme that interfaces with existing software systems and user key management solutions.

Problems Addressed

Privacy and appropriate levels of anonymization are mission-critical issues for organizations storing sensitive financial and personally-identifiable information. But protecting financial and sensitive user data with powerful encryption comes at a cost, limiting the flexibility and power of the operations that can be done on encrypted data.


This can have a serious effect on the compatibility and functioning of clients’ CRM and other application suites or outsourced service suites, placing businesses wanting to upgrade in a difficult position. A significant loss of business compatibility resulting from breaking ubiquitous functionality like searching and sorting can result in the loss of mission-critical functionality, such as generating invoice data or searching medical records.

While function-preserving encryption methods do exist, most often in the form of searchable encryption, this comes at a security cost. Known schemes of searchable encryption leak information about the file access pattern and frequency, providing an exploitable vector for plaintext recovery – and therefore leakage of sensitive and/ or personal information and client IP.

Applications

Safe In The Cloud offers a business compatible, enterprise-grade searchable
encryption scheme that interfaces with existing software systems and user key management solutions.

 

Technology

Implementing a unique obscuration technique, Safe In The Cloud hides the
number and size of the protected files, as well as the file access pattern. This
obscures the link between searches and activity, shoring up the traditional
weaknesses of searchable encryption. As a result, Safe In The Cloud
offers a solution for more secure searchable encryption, without hindering business compatibility.

 

Advantages

  • User controlled key management system
  • Adaptive key implementation
  • Protection against frequency based cryptographic attacks
  • Enables Business Compatible Searchable Encryption
  • Third party obscured search and retrieval of information

 

PROJECT#36402

Inventors

Associate Professor Giovanni Russello

School of Computer Science

Faculty of Science

 

Professor Steven Galbraith

School of Computer Science

Faculty of Science

 

Dr Rizwan Asghar

School of Computer Science

Faculty of Science

 

Dr Shujie Cui

School of Computer Science

Faculty of Science