Design Flaw in 'Secure' Cloud Storage Puts Privacy at Risk, Researchers Say

Johns Hopkins computer scientists have found a flaw in the way that secure cloud storage companies protect their customers' data, a weakness they say jeopardizes the privacy protection these digital warehouses claim to offer.

Written byPhil Sneiderman-Johns Hopkins University News Office
| 3 min read
Register for free to listen to this article
Listen with Speechify
0:00
3:00

Johns Hopkins computer scientists have found a flaw in the way that secure cloud storage companies protect their customers' data, a weakness they say jeopardizes the privacy protection these digital warehouses claim to offer.Image courtesy of the University of British Columbia

 

Johns Hopkins computer scientists have found a flaw in the way that secure cloud storage companies protect their customers' data, a weakness they say jeopardizes the privacy protection these digital warehouses claim to offer.

Lab manager academy logo

Advanced Lab Management Certificate

The Advanced Lab Management certificate is more than training—it’s a professional advantage.

Gain critical skills and IACET-approved CEUs that make a measurable difference.

Whenever customers share their confidential files with a trusted friend or colleague, researchers say, the storage provider could exploit the security flaw to secretly view private data.

The flaw is detailed in a technical paper posted on arXiv.org, a Cornell site that hosts preprints of scientific papers in select disciplines, including computer science. The lead author is Duane C. Wilson, a doctoral student in the university's Department of Computer Science in the Whiting School of Engineering. The senior author is his faculty adviser, Giuseppe Ateniese, an associate professor in the department. Both are affiliated with the Johns Hopkins University Information Security Institute.

Their research focused on the secure cloud storage providers that are increasingly being used by businesses and others to house or back up sensitive information about intellectual property, finances, employees, and customers. These storage providers claim to offer "zero-knowledge environments," meaning that their employees cannot see or access the clients' data. These storage businesses typically assert that this confidentiality is guaranteed because the information is encrypted before it is uploaded for cloud storage.

But the Johns Hopkins team found that complete privacy could not be guaranteed by these vendors.

Want to stay up to date on the latest lab management news?

Subscribe to our free Lab Manager Monitor Newsletter.

Is the form not loading? If you use an ad blocker or browser privacy features, try turning them off and refresh the page.

By subscribing, you agree to receive email related to Lab Manager content and products. You may unsubscribe at any time.

"Our research shows that as long as the data is not shared with others, its confidentiality will be preserved, as the providers claim," Wilson said. "However, whenever data is shared with another recipient through the cloud storage service, the providers are able to access their customers' files and other data."

The problem, Wilson said, is that privacy during file-sharing is normally preserved by the use of a trusted third party, a technological "middle-man" who verifies the identify of the users who wish to share files. When this authentication process is finished, the third party issues "keys" that can unscramble and later re-encode the data to restore its confidentiality.

"In the secure cloud storage providers we examined," Wilson said, "the storage businesses were each operating as their own 'trusted third party,' meaning they could easily issue fake identity credentials to people using the service. The storage businesses could use a phony 'key' to decrypt and view the private information, then re-encrypt it before sending it on to its intended recipient.

"As a result, whenever data is shared with another user or group of users, the storage service could perform a man-in-the-middle attack by pretending to be another user or group member. This would all happen without alerting the customers, who incorrectly believe that the cloud storage provider cannot see or access their data."

These storage services generally do not share the details of how their technology works, so Wilson and Ateniese substantiated the security flaw by using a combination of reverse engineering and network traffic analysis to study the type of communication that occurs between a secure cloud storage provider and its customers.

The researchers pointed out that their study only focused on three storage providers—Wuala, Spider Oak, and Tresorit—that claimed their customers' data would remain completely confidential. Other file-sharing services such as Dropbox and Google Drive make no pledge of privacy. Instead, they say that after a user's data is uploaded, it is encrypted with keys that are owned by the file-sharing service.

To solve the security flaw, the researchers recommend that the arrangements between customers and secure storage providers be revised so that an independent third party serves as the file-sharing "middle-man" instead of the storage company itself.

"Although we have no evidence that any secure cloud storage provider is accessing their customers' private information, we wanted to get the word out that this could easily occur," said Ateniese, who supervised the research. "It's like discovering that your neighbors left their door unlocked. Maybe no one has stolen anything from the house yet, but don't you think they'd like to know that it would be simple for thieves to get inside?"

Loading Next Article...
Loading Next Article...

CURRENT ISSUE - May/June 2025

The Benefits, Business Case, And Planning Strategies Behind Lab Digitalization

Joining Processes And Software For a Streamlined, Quality-First Laboratory

Lab Manager May/June 2025 Cover Image