skip to main content
10.1145/3209280.3209535acmconferencesArticle/Chapter ViewAbstractPublication PagesdocengConference Proceedingsconference-collections
research-article

Private Document Editing with some Trust

Published: 28 August 2018 Publication History
  • Get Citation Alerts
  • Abstract

    Document editing has migrated in the last decade from a mostly individual activity to a shared activity among multiple persons. The World Wide Web and other communication means have contributed to this evolution. However, collaboration via the web has shown a tendency to centralize information, making it accessible to subsequent uses and abuses, such as surveillance, marketing, and data theft.
    Traditionally, access control policies have been enforced by a central authority, usually the server hosting the content, a single point of failure. We describe a novel scheme for collaborative editing in which clients enforce access control through the use of strong encryption. Encryption keys are distributed as the portion of a URI which is not shared with the server, enabling users to adopt a variety of document security workflows. This system separates access to the information ("the key") from the responsibility of hosting the content ("the carrier of the vault"), allowing privacy-conscious editors to enjoy a modern collaborative editing experience without relaxing their requirements.
    The paper presents CryptPad, an open-source reference implementation which features a variety of editors which employ the described access control methodology. We will detail approaches for implementing a variety of features required for user productivity in a manner that satisfies user-defined privacy concerns.

    References

    [1]
    2018. chainpad-listmap source code. (2018). Available from https://github.com/xwiki-labs/chainpad-listmap; consulted 2018-04-10.
    [2]
    2018. chainpad source code. (2018). Available from https://github.com/xwiki-contrib/chainpad; consulted 2018-04-10.
    [3]
    2018. crypt-editor source code. (2018). Available from https://github.com/alseambusher/crypt-editor; consulted 2018-04-10.
    [4]
    2018. CryptoTE source code. (2018). Available from https://github.com/bingmann/cryptote; consulted 2018-04-10.
    [5]
    2018. CryptPad source code. (2018). Available from https://github.com/xwiki-labs/cryptpad; consulted 2018-04-10.
    [6]
    2018. CryptPad.fr. (2018). Available from https://cryptpad.fr/; consulted 2018-04-10.
    [7]
    2018. Encryptpad source code. (2018). Available from https://github.com/evpo/EncryptPad; consulted 2018-04-10.
    [8]
    2018. HTTPS adoption statistics provided by letsencrypt.org. (2018). Available from https://letsencrypt.org/stats/; consulted 2018-04-10.
    [9]
    2018. ncrypt source code. (2018). Available from https://github.com/Upload/Up1; consulted 2018-04-10.
    [10]
    2018. scrypt-async-js source code. (2018). Available from https://github.com/dchest/scrypt-async-js; consulted 2018-04-10.
    [11]
    2018. tweetnacl-js source code. (2018). Available from https://github.com/dchest/tweetnacl-js; consulted 2018-04-10.
    [12]
    2018. Up1 source code. (2018). Available from https://github.com/Upload/Up1; consulted 2018-04-10.
    [13]
    Tim Berners-Lee. 1997. URI References: Fragment Identifiers on URIs. (1997). Available at https://www.w3.org/DesignIssues/Fragment.html.
    [14]
    A. Cavoukian. 2012. Privacy by Design {Leading Edge}. IEEE Technology and Society Magazine 31, 4 (winter 2012), 18--19.
    [15]
    Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray Perlner, and Daniel Smith-Tone. 2016. Report on Post-Quantum Cryptography. Technical Report. NIST. See https://csrc.nist.gov/publications/detail/nistir/8105/final.
    [16]
    B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. 1995. Private Information Retrieval. In Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS '95). IEEE Computer Society, Washington, DC, USA, 41--. http://dl.acm.org/citation.cfm?id=795662.796270
    [17]
    European Commission. 2018. General Data Protection Regulation. Available online at https://ec.europa.eu/info/law/law-topic/data-protection/data-protection-eu_en. (2018). Onlline, accessed 2018-02-15.
    [18]
    MDN Contributors. 2017. Subresource Integrity. Mozilla Developer Network. Available at https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity; consulted on 2018-02-15.
    [19]
    Ksenia Ermoshina, Francesca Musiani, and Harry Halpin. 2016. End-to-End Encrypted Messaging Protocols: An Overview. In Internet Science - Third International Conference, INSCI 2016, Florence, Italy, September 12-14, 2016, Proceedings, Vol. 9934. Springer, Cham, 244--254.
    [20]
    Laura Evans. 2007. Monitoring Technology in the American Workplace: Would Adopting English Privacy Standards Better Balance Employee Privacy and Productivity? California Law Review 95, 4 (2007), online. Available at https://scholarship.law.berkeley.edu/californialawreview/vol95/iss4/4/.
    [21]
    Ariel J. Feldman, William P. Zeller, Michael J. Freedman, and Edward W. Felten. 2010. SPORC: Group Collaboration Using Un-trusted Cloud Resources. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10). USENIX Association, Berkeley, CA, USA, 337--350. Available from https://www.usenix.org/legacy/events/osdi10/tech/.
    [22]
    Christian Fuchs. 2011. Web 2.0, Prosumption, and Surveillance. Surveillance and Society 8, 3 (2011), 288--309. Available from http://www.surveillance-and-society.org.
    [23]
    A D Gelman, H Kobrinski, L S Smoot, S B Weinstein, M Fortier, and D Lemay. 1991. A store-and-forward architecture for video-on-demand service. In IEEE International Conference on Communications. IEEE, Piscataway NJ, 842--846.
    [24]
    Keith N. Hampton, Lee Rainie, Weixu Lu, Maria Dwyer, In-young Shin, and Kirsten Purcell. 2014. Social Media and the 'Spiral of Silence'. Technical Report. Pew Research Center. Available from http://www.pewinternet.org/2014/08/27/the-spiral-of-silence-on-social-media/.
    [25]
    Stephanie Hare. 2016. For your eyes only: U.S. technology companies, sovereign states, and the battle over data protection. Business Horizons 59, 5 (2016), 549--561. THE BUSINESS OF PEACE.
    [26]
    Amir Herzberg and Hemi Leibowitz. 2016. Can Johnny Finally Encrypt?: Evaluating E2E-encryption in Popular IM Applications. In Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust (STAST '16). ACM, New York, NY, USA, 17--28.
    [27]
    Nadim Kobeissi and Arlo Breault. 2013. Cryptocat: Adopting Accessibility and Ease of Use as Security Properties. (2013). arXiv:1306.5156 http://arxiv.org/abs/1306.5156
    [28]
    Gunnar Kreitz, Oleksandr Bodriagov, Benjamin Greschbach, Guillermo Rodríguez-Cano, and Sonja Buchegger. 2012. Passwords in peer-to-peer. In 12th IEEE International Conference on Peer-to-Peer Computing, P2P 2012, Tarragona, Spain, September 3-5, 2012. IEEE, Piscataway NJ, 167--178.
    [29]
    B. Laurie, A. Langley, and E. Kasper. 2013. RFC 6962: Certificate Transparency (Experimental Protocol). Technical Report. IETF. Available from https://tools.ietf.org/html/rfc6962.
    [30]
    Prince Mahajan, Srinath T. V. Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Michael Dahlin, and Michael Walfish. 2010. Depot: Cloud Storage with Minimal Trust. In 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010, October 4-6, 2010, Vancouver, BC, Canada, Proceedings, Remzi H. Arpaci-Dusseau and Brad Chen (Eds.). USENIX Association, Berkeley, CA, USA, 307--322. http://www.usenix.org/events/osdi10/tech/full_papers/Mahajan.pdf
    [31]
    R. Mahy, P. Matthews, and J. Rosenberg. 2010. RFC 5766: Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN). Technical Report. IETF. Available from https://tools.ietf.org/html/rfc5766.
    [32]
    Alex Marthews and Catherine E. Tucker. 2017. Government Surveillance and Internet Search Behavior. Technical Report. MIT Sloan Business School. Available from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2412564.
    [33]
    M. Asif Naeem, Gillian Dobbie, and Gerald Webber. 2008. An Event-Based Near Real-Time Data Integration Architecture. In Proceedings of the 2008 12th Enterprise Distributed Object Computing Conference Workshops (EDOCW '08). IEEE Computer Society, Washington, DC, USA, 401--404.
    [34]
    Milinda Pathirage. 2018. Kappa Architecture.com. (2018). Available from http://milinda.pathirage.org/kappa-architecture.com/; consulted 2018-02-15.
    [35]
    Nicolas Pujol. 2010. Freemium: Attributes of an Emerging Business Model. (Dec 2010). Available online at SSRN https://ssrn.com/abstract=1718663.
    [36]
    Adi Shamir. 1979. How to Share a Secret. Commun. ACM 22, 11 (Nov. 1979), 612--613.
    [37]
    Sid Stamm, Brandon Sterne, and Gervase Markham. 2010. Reining in the Web with Content Security Policy. In Proceedings of the 19th International Conference on World Wide Web (WWW '10). ACM, New York, NY, USA, 921--930.
    [38]
    Jeffrey M. Stanton, Kathryn R. Stam, Paul Mastrangelo, and Jeffrey Jolton. 2005. Analysis of end user security behaviors. Computers & Security 24, 2 (2005), 124--133.
    [39]
    Emily Stark. 2013. From client-side encryption to secure web applications. Ph.D. Dissertation. MIT. Accessible at https://dspace.mit.edu/handle/1721.1/82382.
    [40]
    The local. 2017. Denmark names first ever digital ambassador for Silicon Valley role. The Local.dk, Denmark's news in English 20170526 (May 2017), online. Available online at https://www.thelocal.dk/20170526/denmark-names-first-ever-digital-ambassador-for-silicon-valley-role.
    [41]
    Craig Timber. 2015. Net of insecurity: A flaw in the design. The Washington Post 2015-05-30 (30 May 2015). See http://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/.
    [42]
    Luis M. Vaquero and Luis Rodero-Merino. 2014. Finding Your Way in the Fog: Towards a Comprehensive Definition of Fog Computing. SIGCOMM Comput. Commun. Rev. 44, 5 (Oct. 2014), 27--32.
    [43]
    Alma Whitten and J. D. Tygar. 1999. Why Johnny Can'T Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8 (SSYM'99). USENIX Association, Berkeley, CA, USA, 14--14. http://dl.acm.org/citation.cfm?id=1251421.1251435
    [44]
    Shoshana Zuboff. 2015. Big other: surveillance capitalism and the prospects of an information civilization. Journal of Information Technology 30, 1 (March 2015), 75--89.

    Cited By

    View all
    • (2023)Trustworthy confidential virtual machines for the massesProceedings of the 24th International Middleware Conference10.1145/3590140.3629124(316-328)Online publication date: 27-Nov-2023

    Index Terms

    1. Private Document Editing with some Trust

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      DocEng '18: Proceedings of the ACM Symposium on Document Engineering 2018
      August 2018
      311 pages
      ISBN:9781450357692
      DOI:10.1145/3209280
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      In-Cooperation

      • SIGDOC: ACM Special Interest Group on Systems Documentation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 28 August 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. collaborative editing
      2. encryption
      3. identities
      4. online documents
      5. trust

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      DocEng '18
      Sponsor:
      DocEng '18: ACM Symposium on Document Engineering 2018
      August 28 - 31, 2018
      NS, Halifax, Canada

      Acceptance Rates

      Overall Acceptance Rate 178 of 537 submissions, 33%

      Upcoming Conference

      DocEng '24
      ACM Symposium on Document Engineering 2024
      August 20 - 23, 2024
      San Jose , CA , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 01 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Trustworthy confidential virtual machines for the massesProceedings of the 24th International Middleware Conference10.1145/3590140.3629124(316-328)Online publication date: 27-Nov-2023

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media