

MSR-TR-2011-58, Microsoft Technical Report (May 2011), Kamara, S., Papamanthou, C., Roeder, T.: CS2: A semantic cryptographic cloud storage system. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. Kamara, S., Lauter, K.: Cryptographic Cloud Storage. Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. In: Symposium on Reliable Distributed Systems, pp. Grolimund, D., Meisser, L., Schmid, S., Wattenhofer, R.: Cryptree: A folder tree structure for cryptographic file systems. IEEE Computer Society, Washington, DC, USA (2002)ĭropbox: Dropbox - simplify your life, (accessed May 17, 2011)ĮUR-Lex - Access to European Union law: 32006l0024 - en (2012), (accessed February 20, 2012) In: ICDCS 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002), p. In: Proceedings of the 13th USENIX Security Symposium (August 2004)ĭouceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. CRC Press (2007)ĭingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router.

In: Attacks, Defences and Public Policy Issues. IEEE Internet Computing 6(1), 40–49 (2002)ĭanezis, G., Clayton, R.: Introducing traffic analysis.
WUALA STORAGE FREE
UCB/EECS-2010-5, EECS Department, University of California, Berkeley (January 2010), Ĭlarke, I., Miller, S.G., Hong, T.W., Sandberg, O., Wiley, B.: Protecting free expression online with freenet. Springer, Heidelberg (2001)Ĭhen, Y., Paxson, V., Katz, R.H.: What’s new about cloud computing security? Tech. Springer, Heidelberg (2009)Ĭamenisch, J.L., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. This process is experimental and the keywords may be updated as the learning algorithm improves.īerthold, S., Böhme, R., Köpsell, S.: Data Retention and Anonymity Services. These keywords were added by machine and not by the authors.

Our conclusions are that cross-user deduplication should be disabled by default and that public cloud storage services need to be designed to provide unlinkability of users and data, even if the data is encrypted by users before storing it in the cloud. These side channels are present in several public cloud storage services that are marketed as secure and privacy-friendly. This paper investigates side channels in public cloud storage services that allow the service provider, and in some cases users of the same service, to learn who has stored a given file and to profile users’ usage of the service. Today the R&D department of the company is in Budapest, however Tresorit is registered in Switzerland where Andreas Kemi is based, President of the Board and investor.Public cloud storage services are gaining in popularity and several commercial actors are offering their services for users, however, not always with the security and privacy of their users as the primary design goal. István Lám who founded Tresorit in 2011 and is living in Hungary studied at the EPFL in Lausanne. We even developed a tool to help users migrate data securely from Wuala to Tresorit in collaboration with Wuala engineers”, writes Tresorit CEO István Lám in a blogpost.

Everyone in our team is prepared and committed to deliver an excellent service. “We are proud that Wuala recommends Tresorit to their users to keep their files safe after Wuala shuts down. In order to ease the impact of the Wuala service termination, Wuala has partnered with Tresorit-a provider of end-to-end encrypted cloud storage for businesses and individuals-and created a secure, easy option to transition data to Tresorit. In 2009 they sold their company to LaCie – part of the Seagate Technology Group. Wuala has been founded by the Swiss entrepeneurs Dominik Grolimund and Luzius Meisser. Effective Sunday, 15 November 2015, the Wuala cloud service will terminate.
WUALA STORAGE FULL
Full account service will continue through 30 September 2015, at which point all active accounts will shift to read-only mode. Since yesterday Wuala users are no longer able to purchase storage or renew existing accounts.
