Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads

IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-20 DOI:10.1109/TIFS.2025.3544082
Yuanchao Chen;Yuwei Li;Yuliang Lu;Zulie Pan;Yuan Chen;Shouling Ji;Yu Chen;Yang Li;Yi Shen
{"title":"Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads","authors":"Yuanchao Chen;Yuwei Li;Yuliang Lu;Zulie Pan;Yuan Chen;Shouling Ji;Yu Chen;Yang Li;Yi Shen","doi":"10.1109/TIFS.2025.3544082","DOIUrl":null,"url":null,"abstract":"With the rising demand for website data storage, leveraging cloud storage services for vast user file storage has become prevalent. Nowadays, a new file upload scenario has been introduced, allowing web users to upload files directly to the cloud storage service. This new scenario offers convenience but involves more roles (i.e., web users, web servers, and cloud storage services) and their interactions, bringing new security threats. In this paper, we perform the first systematic security study in this scenario. With in-depth analysis, we identify six new types of vulnerabilities and conduct large-scale real-world measurements on the top 500 Alexa Rank websites. Among these websites, 182 (36.4%) use cloud storage services, illustrating the widespread use of the cloud. Then, we perform a detailed analysis of 28 popular websites that allow user upload. Surprisingly, they all have at least one of the six vulnerabilities. Totally, we discover 79 new vulnerabilities and responsibly report them to the websites. Many popular websites respond positively, including Google, Reddit, and CSDN. We discuss the root causes of these vulnerabilities and propose possible mitigation methods. In summary, our work offers significant value in understanding the security risks of cloud storage services for websites and facilitating future research.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"2677-2692"},"PeriodicalIF":8.0000,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10896886","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10896886/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

With the rising demand for website data storage, leveraging cloud storage services for vast user file storage has become prevalent. Nowadays, a new file upload scenario has been introduced, allowing web users to upload files directly to the cloud storage service. This new scenario offers convenience but involves more roles (i.e., web users, web servers, and cloud storage services) and their interactions, bringing new security threats. In this paper, we perform the first systematic security study in this scenario. With in-depth analysis, we identify six new types of vulnerabilities and conduct large-scale real-world measurements on the top 500 Alexa Rank websites. Among these websites, 182 (36.4%) use cloud storage services, illustrating the widespread use of the cloud. Then, we perform a detailed analysis of 28 popular websites that allow user upload. Surprisingly, they all have at least one of the six vulnerabilities. Totally, we discover 79 new vulnerabilities and responsibly report them to the websites. Many popular websites respond positively, including Google, Reddit, and CSDN. We discuss the root causes of these vulnerabilities and propose possible mitigation methods. In summary, our work offers significant value in understanding the security risks of cloud storage services for websites and facilitating future research.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
了解使用云存储直接上传文件的网站的安全风险
随着网站数据存储需求的不断增长,利用云存储服务存储海量用户文件已成为一种流行趋势。现在,我们引入了一种新的文件上传场景,允许web用户直接将文件上传到云存储服务。这种新场景提供了便利,但涉及更多的角色(即web用户、web服务器和云存储服务)及其交互,带来了新的安全威胁。在本文中,我们对该场景进行了第一次系统的安全性研究。通过深入分析,我们确定了六种新的漏洞类型,并对Alexa排名前500的网站进行了大规模的实际测量。在这些网站中,有182家(36.4%)使用云存储服务,说明了云的广泛使用。然后,我们对28个允许用户上传的热门网站进行了详细的分析。令人惊讶的是,它们都至少有六个漏洞中的一个。我们总共发现了79个新的漏洞,并负责任地向网站报告。许多受欢迎的网站反应积极,包括b谷歌,Reddit和CSDN。我们讨论了这些漏洞的根本原因,并提出了可能的缓解方法。总之,我们的工作对了解网站云存储服务的安全风险和促进未来的研究提供了重要的价值。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
期刊最新文献
RIRplay: Generation of a Replay Stereo Corpus for Voice Biometrics Anti-Spoofing Authentication With Passports for Deep RF Sensing Model Protection DiffMI: Breaking Face Recognition Privacy via Diffusion-Driven Training-Free Model Inversion Query-Efficient Hard-Label Attacks against Black-Box Image Forgery Localization Model via Reinforcement Learning Practical Private Set Operation via Secret Sharing for Lightweight Clients
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1