Brown U Reseachers Recommend Data Shuffling Technique To Secure Cloud Activity

Researchers at Brown University have developed a data shuffling technique that aims to improve security of data stored in the cloud by hiding usage patterns, which can be analyzed to reveal secret information.

Without data shuffling, snoopers and cloud providers can monitor which files an organization accesses from a cloud service and when, even though the content of those files themselves is encrypted. By tracking that information, along with major events related to the organization, the third parties can figure out what an organization may be doing before that information is made public.

For example, if an organization typically accesses a particular set of files stored at a particular location on the cloud server before announcing a negative earnings report, eavesdroppers can figure out when the organization is preparing to release such a report again. Some programs, such as those for processing bankruptcy proceedings, may also have a recognizable pattern of accessing data. When snoopers detect that pattern, they can deduce that the organization may be preparing to file for bankruptcy.

The data shuffling technique, dubbed the Melbourne Shuffle after a dance move originating in Australia where one of the researchers did her graduate studies, aims to add an extra layer of security to data stored in the cloud. The technique downloads data from the cloud in small chunks, rearranges it, and then uploads it back to the cloud. By repeating the process with different blocks of data, all of an organization's cloud data can be shuffled, so data snoopers can no longer detect patterns.

According to information from the university, "the researchers envision deploying their shuffle algorithm through a software application or a hardware device that users keep at their location. It could also be deployed in the form of a tamper-proof chip controlled by the user and installed at the data center of the cloud provider."

The research paper, "The Melbourne Shuffle: Improving Oblivious Storage in the Cloud," can be found on arXiv.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • interconnected glowing nodes and circuits in blue and green, forming a neural network on a dark background with a futuristic design

    Tech Giants Launch $100 Billion AI Infrastructure Network Project

    OpenAI, SoftBank, and Oracle have unveiled a new venture, Stargate, through which they aim to build a massive AI infrastructure network across the United States. The initiative, which was announced at the White House with President Donald Trump, has been described as the "largest AI infrastructure project in history."

  • futuristic brain made of glowing circuits with a human hand reaching toward it

    Cloud Security Alliance Calls for Rethinking AI Development in the Face of DeepSeek Debut

    The Cloud Security Alliance (CSA) has weighed in on DeepSeek AI’s disruptive debut, warning that the revolutionary AI model is “rewriting the rules” of AI development. The remarks come as cloud security firm Wiz disclosed a major data leak in DeepSeek’s platform, raising concerns about security vulnerabilities in the cutting-edge system.

  • university building surrounded by icons for AI, checklists, and data governance

    Improving AI Governance for Stronger University Compliance and Innovation

    AI can generate valuable insights for higher education institutions and it can be used to enhance the teaching process itself. The caveat is that this can only be achieved when universities adopt a strategic and proactive set of data and process management policies for their use of AI.

  • three main icons—a cloud, a user profile, and a padlock—connected by circuit lines on a blue abstract background

    Report: Identity Has Become a Critical Security Perimeter for Cloud Services

    A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.