Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication

被引:4
|
作者
Ha, Guanxiong [1 ,2 ]
Chen, Hang [1 ,2 ]
Jia, Chunfu [1 ,2 ]
Li, Mingyue [1 ,2 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[2] Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2023年 / 28卷 / 01期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
cloud storage; deduplication; side-channel; privacy;
D O I
10.26599/TST.2021.9010071
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud storage, client-side deduplication is widely used to reduce storage and communication costs. In client-side deduplication, if the cloud server detects that the user's outsourced data have been stored, then clients will not need to reupload the data. However, the information on whether data need to be uploaded can be used as a side-channel, which can consequently be exploited by adversaries to compromise data privacy. In this paper, we propose a new threat model against side-channel attacks. Different from existing schemes, the adversary could learn the approximate ratio of stored chunks to unstored chunks in outsourced files, and this ratio will affect the probability that the adversary compromises the data privacy through side-channel attacks. Under this threat model, we design two defense schemes to minimize privacy leakage, both of which design interaction protocols between clients and the server during deduplication checks to reduce the probability that the adversary compromises data privacy. We analyze the security of our schemes, and evaluate their performances based on a real-world dataset. Compared with existing schemes, our schemes can better mitigate data privacy leakage and have a slightly lower communication cost.
引用
下载
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [1] Client-side ciphertext deduplication scheme with flexible access control
    Xie, Ying
    Tian, Guohua
    Yuan, Haoran
    Jiang, Chong
    Wang, Jianfeng
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 23 (02) : 145 - 157
  • [2] Modeling The Side-Channel Attacks in Data Deduplication with Game Theory
    Wang, Bing
    Lou, Wenjing
    Hou, Y. Thomas
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 200 - 208
  • [3] Network infiltration with client-side attacks
    Armstrong, Neil
    Network Security, 2007, 2007 (09) : 8 - 10
  • [4] Secure Client-Side Deduplication Scheme for Cloud with Dual Trusted Execution Environment
    Verma, Garima
    IETE JOURNAL OF RESEARCH, 2023, 69 (10) : 7015 - 7025
  • [5] SecReS: A Secure and Reliable Storage Scheme for Cloud with Client-side Data Deduplication
    Islam, Tariqul
    Mistareehi, Hassan
    Manivannan, D.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [6] Secure and Efficient Proof of Ownership Scheme for Client-Side Deduplication in Cloud Environments
    Al-Amer, Amer
    Ouda, Osama
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) : 916 - 923
  • [7] Secure and Efficient Proof of Ownership Scheme for Client-Side Deduplication in Cloud Environments
    Al-Amer, Amer
    Ouda, Osama
    International Journal of Advanced Computer Science and Applications, 2021, 12 (12): : 916 - 923
  • [8] Client-Side Detection of Clickjacking Attacks
    Shahriar, Hossain
    Haddad, Hisham M.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2015, 9 (01) : 1 - 25
  • [9] Moving Target Defense Mechanism for Side-Channel Attacks
    Vuppala, Satyanarayana
    Mady, Alie El-Din
    Kuenzi, Adam
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1810 - 1819
  • [10] A Secure Client-Side Deduplication Scheme Based on Updatable Server-Aided Encryption
    Ha, Guanxiong
    Jia, Chunfu
    Chen, Yuchen
    Chen, Hang
    Li, Mingyue
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3672 - 3684