Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication

被引:4
|
作者
Ha, Guanxiong [1 ,2 ]
Chen, Hang [1 ,2 ]
Jia, Chunfu [1 ,2 ]
Li, Mingyue [1 ,2 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[2] Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2023年 / 28卷 / 01期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
cloud storage; deduplication; side-channel; privacy;
D O I
10.26599/TST.2021.9010071
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud storage, client-side deduplication is widely used to reduce storage and communication costs. In client-side deduplication, if the cloud server detects that the user's outsourced data have been stored, then clients will not need to reupload the data. However, the information on whether data need to be uploaded can be used as a side-channel, which can consequently be exploited by adversaries to compromise data privacy. In this paper, we propose a new threat model against side-channel attacks. Different from existing schemes, the adversary could learn the approximate ratio of stored chunks to unstored chunks in outsourced files, and this ratio will affect the probability that the adversary compromises the data privacy through side-channel attacks. Under this threat model, we design two defense schemes to minimize privacy leakage, both of which design interaction protocols between clients and the server during deduplication checks to reduce the probability that the adversary compromises data privacy. We analyze the security of our schemes, and evaluate their performances based on a real-world dataset. Compared with existing schemes, our schemes can better mitigate data privacy leakage and have a slightly lower communication cost.
引用
下载
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [21] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [22] A Comprehensive Client-side Behavior Model for Diagnosing Attacks in Ajax Applications
    Dong, Xinshu
    Patil, Kailas
    Mao, Jian
    Liang, Zhenkai
    2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 177 - 187
  • [23] A Super-Nash Equilibrium Defense Solution for Client-Side Cache Poisoning Attacks
    An, Qingzhao
    Yang, Shujie
    Ma, Tengchao
    Yang, Tan
    Huang, Yiting
    Liu, Zhaoyang
    Ding, Zhongyi
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 369 - 380
  • [24] PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning
    Ahmed, Muzammil
    Altamimi, Ahmed B.
    Khan, Wilayat
    Alsaffar, Mohammad
    Ahmad, Aakash
    Khan, Zawar Hussain
    Alreshidi, Abdulrahman
    IEEE ACCESS, 2023, 11 (61249-61263): : 61249 - 61263
  • [25] Internet Banking: Client-Side Attacks and Protection Mechanisms
    Oppliger, Rolf
    Rytz, Ruedi
    Holderegger, Thomas
    COMPUTER, 2009, 42 (06) : 27 - 33
  • [26] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [27] Circuit-Variant Moving Target Defense for Side-Channel Attacks
    Mullins, Tristen
    Baggett, Brandon
    Andel, Todd R.
    McDonald, J. Todd
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 219 - 226
  • [28] Adaptive caches as a defense mechanism against cache side-channel attacks
    Bandara, Sahan
    Kinsy, Michel A.
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (03) : 239 - 255
  • [29] Adaptive Caches as a Defense Mechanism Against Cache Side-Channel Attacks
    Bandara, Sahan
    Kinsy, Michel A.
    PROCEEDINGS OF THE 3RD ACM WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY WORKSHOP (ASHES '19), 2019, : 55 - 64
  • [30] Public Auditing for Encrypted Data with Client-Side Deduplication in Cloud Storage
    HE Kai
    HUANG Chuanhe
    ZHOU Hao
    SHI Jiaoli
    WANG Xiaomao
    DAN Feng
    Wuhan University Journal of Natural Sciences, 2015, 20 (04) : 291 - 298