Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication

被引:4
|
作者
Ha, Guanxiong [1 ,2 ]
Chen, Hang [1 ,2 ]
Jia, Chunfu [1 ,2 ]
Li, Mingyue [1 ,2 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[2] Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2023年 / 28卷 / 01期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
cloud storage; deduplication; side-channel; privacy;
D O I
10.26599/TST.2021.9010071
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud storage, client-side deduplication is widely used to reduce storage and communication costs. In client-side deduplication, if the cloud server detects that the user's outsourced data have been stored, then clients will not need to reupload the data. However, the information on whether data need to be uploaded can be used as a side-channel, which can consequently be exploited by adversaries to compromise data privacy. In this paper, we propose a new threat model against side-channel attacks. Different from existing schemes, the adversary could learn the approximate ratio of stored chunks to unstored chunks in outsourced files, and this ratio will affect the probability that the adversary compromises the data privacy through side-channel attacks. Under this threat model, we design two defense schemes to minimize privacy leakage, both of which design interaction protocols between clients and the server during deduplication checks to reduce the probability that the adversary compromises data privacy. We analyze the security of our schemes, and evaluate their performances based on a real-world dataset. Compared with existing schemes, our schemes can better mitigate data privacy leakage and have a slightly lower communication cost.
引用
下载
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [31] Detection of Malicious Servers for Preventing Client-Side Attacks
    Bux, Khuda
    Yousaf, Muhammad
    Jalbani, Akhtar Hussain
    Batool, Komal
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2021, 40 (01) : 230 - 240
  • [32] Defense against Side-Channel Power Analysis Attacks on Microelectronic Systems
    Sundaresan, Vijay
    Rammohan, Srividhya
    Vemuri, Ranga
    NAECON 2008 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2008, : 144 - 150
  • [33] HProxy Client-Side Detection of SSL Stripping Attacks
    Nikiforakis, Nick
    Younan, Yves
    Joosen, Wouter
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2010, 6201 : 200 - 218
  • [34] Adaptive caches as a defense mechanism against cache side-channel attacks
    Sahan Bandara
    Michel A. Kinsy
    Journal of Cryptographic Engineering, 2021, 11 : 239 - 255
  • [35] CIDER: A Low Overhead Approach to Privacy Aware Client-side Deduplication
    Vestergaard, Rasmus
    Zhang, Qi
    Lucani, Daniel E.
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [36] Classification features for detecting server-side and client-side Web attacks
    Salem, Benferhat
    Karim, Tabia
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 729 - 733
  • [37] A cost model for client-side caas
    Sriwiroj, Chaturong
    Banditwattanawong, Thepparit
    Lecture Notes in Electrical Engineering, 2015, 339 : 361 - 368
  • [38] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [39] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [40] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32