Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication

被引:4
|
作者
Ha, Guanxiong [1 ,2 ]
Chen, Hang [1 ,2 ]
Jia, Chunfu [1 ,2 ]
Li, Mingyue [1 ,2 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[2] Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2023年 / 28卷 / 01期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
cloud storage; deduplication; side-channel; privacy;
D O I
10.26599/TST.2021.9010071
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud storage, client-side deduplication is widely used to reduce storage and communication costs. In client-side deduplication, if the cloud server detects that the user's outsourced data have been stored, then clients will not need to reupload the data. However, the information on whether data need to be uploaded can be used as a side-channel, which can consequently be exploited by adversaries to compromise data privacy. In this paper, we propose a new threat model against side-channel attacks. Different from existing schemes, the adversary could learn the approximate ratio of stored chunks to unstored chunks in outsourced files, and this ratio will affect the probability that the adversary compromises the data privacy through side-channel attacks. Under this threat model, we design two defense schemes to minimize privacy leakage, both of which design interaction protocols between clients and the server during deduplication checks to reduce the probability that the adversary compromises data privacy. We analyze the security of our schemes, and evaluate their performances based on a real-world dataset. Compared with existing schemes, our schemes can better mitigate data privacy leakage and have a slightly lower communication cost.
引用
下载
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [41] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [42] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [43] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [44] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
  • [45] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [46] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [47] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [48] An EDA-Friendly Protection Scheme against Side-Channel Attacks
    Bayrak, Ali Galip
    Velickovic, Nikola
    Regazzoni, Francesco
    Novo, David
    Brisk, Philip
    Ienne, Paolo
    DESIGN, AUTOMATION & TEST IN EUROPE, 2013, : 410 - 415
  • [49] Hybrid Side-Channel/Machine-Learning Attacks on PUFs: A New Threat?
    Xu, Xiaolin
    Burleson, Wayne
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [50] Profiling side-channel attacks based on CNN model fusion
    Ni, Lei
    Wang, Pengjun
    Zhang, Yuejun
    Zhang, Huihong
    Li, Xiangyu
    Ni, Li
    Lv, Jie
    Zheng, Weifang
    MICROELECTRONICS JOURNAL, 2023, 139