Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing

被引:0
|
作者
Zhang, Fuyou [1 ]
Qi, Saiyu [1 ]
Yuan, Haoran [1 ]
Zhang, Meng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Message-locked encryption; Deduplication; Fog computing; Side-channel attack; EFFICIENT;
D O I
10.1007/978-3-030-38961-1_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication could greatly save the storage overhead of cloud server by eliminating duplicated data and retaining one copy. In order to ensure the data privacy, many researchers try to make deduplication feasible in ciphertext. A typical scheme is message-locked encryption (MLE) which takes cryptographic hash value of message as encryption key. However, MLE is vulnerable to side-channel attacks. To our knowledge, the existing schemes try to mitigate these attacks with either security drawbacks or expensive overhead. In this paper, we propose two new techniques to solve two typical side-channel attacks named probe attack and key-cache attack via fog computing with new security and efficiency tradeoffs. Built on the new techniques, we propose a secure data deduplication system in fog computing environment. Our evaluation shows that our system has better performance compared with previous works.
引用
收藏
页码:440 / 455
页数:16
相关论文
共 50 条
  • [1] Secure Deduplication-Based Storage Systems With Resistance to Side-Channel Attacks via Fog Computing
    Lu, Youshui
    Qi, Yong
    Qi, Saiyu
    Zhang, Fuyou
    Wei, Wei
    Yang, Xu
    Zhang, Jingning
    Dong, Xinpei
    IEEE SENSORS JOURNAL, 2022, 22 (18) : 17529 - 17541
  • [2] Modeling The Side-Channel Attacks in Data Deduplication with Game Theory
    Wang, Bing
    Lou, Wenjing
    Hou, Y. Thomas
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 200 - 208
  • [3] Secure and efficient big data deduplication in fog computing
    Yan, Jiajun
    Wang, Xiaoming
    Gan, Qingqing
    Li, Suyu
    Huang, Daxin
    SOFT COMPUTING, 2020, 24 (08) : 5671 - 5682
  • [4] Secure and efficient big data deduplication in fog computing
    Jiajun Yan
    Xiaoming Wang
    Qingqing Gan
    Suyu Li
    Daxin Huang
    Soft Computing, 2020, 24 : 5671 - 5682
  • [5] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [6] Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing
    Koo, Dongyoung
    Shin, Youngjoo
    Yun, Joobeom
    Hur, Junbeom
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 285 - 293
  • [7] Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication
    Ha, Guanxiong
    Chen, Hang
    Jia, Chunfu
    Li, Mingyue
    TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (01): : 1 - 12
  • [8] Efficient Solution to Secure ECC Against Side-channel Attacks
    Wu Keke
    Li Huiyun
    Zhu Dingju
    Yu Fengqi
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 471 - 475
  • [9] SecDir: A Secure Directory to Defeat Directory Side-Channel Attacks
    Yan, Mengjia
    Wen, Jen-Yang
    Fletcher, Christopher W.
    Torrellas, Josep
    PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, : 332 - 345
  • [10] How secure is your cache against side-channel attacks?
    He, Zecheng
    Lee, Ruby B.
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 341 - 353