Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing

被引:0
|
作者
Zhang, Fuyou [1 ]
Qi, Saiyu [1 ]
Yuan, Haoran [1 ]
Zhang, Meng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Message-locked encryption; Deduplication; Fog computing; Side-channel attack; EFFICIENT;
D O I
10.1007/978-3-030-38961-1_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication could greatly save the storage overhead of cloud server by eliminating duplicated data and retaining one copy. In order to ensure the data privacy, many researchers try to make deduplication feasible in ciphertext. A typical scheme is message-locked encryption (MLE) which takes cryptographic hash value of message as encryption key. However, MLE is vulnerable to side-channel attacks. To our knowledge, the existing schemes try to mitigate these attacks with either security drawbacks or expensive overhead. In this paper, we propose two new techniques to solve two typical side-channel attacks named probe attack and key-cache attack via fog computing with new security and efficiency tradeoffs. Built on the new techniques, we propose a secure data deduplication system in fog computing environment. Our evaluation shows that our system has better performance compared with previous works.
引用
收藏
页码:440 / 455
页数:16
相关论文
共 50 条
  • [21] Circuits and design techniques for secure ICs resistant to side-channel attacks
    Verbauwhede, I.
    Tiri, K.
    Hwang, D.
    Schaumont, P.
    2006 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUIT DESIGN AND TECHNOLOGY, PROCEEDINGS, 2006, : 57 - +
  • [22] MEAS: memory encryption and authentication secure against side-channel attacks
    Thomas Unterluggauer
    Mario Werner
    Stefan Mangard
    Journal of Cryptographic Engineering, 2019, 9 : 137 - 158
  • [23] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [24] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):
  • [25] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [26] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [27] Tamper Resistance of Contactless IC Card to Side-Channel Attacks
    Kanno, Tetsutarou
    Iwai, Keisuke
    Kurokawa, Takakazu
    PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 126 - 133
  • [28] Avoiding Side-Channel Attacks by Computing Isogenous and Isomorphic Elliptic Curves
    Abarzua, Rodrigo
    Martinez, Santi
    Mendoza, Valeria
    Valera, Javier
    MATHEMATICS IN COMPUTER SCIENCE, 2018, 12 (03) : 295 - 307
  • [29] Cloud Aid - A Cloud Computing Tool for Mitigating Side-Channel Attacks
    Gomes, Ricardo Bianchin
    Medina, Roseclea Duarte
    Moro, Fernando Gomes
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [30] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575