Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing

被引:0
|
作者
Zhang, Fuyou [1 ]
Qi, Saiyu [1 ]
Yuan, Haoran [1 ]
Zhang, Meng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Message-locked encryption; Deduplication; Fog computing; Side-channel attack; EFFICIENT;
D O I
10.1007/978-3-030-38961-1_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication could greatly save the storage overhead of cloud server by eliminating duplicated data and retaining one copy. In order to ensure the data privacy, many researchers try to make deduplication feasible in ciphertext. A typical scheme is message-locked encryption (MLE) which takes cryptographic hash value of message as encryption key. However, MLE is vulnerable to side-channel attacks. To our knowledge, the existing schemes try to mitigate these attacks with either security drawbacks or expensive overhead. In this paper, we propose two new techniques to solve two typical side-channel attacks named probe attack and key-cache attack via fog computing with new security and efficiency tradeoffs. Built on the new techniques, we propose a secure data deduplication system in fog computing environment. Our evaluation shows that our system has better performance compared with previous works.
引用
收藏
页码:440 / 455
页数:16
相关论文
共 50 条
  • [31] An Evaluation of Power Side-Channel Resistance for RNS Secure Logic
    Selvam, Ravikumar
    Tyagi, Akhilesh
    SENSORS, 2022, 22 (06)
  • [32] Flexible parallel computing for elliptic curve scalar multiplication with resistance against simple side-channel attacks
    Wu K.
    Wu, Keke (wukk@sziit.edu.cn), 1600, Computer Society of the Republic of China (28): : 64 - 78
  • [33] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [34] Side-Channel Attacks on Query-Based Data Anonymization
    Boenisch, Franziska
    Munz, Reinhard
    Tiepelt, Marcel
    Hanisch, Simon
    Kuhn, Christiane
    Francis, Paul
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1254 - 1265
  • [35] DES with any reduced masked rounds is not secure against side-channel attacks
    Kim, Jongsung
    Lee, Yuseop
    Lee, Sangjin
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 347 - 354
  • [36] Secure deduplication with reliable and revocable key management in fog computing
    Hyunsoo Kwon
    Changhee Hahn
    Kyungtae Kang
    Junbeom Hur
    Peer-to-Peer Networking and Applications, 2019, 12 : 850 - 864
  • [37] Secure deduplication with reliable and revocable key management in fog computing
    Kwon, Hyunsoo
    Hahn, Changhee
    Kang, Kyungtae
    Hur, Junbeom
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (04) : 850 - 864
  • [38] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [39] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [40] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598