Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication

16Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

In cloud storage, client-side deduplication is widely used to reduce storage and communication costs. In client-side deduplication, if the cloud server detects that the user's outsourced data have been stored, then clients will not need to reupload the data. However, the information on whether data need to be uploaded can be used as a side-channel, which can consequently be exploited by adversaries to compromise data privacy. In this paper, we propose a new threat model against side-channel attacks. Different from existing schemes, the adversary could learn the approximate ratio of stored chunks to unstored chunks in outsourced files, and this ratio will affect the probability that the adversary compromises the data privacy through side-channel attacks. Under this threat model, we design two defense schemes to minimize privacy leakage, both of which design interaction protocols between clients and the server during deduplication checks to reduce the probability that the adversary compromises data privacy. We analyze the security of our schemes, and evaluate their performances based on a real-world dataset. Compared with existing schemes, our schemes can better mitigate data privacy leakage and have a slightly lower communication cost.

Cite

CITATION STYLE

APA

Ha, G., Chen, H., Jia, C., & Li, M. (2023). Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication. Tsinghua Science and Technology, 28(1), 1–12. https://doi.org/10.26599/TST.2021.9010071

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free