Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications

被引:17
|
作者
Zhang, Yuan [1 ,2 ]
Mao, Yunlong [1 ,2 ]
Xu, Minze [1 ,2 ]
Xu, Fengyuan [1 ,2 ]
Zhong, Sheng [1 ,2 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210023, Peoples R China
[2] Nanjing Univ, Comp Sci & Technol Dept, Nanjing 210023, Peoples R China
基金
国家重点研发计划;
关键词
Servers; Protocols; Cloud computing; Privacy; Encryption; Side-channel attacks; Cloud; secure deduplication; privacy; proofs of ownership; EFFICIENT;
D O I
10.1109/TDSC.2019.2911502
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As one of a few critical technologies to cloud storage service, deduplication allows cloud servers to save storage space by deleting redundant file copies. However, it often leaks side channel information regarding whether an uploading file gets deduplicated or not. Exploiting this information, adversaries can easily launch a template side-channel attack and severely harm cloud users' privacy. To thwart this kind of attack, we resort to the k-anonymity privacy concept to design secure threshold deduplication protocols. Specifically, we have devised a novel cryptographic primitive called "dispersed convergent encryption" (DCE) scheme, and proposed two different constructions of it. With these DCE schemes, we successfully construct secure threshold deduplication protocols that do not rely on any trusted third party. Our protocols not only support confidentiality protections and ownership verifications, but also enjoy formal security guarantee against template side-channel attacks even when the cloud server could be a "covert adversary" who may violate the predefined threshold and perform deduplication covertly. Experimental evaluations show our protocols enjoy very good performance in practice.
引用
收藏
页码:1008 / 1018
页数:11
相关论文
共 50 条
  • [21] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):
  • [22] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [23] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [24] Preventing Cache-Based Side-Channel Attacks in a Cloud Environment
    Godfrey, Michael
    Zulkernine, Mohammad
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 395 - 408
  • [25] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [26] A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud
    Godfrey, Michael
    Zulkernine, Mohammad
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 163 - 170
  • [27] Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing
    Zhang, Fuyou
    Qi, Saiyu
    Yuan, Haoran
    Zhang, Meng
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II, 2020, 11945 : 440 - 455
  • [28] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [29] DES with any reduced masked rounds is not secure against side-channel attacks
    Kim, Jongsung
    Lee, Yuseop
    Lee, Sangjin
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 347 - 354
  • [30] Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments
    Vateva-Gurova, Tsvetoslava
    Luna, Jesus
    Pellegrino, Giancarlo
    Suri, Neeraj
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 113 - 124