Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications

被引:17
|
作者
Zhang, Yuan [1 ,2 ]
Mao, Yunlong [1 ,2 ]
Xu, Minze [1 ,2 ]
Xu, Fengyuan [1 ,2 ]
Zhong, Sheng [1 ,2 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210023, Peoples R China
[2] Nanjing Univ, Comp Sci & Technol Dept, Nanjing 210023, Peoples R China
基金
国家重点研发计划;
关键词
Servers; Protocols; Cloud computing; Privacy; Encryption; Side-channel attacks; Cloud; secure deduplication; privacy; proofs of ownership; EFFICIENT;
D O I
10.1109/TDSC.2019.2911502
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As one of a few critical technologies to cloud storage service, deduplication allows cloud servers to save storage space by deleting redundant file copies. However, it often leaks side channel information regarding whether an uploading file gets deduplicated or not. Exploiting this information, adversaries can easily launch a template side-channel attack and severely harm cloud users' privacy. To thwart this kind of attack, we resort to the k-anonymity privacy concept to design secure threshold deduplication protocols. Specifically, we have devised a novel cryptographic primitive called "dispersed convergent encryption" (DCE) scheme, and proposed two different constructions of it. With these DCE schemes, we successfully construct secure threshold deduplication protocols that do not rely on any trusted third party. Our protocols not only support confidentiality protections and ownership verifications, but also enjoy formal security guarantee against template side-channel attacks even when the cloud server could be a "covert adversary" who may violate the predefined threshold and perform deduplication covertly. Experimental evaluations show our protocols enjoy very good performance in practice.
引用
收藏
页码:1008 / 1018
页数:11
相关论文
共 50 条
  • [41] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [42] Anonymous CP-ABE Against Side-Channel Attacks in Cloud Computing
    Zhang, Jing-Xia
    Zhang, Le-You
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 789 - 805
  • [43] Cross-VM Covert- and Side-Channel Attacks in Cloud FPGAs
    Giechaskiel, Ilias
    Tian, Shanquan
    Szefer, Jakub
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2023, 16 (01)
  • [44] Design Issues of the Side-Channel Attacks Protecting Scheme in Cloud Computing Environment
    Yang, Shin-Jer
    Yen, Chia-Chi
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (03): : 713 - 721
  • [45] Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks
    Kroeger, Trevor
    Cheng, Wei
    Guilley, Sylvain
    Danger, Jean-Luc
    Karimi, Nazhmeh
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1000 - 1005
  • [46] Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks
    Chen, Zhimin
    Sinha, Ambuj
    Schaumont, Patrick
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (01) : 124 - 136
  • [47] How to secure scan design against scan-based side-channel attacks?
    Zhou, Wei
    Cui, Aijiao
    Li, Huawei
    Qu, Gang
    2017 IEEE 26TH ASIAN TEST SYMPOSIUM (ATS), 2017, : 116 - 121
  • [48] Thwarting side-channel analysis against RSA cryptosystems with additive blinding
    Kim, HeeSeok
    INFORMATION SCIENCES, 2017, 412 : 36 - 49
  • [49] Towards Side-Channel Secure Firmware Updates A Minimalist Anomaly Detection Approach
    Guillen, Oscar M.
    De Santis, Fabrizio
    Brederlow, Ralf
    Sigl, Georg
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 345 - 360
  • [50] Towards Secure Communications: Review of Side Channel Attacks and Countermeasures on ECC
    Tawalbeh, Lo'ai A.
    Somani, Turki F.
    Houssain, Hilal
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 87 - 91