Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication
نویسندگان
چکیده
In cloud storage, client-side deduplication is widely used to reduce storage and communication costs. deduplication, if the server detects that user's outsourced data have been stored, then clients will not need reupload data. However, information on whether be uploaded can as a side-channel, which consequently exploited by adversaries compromise privacy. this paper, we propose new threat model against side-channel attacks. Different from existing schemes, adversary could learn approximate ratio of stored chunks unstored in files, affect probability compromises privacy through Under model, design two defense schemes minimize leakage, both interaction protocols between during checks We analyze security our evaluate their performances based real-world dataset. Compared with better mitigate leakage slightly lower cost.
منابع مشابه
Side channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملAlgebraic Side-Channel Attacks
In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear wether these attacks can be successfully applied in general and to a large class of ciphers. In this paper, w...
متن کاملChannel Equalization for Side Channel Attacks
This paper introduces the use of channel equalization as a method of reducing the computational complexity of side channel analysis (SCA), by effectively collapsing all points in a power measurement trace into a single random variable. This uses a simple Finite Impulse Response (FIR) linear equalizer, which has been studied extensively in communications systems. In addition the estimation of a ...
متن کاملKangaroos in Side-Channel Attacks
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithmbased systems significantly more unknown bits can be handled by using Pollard’s kangaroo method: if b bits are unknown then ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Tsinghua Science & Technology
سال: 2023
ISSN: ['1878-7606', '1007-0214']
DOI: https://doi.org/10.26599/tst.2021.9010071