Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication

نویسندگان

چکیده

In cloud storage, client-side deduplication is widely used to reduce storage and communication costs. deduplication, if the server detects that user's outsourced data have been stored, then clients will not need reupload data. However, information on whether be uploaded can as a side-channel, which consequently exploited by adversaries compromise privacy. this paper, we propose new threat model against side-channel attacks. Different from existing schemes, adversary could learn approximate ratio of stored chunks unstored in files, affect probability compromises privacy through Under model, design two defense schemes minimize leakage, both interaction protocols between during checks We analyze security our evaluate their performances based real-world dataset. Compared with better mitigate leakage slightly lower cost.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side channel parameter characteristics of code injection attacks

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

متن کامل

Algebraic Side-Channel Attacks

In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear wether these attacks can be successfully applied in general and to a large class of ciphers. In this paper, w...

متن کامل

Channel Equalization for Side Channel Attacks

This paper introduces the use of channel equalization as a method of reducing the computational complexity of side channel analysis (SCA), by effectively collapsing all points in a power measurement trace into a single random variable. This uses a simple Finite Impulse Response (FIR) linear equalizer, which has been studied extensively in communications systems. In addition the estimation of a ...

متن کامل

Kangaroos in Side-Channel Attacks

Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithmbased systems significantly more unknown bits can be handled by using Pollard’s kangaroo method: if b bits are unknown then ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Tsinghua Science & Technology

سال: 2023

ISSN: ['1878-7606', '1007-0214']

DOI: https://doi.org/10.26599/tst.2021.9010071