Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3555776.3577711acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article
Open access

Deduplication vs Privacy Tradeoffs in Cloud Storage

Published: 07 June 2023 Publication History

Abstract

Users often encrypt files they store on cloud storage services to ensure data privacy. Unfortunately, without additional mechanisms, encrypting files prevents the use of server-side deduplication as two identical files will be different when encrypted. Encrypted deduplication techniques combines file encryption and data deduplication. This combination usually requires some form of direct or indirect coordination between the different clients.
In this paper, we address the problem of reconciling the need to encrypt data with the advantages of deduplication. In particular, we study techniques that achieve this objective while avoiding frequency analysis attacks, i.e., attacks that infer the content of an encrypted file based on how frequently the file is stored and/or accessed. We propose a new protocol for assigning encryption keys to files that leverages the use of trusted execution environments to hide the frequencies of chunks from the adversary.

References

[1]
Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. 2013. Message-locked encryption and secure deduplication. In International Conference on the Theory and Applications of Cryptographic Techniques. Athens, Greece.
[2]
Jan Camenisch, Gregory Neven, and Abhi Shelat. 2007. Simulatable adaptive oblivious transfer. In International Conference on the Theory and Applications of Cryptographic Techniques. Barcelona, Spain.
[3]
Cláudio Correia, Miguel Correia, and Luís Rodrigues. 2020. Omega: a secure event ordering service for the edge. In IEEE/IFIP International Conference on Dependable Systems and Networks. Valencia, Spain.
[4]
Boxiang Dong, Ruilin Liu, and Wendy Hui Wang. 2014. PraDa: Privacy-preserving Data-Deduplication-as-a-Service. In International Conference on Conference on Information and Knowledge Management. Shanghai, China.
[5]
Dropbox. 2008. Retrieved 2022-10-14 from https://dropbox.com/
[6]
Morris Dworkin. 2010. SP 800-38E. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. Retrieved 2022-10-14 from https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=904691
[7]
Muhammad El-Hindi, Tobias Ziegler, Matthias Heinrich, Adrian Lutsch, Zheguang Zhao, and Carsten Binnig. 2022. Benchmarking the Second Generation of Intel SGX Hardware. In International Conference on Management of Data. Philadelphia, PA, USA.
[8]
Google Drive. 2012. Retrieved 2022-10-14 from https://www.google.com/drive/
[9]
Mireya Jurado and Geoffrey Smith. 2019. Quantifying Information Leakage of Deterministic Encryption. In International Conference on Cloud Computing Security Workshop. London, United Kingdom.
[10]
Sriram Keelveedhi, Mihir Bellare, and Thomas Ristenpart. 2013. DupLESS: Server-aided encryption for deduplicated storage. In Security Symposium USENIX Security. Washington D.C., USA.
[11]
Jingwei Li, Zuoru Yang, Yanjing Ren, Patrick Lee, and Xiaosong Zhang. 2020. Balancing Storage Efficiency and Data Confidentiality with Tunable Encrypted Deduplication. In European Conference on Computer Systems. Heraklion, Greece.
[12]
Dutch Meyer and William Bolosky. 2012. A study of practical deduplication. ACM Transactions on Storage 7 (2012), 1--20.
[13]
Mariana Miranda, Tânia Esteves, Bernardo Portela, and João Paulo. 2021. S2Dedup: SGX-Enabled Secure Deduplication. In International Conference on Systems and Storage. Haifa, Israel.
[14]
Moni Naor and Omer Reingold. 2004. Number-theoretic constructions of efficient pseudo-random functions. Journal of the ACM (JACM) 51 (2004), 231--252.
[15]
Live Optics. 2022. Read and write ratio. Retrieved 2022-10-14 from https://support.liveoptics.com/hc/en-us/articles/229590547-Live-Optics-Basics-Read-Write-Ratio
[16]
Yanjing Ren, Jingwei Li, Zuoru Yang, Patrick PC Lee, and Xiaosong Zhang. 2021. Accelerating Encrypted Deduplication via SGX. In USENIX Annual Technical Conference. Remotely.
[17]
SGX101. 2019. Overview - SGX 101. Retrieved 2022-10-14 from http://sgx101.gitbook.io/sgx101/sgx-bootstrap/overview
[18]
SPDK. 2015. Spdk github. Retrieved 2022-10-14 from https://github.com/spdk/spdk
[19]
SPDK. 2017. Storage performance development kit. Retrieved 2022-10-14 from https://spdk.io/
[20]
Grant Wallace, Fred Douglis, Hangwei Qian, Philip Shilane, Stephen Smaldone, Mark Chamness, and Windsor Hsu. 2012. Characteristics of backup workloads in production systems. In International conference on File and Storage Technologies. San Jose, CA, USA.
[21]
Grant Wallace, Fred Douglis, Hangwei Qian, Philip Shilane, Stephen Smaldone, Mark Chamness, and Windsor Hsu. 2012. Characteristics of backup workloads in production systems. In USENIX Conference on File and Storage Technologies. San Jose, CA, USA.
[22]
Zuoru Yang, Jingwei Li, and Patrick PC Lee. 2022. Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption. In USENIX Annual Technical Conference. Carlsbad, CA, USA.

Cited By

View all
  • (2024)A randomized encryption deduplication method against frequency attackJournal of Information Security and Applications10.1016/j.jisa.2024.10377483(103774)Online publication date: Jun-2024

Index Terms

  1. Deduplication vs Privacy Tradeoffs in Cloud Storage

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing
    March 2023
    1932 pages
    ISBN:9781450395175
    DOI:10.1145/3555776
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 June 2023

    Check for updates

    Author Tags

    1. privacy
    2. deduplication
    3. cloud computing

    Qualifiers

    • Research-article

    Funding Sources

    • Fundação para a Ciência e a Tecnologia (FCT)

    Conference

    SAC '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)139
    • Downloads (Last 6 weeks)22
    Reflects downloads up to 16 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A randomized encryption deduplication method against frequency attackJournal of Information Security and Applications10.1016/j.jisa.2024.10377483(103774)Online publication date: Jun-2024

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media