LAPSE:2023.23356
Published Article
LAPSE:2023.23356
Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms
Taek-Young Youn, Nam-Su Jho, Keonwoo Kim, Ku-Young Chang, Ki-Woong Park
March 27, 2023
Deduplication of encrypted data is a significant function for both the privacy of stored data and efficient storage management. Several deduplication techniques have been designed to provide improved security or efficiency. In this study, we focus on the client-side deduplication technique, which has more advantages than the server-side deduplication technique, particularly in communication overhead, owing to conditional data transmissions. From a security perspective, poison, dictionary, and identification attacks are considered as threats against client-side deduplication. Unfortunately, in contrast to other attacks, identification attacks and the corresponding countermeasures have not been studied in depth. In identification attacks, an adversary tries to identify the existence of a specific file. Identification attacks should be countered because adversaries can use the attacks to break the privacy of the data owner. Therefore, in the literature, some counter-based countermeasures have been proposed as temporary remedies for such attacks. In this paper, we present an analysis of the security features of deduplication techniques against identification attacks and show that the lack of security of the techniques can be eliminated by providing uncertainness to the conditional responses in the deduplication protocol, which are based on the existence of files. We also present a concrete countermeasure, called the time-locked deduplication technique, which can provide uncertainness to the conditional responses by withholding the operation of the deduplication functionality until a predefined time. An additional cost for locking is incurred only when the file to be stored does not already exist in the server’s storage. Therefore, our technique can improve the security of client-side deduplication against identification attacks at almost the same cost as existing techniques, except in the case of files uploaded for the first time.
Keywords
data storage systems, encrypted storage, encryption, identification attack, privacy
Suggested Citation
Youn TY, Jho NS, Kim K, Chang KY, Park KW. Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms. (2023). LAPSE:2023.23356
Author Affiliations
Youn TY: Electronics and Telecommunications Research Institute (ETRI), 218 Gajeong-ro, Yuseong-gu, Daejeon 34128, Korea [ORCID]
Jho NS: Electronics and Telecommunications Research Institute (ETRI), 218 Gajeong-ro, Yuseong-gu, Daejeon 34128, Korea
Kim K: Electronics and Telecommunications Research Institute (ETRI), 218 Gajeong-ro, Yuseong-gu, Daejeon 34128, Korea
Chang KY: Electronics and Telecommunications Research Institute (ETRI), 218 Gajeong-ro, Yuseong-gu, Daejeon 34128, Korea
Park KW: Department of Computer and Information Security, Sejong University, 209 NeungDong-Ro, Gwangjin-Gu, Seoul 05006, Korea [ORCID]
Journal Name
Energies
Volume
13
Issue
11
Article Number
E2742
Year
2020
Publication Date
2020-05-29
Published Version
ISSN
1996-1073
Version Comments
Original Submission
Other Meta
PII: en13112742, Publication Type: Journal Article
Record Map
Published Article

LAPSE:2023.23356
This Record
External Link

doi:10.3390/en13112742
Publisher Version
Download
Files
[Download 1v1.pdf] (330 kB)
Mar 27, 2023
Main Article
License
CC BY 4.0
Meta
Record Statistics
Record Views
72
Version History
[v1] (Original Submission)
Mar 27, 2023
 
Verified by curator on
Mar 27, 2023
This Version Number
v1
Citations
Most Recent
This Version
URL Here
https://psecommunity.org/LAPSE:2023.23356
 
Original Submitter
Auto Uploader for LAPSE
Links to Related Works
Directly Related to This Work
Publisher Version