Skip to main content

Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11945))

Abstract

Deduplication could greatly save the storage overhead of cloud server by eliminating duplicated data and retaining one copy. In order to ensure the data privacy, many researchers try to make deduplication feasible in ciphertext. A typical scheme is message-locked encryption (MLE) which takes cryptographic hash value of message as encryption key. However, MLE is vulnerable to side-channel attacks. To our knowledge, the existing schemes try to mitigate these attacks with either security drawbacks or expensive overhead. In this paper, we propose two new techniques to solve two typical side-channel attacks named probe attack and key-cache attack via fog computing with new security and efficiency tradeoffs. Built on the new techniques, we propose a secure data deduplication system in fog computing environment. Our evaluation shows that our system has better performance compared with previous works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmad, M., Amin, M.B., Hussain, S., Kang, B.H., Cheong, T., Lee, S.: Health fog: a novel framework for health and wellness applications. J. Supercomput. 72(10), 3677–3695 (2016). https://doi.org/10.1007/s11227-016-1634-x

    Article  Google Scholar 

  2. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38348-9_18

    Chapter  Google Scholar 

  3. Black, J.: Compare-by-hash: a reasoned analysis. In: Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, 30 May–3 June 2006, pp. 85–90 (2006). http://www.usenix.org/events/usenix06/tech/black.html

  4. Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005). https://doi.org/10.1007/11535218_16

    Chapter  Google Scholar 

  5. Bonomi, F., Milito, R.A., Zhu, J., Addepalli, S.: Fog computing and its role in the Internet of Things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC@SIGCOMM 2012, Helsinki, Finland, 17 August 2012, pp. 13–16 (2012). https://doi.org/10.1145/2342509.2342513

  6. Chen, X., Li, J., Huang, X., Ma, J., Lou, W.: New publicly verifiable databases with efficient updates. IEEE Trans. Dependable Sec. Comput. 12(5), 546–556 (2015). https://doi.org/10.1109/TDSC.2014.2366471

    Article  Google Scholar 

  7. Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014). https://doi.org/10.1109/TPDS.2013.180

    Article  MATH  Google Scholar 

  8. Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: ICDCS, pp. 617–624 (2002). https://doi.org/10.1109/ICDCS.2002.1022312

  9. Eijs, H.: Pycryptodome-the Python cryptography toolkit. https://pypi.org/project/pycryptodome/ (2019)

  10. Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48329-2_40

    Chapter  Google Scholar 

  11. Goldwasser, S., Bellare, M.: Lecture notes on cryptography. Summer course “Cryptography and computer security” at MIT 1999 (1996)

    Google Scholar 

  12. Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, 17–21 October 2011, pp. 491–500 (2011). https://doi.org/10.1145/2046707.2046765

  13. Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Secur. Priv. 8(6), 40–47 (2010). https://doi.org/10.1109/MSP.2010.187

    Article  Google Scholar 

  14. Hong, K., Lillethun, D.J., Ramachandran, U., Ottenwälder, B., Koldehofe, B.: Mobile fog: a programming model for large-scale applications on the Internet of Things. In: Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, MCC@SIGCOMM 2013, Hong Kong, China, 16 August 2013, pp. 15–20 (2013). https://doi.org/10.1145/2491266.2491270

  15. Huang, H., Chen, X., Wu, Q., Huang, X., Shen, J.: Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comp. Syst. 78, 850–858 (2018)

    Article  Google Scholar 

  16. Huang, Q., Yang, Y., Wang, L.: Correction to “secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things”. IEEE Access 6, 17245 (2018)

    Article  Google Scholar 

  17. Jiang, T., Chen, X., Wu, Q., Ma, J., Susilo, W., Lou, W.: Secure and efficient cloud data deduplication with randomized tag. IEEE Trans. Inf. Forensics Secur. 12(3), 532–543 (2017)

    Article  Google Scholar 

  18. Keelveedhi, S., Bellare, M., Ristenpart, T.: DupLESS: server-aided encryption for deduplicated storage. In: Presented as part of the 22nd USENIX Security Symposium (USENIX Security 2013), pp. 179–194. USENIX, Washington, D.C. (2013). https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/bellare

  19. Koo, D., Hur, J.: Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener. Comp. Syst. 78, 739–752 (2018)

    Article  Google Scholar 

  20. Li, J., Chen, X., Li, M., Li, J., Lee, P.P.C., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2014). https://doi.org/10.1109/TPDS.2013.284

    Article  Google Scholar 

  21. Li, J., Qin, C., Lee, P.P.C., Li, J.: Rekeying for encrypted deduplication storage. In: 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016, Toulouse, France, 28 June–1 July 2016, pp. 618–629 (2016). https://doi.org/10.1109/DSN.2016.62

  22. Li, M., Qin, C., Lee, P.P.C.: CDStore: toward reliable, secure, and cost-efficient cloud storage via convergent dispersal. In: USENIX Annual Technical Conference, pp. 111–124. USENIX Association (2015)

    Google Scholar 

  23. Litzenberger, D.C.: Pycrypto-the Python cryptography toolkit. https://www.dlitz.net/software/pycrypto (2016)

  24. Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015, pp. 874–885 (2015). https://doi.org/10.1145/2810103.2813623

  25. Liu, J., Duan, L., Li, Y., Asokan, N.: Secure deduplication of encrypted data: refined model and new constructions. In: Smart, N.P. (ed.) CT-RSA 2018. LNCS, vol. 10808, pp. 374–393. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-76953-0_20

    Chapter  Google Scholar 

  26. Madsen, H., Burtschy, B., Albeanu, G., Popentiu-Vladicescu, F.: Reliability in the utility computing era: Towards reliable fog computing. In: 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 43–46, July 2013. https://doi.org/10.1109/IWSSIP.2013.6623445

  27. Miao, M., Wang, J., Li, H., Chen, X.: Secure multi-server-aided data deduplication in cloud computing. Pervasive Mob. Comput. 24, 129–137 (2015)

    Article  Google Scholar 

  28. Ni, J., Lin, X., Zhang, K., Yu, Y.: Secure and deduplicated spatial crowdsourcing: a fog-based approach. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–6, December 2016. https://doi.org/10.1109/GLOCOM.2016.7842248

  29. Rivest, R.L.: All-or-nothing encryption and the package transform. In: Fast Software Encryption, 4th International Workshop, FSE 1997, Haifa, Israel, 20–22 January 1997, Proceedings, pp. 210–218 (1997). https://doi.org/10.1007/BFb0052348

  30. Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, 7–10 September 2014, pp. 1–8 (2014). https://doi.org/10.15439/2014F503

  31. Vaquero, L.M., Rodero-Merino, L.: Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 44(5), 27–32 (2014)

    Article  Google Scholar 

  32. Wang, J., Chen, X., Li, J., Kluczniak, K., Kutylowski, M.: TrDUP: enhancing secure data deduplication with user traceability in cloud computing. IJWGS 13(3), 270–289 (2017)

    Article  Google Scholar 

  33. Wang, Y., Uehara, T., Sasaki, R.: Fog computing: issues and challenges in security and forensics. In: 39th Annual Computer Software and Applications Conference, COMPSAC Workshops 2015, Taichung, Taiwan, 1–5 July 2015, pp. 53–59 (2015). https://doi.org/10.1109/COMPSAC.2015.173

  34. Xiang, Y., Bertino, E., Kutylowski, M.: Security and privacy in social networks. Concurr. Comput.: Pract. Exp. 29(7) (2017)

    Google Scholar 

  35. Yu, Z., Au, M.H., Xu, Q., Yang, R., Han, J.: Towards leakage-resilient fine-grained access control in fog computing. Future Generation Comp. Syst. 78, 763–777 (2018). https://doi.org/10.1016/j.future.2017.01.025

    Article  Google Scholar 

  36. Yuan, H., Chen, X., Jiang, T., Zhang, X., Yan, Z., Xiang, Y.: DedupDUM: secure and scalable data deduplication with dynamic user management. Inf. Sci. 456, 159–173 (2018)

    Article  Google Scholar 

  37. Zhang, X., Jiang, T., Li, K., Castiglione, A., Chen, X.: New publicly verifiable computation for batch matrix multiplication. Inf. Sci. 479, 664–678 (2019)

    Article  Google Scholar 

Download references

Acknowledgement

We acknowledge the support from National Natural Science Foundation of China (No. 61602363), China Postdoctoral Science Foundation (No. 2016M590927), National Cryptography Development Fund (No. MMJJ20180110) and Graduate Innovation Foundation, School of Cyber Engineering, Xidian University (No. 20109194858).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saiyu Qi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, F., Qi, S., Yuan, H., Zhang, M. (2020). Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing. In: Wen, S., Zomaya, A., Yang, L.T. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2019. Lecture Notes in Computer Science(), vol 11945. Springer, Cham. https://doi.org/10.1007/978-3-030-38961-1_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-38961-1_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-38960-4

  • Online ISBN: 978-3-030-38961-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics