Differentially private client-side data deduplication protocol for cloud storage services

被引:26
作者
Shin, Youngjoo [1 ,2 ]
Kim, Kwangjo [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Dept Comp Sci, Taejon 305701, South Korea
[2] ETRI, Attached Inst, Taejon, South Korea
关键词
cloud storage; secure data deduplication; storage gateway; differential privacy; information leakage-resilient protocol;
D O I
10.1002/sec.1159
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage service providers apply data client-side deduplication across multiple users to achieve cost savings of network bandwidth and disk storage. However, deduplication can be used as a side channel by attackers who try to obtain sensitive information of other users' data. We propose a differentially private client-side deduplication protocol. A storage gateway allows efficient data deduplication while reducing the risk of information leakage. Its security can be strongly guaranteed according to the definition of differential privacy. We evaluate the effectiveness and efficiency of the proposed protocol through experiments. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2114 / 2123
页数:10
相关论文
共 13 条
[1]  
[Anonymous], P 2012 5 INT C NEW T
[2]  
[Anonymous], J PRIVACY CONFIDENTI
[3]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[4]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[5]  
Fahl S., 2012, PROC P 2012 ACM C CO, P50
[6]   Side Channels in Cloud Services Deduplication in Cloud Storage [J].
Harnik, Danny ;
Pinkas, Benny ;
Shulman-Peleg, Alexandra .
IEEE SECURITY & PRIVACY, 2010, 8 (06) :40-47
[7]  
Krawczyk H, 2013, LECT NOTES COMPUT SC, V8042, P429, DOI 10.1007/978-3-642-40041-4_24
[8]  
Mulazzani M., 2011, USENIX SEC S, P65
[9]   Robust de-anonymization of large sparse datasets [J].
Narayanan, Arvind ;
Shmatikov, Vitaly .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :111-125
[10]  
Russell D., 2010, DATA DEDUPLICATION W