Abstract:Appending chunk attack is an important attack to threaten the security of cross-user deduplication for cloud data,which works by appending a random number of non-duplicate chunks to the file to be detected,making it impossible for cloud service providers to determine the true existence of the file. Therefore,the existence privacy of cloud data cannot be protected by general ways of response obfuscation methods. To deal with this problem,a new response obfuscation based secure deduplication method with resistance against appending chunk attack was proposed. By calculating the number of appending chunks,counting the number of non-duplicate chunks and comparing these two to determine the minimum number of redundant chunks involved in the response,so as to achieve the obfuscation. As a result,the existence of the checking file was not able to be judged by the attacker according to the response with little extra communication overhead. Security analysis and experimental results show that,compared with the state-of-the-art in this field,the proposed method achieves higher level of security with smaller amount of overhead required,or improves security significantly with comparable or slightly increased overhead.
唐鑫, 周琳娜. 基于响应模糊化的抗附加块攻击云数据安全去重方法[J]. 计算机应用, 2020, 40(4): 1085-1090.
TANG Xin, ZHOU Linna. Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack. Journal of Computer Applications, 2020, 40(4): 1085-1090.
[1] NIKALJE S,KUMARI R,INGOLE S. Smart distributed deduplication system with security and reliability using algorithm[J]. International Journal of Innovative Research in Science and Engineering, 2016,2(3):612-621. [2] YU C M,GOCHHAYAT S P,CONTI M,et al. Privacy aware data deduplication for side channel in cloud storage[J]. IEEE Transaction on Cloud Computing,2018(Early Access):1-1. [3] ARMKNECHT F,BOYD C,DAVIES G Tet al. Side channels in deduplication:trade-offs between leakage and efficiency[C]//Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. New York:ACM,2017:266-274. [4] HARNIK D,PINKAS B,SHULMAN-PELEG A. Side channels in cloud services:deduplication in cloud storage[J]. IEEE Security and Privacy,2010,8(6):40-47. [5] ZUO P,HUA Y,WANG C,et al. Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage[C]//Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium. Piscataway:IEEE,2018:1153-1162. [6] POORANIAN Z,CHEN K C,YU C M,et al. RARE:defeating side channels based on data-deduplication in cloud storage[C]//Proceedings of the 2018 IEEE Conference on Computer Communications Workshops. Piscataway:IEEE,2018:444-449. [7] LIU J,ASOKAN N,PINKAS B. Secure deduplication of encrypted data without additional independent servers[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM,2015:874-885. [8] KWON H,HAHN C,KOO D,et al. Scalable and reliable key management for secure deduplication in cloud storage[C]//Proceedings of the 10th IEEE International Conference on Cloud Computing. Piscataway:IEEE,2017:391-398. [9] BELLARE M,KEELVEEDHI S,RISTENPART T. DupLESS:server-aided encryption for deduplication in cloud storage[C]//Proceedings of the 22nd USENIX Security Symposium. Berkeley:USENIX Association,2013:179-194. [10] NI J,ZHANG K,YU Y,et al. Providing task allocation and secure deduplication for mobile crowdsensing via fog computing[J]. IEEE Transactions on Dependable and Secure Computing, 2018(Early Access):1-1. [11] DANG H,CHANG E C. Privacy-preserving data deduplication on trusted processors[C]//Proceedings of the 10th IEEE International Conference on Cloud Computing. Piscataway:IEEE, 2017:66-73. [12] ZHANG K,LIANG X,LU R X,et al. Sybil attacks and their defenses in the Internet of things[J]. IEEE Internet of Things Journal,2014,1(5):372-383. [13] DOUCEUR J R,ADYA A,BOLOSKY W J,et al. Reclaiming space from duplicate files in a serverless distributed file system[C]//Proceedings of the 22nd International Conference on Distributed Computing Systems. Piscataway:IEEE,2002:617-624. [14] 唐鑫,周琳娜,胡冰蔚,等. 云数据去重方法及系统:CN201911237434.2[P]. 2019-12-05.(TANG X,ZHOU L N, HU B W,et al. Deduplication method and system for cloud data:CN201911237434.2[P]. 2019-12-05.) [15] TARASOV V,MUDRANKIT A,BUIK W,et al. Generating realistic datasets for deduplication analysis[C]//Proceedings of the 2012 USENIX Annual Technical Conference. Berkeley:USENIX Association,2012:No. 129. [16] XIA W,JIANG H,FENG D,et al. SiLo:a similarity-locality based near-exact deduplication scheme with low RAN overhead and high throughput[C]//Proceedings of the 2011 USENIX Annual Technical Conference. Berkeley:USENIX Association,2011:26-28.