Venue | Category |
---|---|
Spinger ICSP'19 | Secure Deduplication |
Bloom Filter Based Privacy Preserving Deduplication System1. SummaryMotivation of this paperBloom Filter privacy perserving deduplication approachImplementation and Evaluation2. Strength (Contributions of the paper)3. Weakness (Limitations of the paper)4. Future Works
Deduplication can be used as a side channel to learn the existence of a particular data in cloud storage .
the existing solutions delay deduplication process to hide information regarding the presence of data. increase the communication overhead, even if the data is present on storage.
This paper wants to solve this problem via using a bloom filter.
a client sends an upload request, the server responds by sending a genuine bloom filter (if data exists) along with some dummy filters.
- the client who possesses the file, can generate the BF using file blocks and request for access to the file using BF.
- the client sends tag of file, then, the server responds with set of BFs and encryption keys coresponding to the tag.
the plaintext information, the presence of file. Server responds with a set of BFs instead of "Yes/No" as a response.
An adversary cannot learn the existence information without knowledge of the complete file.
sends instead of
also has the implementation to show the performance.
still exists the information leakage.
- client side deduplication or server side deduplication
- file level or chunk level
- inter user deduplication or intra user deduplication