Venue | Category |
---|---|
ASIA CCS'17 | Secure Deduplication |
Side Channels in Deduplication: Trade-offs between Leakage and Efficiency 1. SummaryMotivation of this paperMethod NameImplementation and Evaluation2. Strength (Contributions of the paper)3. Weakness (Limitations of the paper)4. Future Works
Cross-user client-side deduplication inherently gives the adversary access to a side-channel that may divulge whether or not a particular file is stored on the server, leading to leakage of user information.
This paper proposes formal definitions for deduplication strategies and their security in terms of adversarial advantage.
provide a criterion for designing good strategies and then prove a bound characterizing the necessary trade-off between security and efficiency.
Client-side deduplication is generally preferable to server-side deduplication on economic grounds. For Danny Harnik's work, it can be seen as a compromise between the efficiency of client-side deduplication and the security of server-side deduplication.
To simplify its results, it focuses on file-based deduplication.
Ideally, reduce an adversary's ability to gain information from its uploads, in a way that does not severely impact the amount of bandwidth required.
In this paper, it regards deduplication strategies as distributions on the possible thresholds.
a strategy can be viewed as the list () where is the probability that the threshold is value . is a probability mass function. is the algorithm that implements strategy DS.
game
Given a deduplication strategy, since the adversary's job is essentially to distinguish two probability distributions, it defines the statistical distance of the two distributions, called this security level .