Side Channels in Deduplication: Trade-offs between Leakage and Efficiency

VenueCategory
ASIA CCS'17Secure Deduplication

Side Channels in Deduplication: Trade-offs between Leakage and Efficiency 1. SummaryMotivation of this paperMethod NameImplementation and Evaluation2. Strength (Contributions of the paper)3. Weakness (Limitations of the paper)4. Future Works

1. Summary

Motivation of this paper

Cross-user client-side deduplication inherently gives the adversary access to a side-channel that may divulge whether or not a particular file is stored on the server, leading to leakage of user information.

This paper proposes formal definitions for deduplication strategies and their security in terms of adversarial advantage.

provide a criterion for designing good strategies and then prove a bound characterizing the necessary trade-off between security and efficiency.

Method Name

Client-side deduplication is generally preferable to server-side deduplication on economic grounds. For Danny Harnik's work, it can be seen as a compromise between the efficiency of client-side deduplication and the security of server-side deduplication.

To simplify its results, it focuses on file-based deduplication.

Ideally, reduce an adversary's ability to gain information from its uploads, in a way that does not severely impact the amount of bandwidth required.

In this paper, it regards deduplication strategies as distributions on the possible thresholds.

a strategy can be viewed as the list () where is the probability that the threshold is value . is a probability mass function. is the algorithm that implements strategy DS.

game

Given a deduplication strategy, since the adversary's job is essentially to distinguish two probability distributions, it defines the statistical distance of the two distributions, called this security level .

 

Implementation and Evaluation

2. Strength (Contributions of the paper)

  1. this paper proposes formal definitions for side-channel deduplication strategies, including a natural measure for effectiveness of countermeasures.
  2. characterizing the trade-off between security and efficiency necessary for different strategies.

3. Weakness (Limitations of the paper)

  1. This paper is too theoretical, and does not provide any material related to experiments.

4. Future Works

  1. This paper shows that uniform distribution for probabilistic uploads provides the optimal solution for a natural measure, which presents a trade-off between security and bandwidth usages.
  2. This paper also mentions the topic of security in memory deduplication. It says if KSM module were to use randomized thresholds for deduplication of memory pages, then the tradeoff between efficiency and security is very similar to the cloud storage scenario.