A Bandwidth-Efficient Middleware for Encryption Deduplication

VenueCategory
DSC'12Secure Deduplication

A Bandwidth-Efficient Middleware for Encryption Deduplication1. SummaryMotivation of this paperUWareImplementation and Evaluation2. Strength (Contributions of the paper)3. Weakness (Limitations of the paper)4. Future Works

1. Summary

Motivation of this paper

Existing client-side deduplication designs are not directly accplicable to build a secure deduplication middleware.

they are inherently vulnerable to the ownership cheating attacks (hash-only attacks).

  1. An overlooked side-channel in client-side deduplication the PoW can be abused to turn the deduplication server into an oracle, allowing an attacker to learn the file existence by observing whether or not the PoW testing is performed.
  2. Tradeoff among various deduplication modes The contradiction between file- and block- level deduplication approaches urges a solution that acquires an acceptable deduplication ratio while alleviating performance issues.

This paper wants to solve those two issues above.

leverage the similarity characteristic of file blocks in secure deduplication.

UWare

  1. client is installed at a local device, encrypt and upload files to backend storage
  2. Storage backend stores all user's data
  3. UWare indexes short information of encrypted file/blocks of all users for efficiency.
  1. A malicious user attemp to launch the ownership cheating attacks or the existence-of-file attacks by using some short information.
  2. A compromised cloud storage server attemp to steal and learn the underlying content of the stored file ciphertexts.

Existing deduplication design perform the PoW testing after the duplicate checking passes. A promising solution: make the file existence oblivious unless the user passes the PoW testing.

1560779509995

Key idea: no matter initial checking successes or not, the challenge message is sent back to enforce PoW execution.

The user who just holds a file hash is still requested to upload the corresponding file ciphertext as she cannot compute the correct proof.

using near-exact deduplication (Broder's theorem), a small group of sampled block tags can approximately represent the entire block tags of the file.

assign the same randomness of the most similiar file in UWare.

Implementation and Evaluation

  1. Deduplication effectiveness Compared with plaintext deduplication
  2. Index space overhead Compared with plaintext deduplication
  3. Service overhead The time overhead of tag generation and data encryption.

2. Strength (Contributions of the paper)

  1. This paper patches the PoW protocol to address the aforementioned file-existence side-channel under both threats.

3. Weakness (Limitations of the paper)

  1. The key drawback of its method is it needs to do the encryption whether the file exists or not.

4. Future Works

  1. This paper assumes the ciphertexts of unpredictable message cannot be distinguished by an efficient attacker except with negligible probability.
  2. This paper argues that near-exact deduplication can achieve lower memory cost at a cost of decreasing deduplication ratio.