Affiliation:
1. The Chinese University of Hong Kong, Shatin, Hong Kong, China
2. University of Electronic Science and Technology of China, Chengdu, Sichuan, China
Abstract
Conventional encrypted deduplication approaches retain the deduplication capability on duplicate chunks after encryption by always deriving the key for encryption/decryption from the chunk content, but such a deterministic nature causes information leakage due to frequency analysis. We present
TED
, a tunable encrypted deduplication primitive that provides a tunable mechanism for balancing the tradeoff between storage efficiency and data confidentiality. The core idea of
TED
is that its key derivation is based on not only the chunk content but also the number of duplicate chunk copies, such that duplicate chunks are encrypted by distinct keys in a controlled manner. In particular,
TED
allows users to configure a storage blowup factor, under which the information leakage quantified by an information-theoretic measure is minimized for any input workload. In addition, we extend
TED
with a distributed key management architecture and propose two attack-resilient key generation schemes that trade between performance and fault tolerance. We implement an encrypted deduplication prototype
TEDStore
to realize
TED
in networked environments. Evaluation on real-world file system snapshots shows that
TED
effectively balances the tradeoff between storage efficiency and data confidentiality, with small performance overhead.
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture
Reference89 articles.
1. Message-Locked Encryption for Lock-Dependent Messages
2. Farsite
3. ORIGINS OF CRYPTOLOGY: THE ARAB CONTRIBUTIONS
4. George Amvrosiadis and Medha Bhadkamkar. 2015. Identifying trends in enterprise data protection systems. In Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC’15). 151–164.
5. Paul Anderson and Le Zhang. 2010. Fast and secure laptop backups with encrypted de-duplication. In Proceedings of the 24th USENIX International Conference on Large Installation System Administration (LISA’10). 1–8.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A randomized encryption deduplication method against frequency attack;Journal of Information Security and Applications;2024-06
2. Secure and Efficient Key Management for Deduplicated Cloud Storage Systems;2023 16th International Conference on Security of Information and Networks (SIN);2023-11-20
3. Blockchain-based Shared Data Integrity Auditing and Deduplication;IEEE Transactions on Dependable and Secure Computing;2023
4. A Sorting Fuzzy Min-Max Model in an Embedded System for Atrial Fibrillation Detection;ACM Transactions on Multimedia Computing, Communications, and Applications;2022-06-30