skip to main content
research-article

Tunable Encrypted Deduplication with Attack-resilient Key Management

Authors Info & Claims
Published:11 November 2022Publication History
Skip Abstract Section

Abstract

Conventional encrypted deduplication approaches retain the deduplication capability on duplicate chunks after encryption by always deriving the key for encryption/decryption from the chunk content, but such a deterministic nature causes information leakage due to frequency analysis. We present TED, a tunable encrypted deduplication primitive that provides a tunable mechanism for balancing the tradeoff between storage efficiency and data confidentiality. The core idea of TED is that its key derivation is based on not only the chunk content but also the number of duplicate chunk copies, such that duplicate chunks are encrypted by distinct keys in a controlled manner. In particular, TED allows users to configure a storage blowup factor, under which the information leakage quantified by an information-theoretic measure is minimized for any input workload. In addition, we extend TED with a distributed key management architecture and propose two attack-resilient key generation schemes that trade between performance and fault tolerance. We implement an encrypted deduplication prototype TEDStore to realize TED in networked environments. Evaluation on real-world file system snapshots shows that TED effectively balances the tradeoff between storage efficiency and data confidentiality, with small performance overhead.

REFERENCES

  1. [1] Abadi Martín, Boneh Dan, Mironov Ilya, Raghunathan Ananth, and Segev Gil. 2013. Message-locked encryption for lock-dependent messages. In Proceedings of the Annual Cryptology Conference (CRYPTO’13). 374391.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Adya Atul, Bolosky William J., Castro Miguel, Cermak Gerald, Chaiken Ronnie, Douceur John R., Howell Jon, Lorch Jacob R., Theimer Marvin, and Wattenhofer Roger P.. 2002. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI’02). 114.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Al-Kadit Ibrahim A.. 1992. Origins of cryptology: The Arab contributions. Cryptologia 16, 2 (1992), 97126.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Amvrosiadis George and Bhadkamkar Medha. 2015. Identifying trends in enterprise data protection systems. In Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC’15). 151164.Google ScholarGoogle Scholar
  5. [5] Anderson Paul and Zhang Le. 2010. Fast and secure laptop backups with encrypted de-duplication. In Proceedings of the 24th USENIX International Conference on Large Installation System Administration (LISA’10). 18.Google ScholarGoogle Scholar
  6. [6] Appleby Austin. 2022. SMHasher. https://github.com/aappleby/smhasher.Google ScholarGoogle Scholar
  7. [7] Armknecht Frederik, Bohli Jens-Matthias, Karame Ghassan O., and Youssef Franck. 2015. Transparent data deduplication in the cloud. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). 886900.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Armknecht Frederik, Boyd Colin, Davies Gareth T., Gjøsteen Kristian, and Toorani Mohsen. 2017. Side channels in deduplication: Trade-offs between leakage and efficiency. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIACCS’17). 266274.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Ateniese Giuseppe, Burns Randal, Curtmola Reza, Herring Joseph, Kissner Lea, Peterson Zachary, and Song Dawn. 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM SIGSAC Conference on Computer and Communications Security (CCS’07). 598609.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Baignères Thomas, Junod Pascal, and Vaudenay Serge. 2004. How far can we go beyond linear cryptanalysis? In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’04). 432450.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Bellare Mihir and Keelveedhi Sriram. 2015. Interactive message-locked encryption and secure deduplication. In Proceedings of the IACR International Workshop on Public Key Cryptography (PKC’15). 516538.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Bellare Mihir, Keelveedhi Sriram, and Ristenpart Thomas. 2013. DupLESS: Server-aided encryption for deduplicated storage. In Proceedings of the 22nd USENIX Security Symposium (Security’13). 179194.Google ScholarGoogle Scholar
  13. [13] Bellare Mihir, Keelveedhi Sriram, and Ristenpart Thomas. 2013. Message-locked encryption and secure deduplication. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’13). 296312.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Bessani Alysson, Correia Miguel, Quaresma Bruno, André Fernando, and Sousa Paulo. 2013. DepSky: Dependable and secure storage in a cloud-of-clouds. ACM Transactions on Storage 9, 4 (2013), 133.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Bessani Alysson Neves, Mendes Ricardo, Oliveira Tiago, Neves Nuno Ferreira, Correia Miguel, Pasin Marcelo, and Verissimo Paulo. 2014. SCFS: A shared cloud-backed file system. In Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC’14). 169180.Google ScholarGoogle Scholar
  16. [16] Bhagwat Deepavali, Eshghi Kave, Long Darrell D. E., and Lillibridge Mark. 2009. Extreme binning: Scalable, parallel deduplication for chunk-based file backup. In Proceedings of the 2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS’09). 19.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Bindschaedler Vincent, Grubbs Paul, Cash David, Ristenpart Thomas, and Shmatikov Vitaly. 2018. The tao of inference in privacy-protected databases. Proceedings of the VLDB Endowment 11, 11 (2018), 17151728.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Black John. 2006. Compare-by-hash: A reasoned analysis. In Proceedings of the 2006 USENIX Annual Technical Conference (USENIX ATC’06). 8590.Google ScholarGoogle Scholar
  19. [19] Boyd Stephen and Vandenberghe Lieven. 2004. Convex Optimization. Cambridge University Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Broder Andrei Z.. 1997. On the resemblance and containment of documents. In Proceedings of the Conference on Compression and Complexity of Sequences (SEQUENCES’97). 2129.Google ScholarGoogle Scholar
  21. [21] Cao Zhichao, Wen Hao, Wu Fenggang, and Du David H. C.. 2018. ALACC: Accelerating restore performance of data deduplication systems using adaptive look-ahead window assisted chunk caching. In Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST’18). 309324.Google ScholarGoogle Scholar
  22. [22] Cormode Graham and Muthukrishnan S.. 2005. An improved data stream summary: The count-min sketch and its applications. Journal of Algorithms 55, 1 (2005), 5875.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Cox Landon P., Murray Christopher D., and Noble Brian D.. 2002. Pastiche: Making backup cheap and easy. In Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI’02). 285298.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Cui Helei, Wang Cong, Hua Yu, Du Yuefeng, and Yuan Xingliang. 2018. A bandwidth-efficient middleware for encrypted deduplication. In Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (DSC’18). 18.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Douceur John R., Adya Atul, Bolosky William J., Simon P., and Theimer Marvin. 2002. Reclaiming space from duplicate files in a serverless distributed file system. In Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS’02). 617624.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Duan Yitao. 2014. Distributed key generation for encrypted deduplication: Achieving the strongest privacy. In Proceedings of the 2014 ACM on Cloud Computing Security Workshop (CCSW’14). 5768.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Eshghi Kave and Tang Hsiu Khuern. 2005. A Framework for Analyzing and Improving Content-based Chunking Algorithms. Technical Report HPL-2005-30(R.1). Hewlett-Packard Laboratories.Google ScholarGoogle Scholar
  28. [28] University File System and Storage Lab at Stony Brook. 2022. FSL Traces and Snapshots Public Archive. from http:// tracer.filesystems.org/.Google ScholarGoogle Scholar
  29. [29] Ghemawat Sanjay and Dean Jeff. 2022. LevelDB. https://github.com/google/leveldb.Google ScholarGoogle Scholar
  30. [30] Goyal Vipul, Pandey Omkant, Sahai Amit, and Waters Brent. 2006. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM SIGSAC Conference on Computer and Communications Security (CCS’06). 8998.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Granlund Torbjörn. 2022. GNUMP: GNU multiple precision arithmetic library. Retrieved from https://gmplib.org/.Google ScholarGoogle Scholar
  32. [32] Grubbs Paul, Sekniqi Kevin, Bindschaedler Vincent, Naveed Muhammad, and Ristenpart Thomas. 2017. Leakage-abuse attacks against order-revealing encryption. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (S&P’17). 655672.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Halevi Shai, Harnik Danny, Pinkas Benny, and Shulman-Peleg Alexandra. 2011. Proofs of ownership in remote storage systems. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS’11). 491500.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Harnik Danny, Pinkas Benny, and Shulman-Peleg Alexandra. 2010. Side channels in cloud services: Deduplication in cloud storage. IEEE Security & Privacy 8, 6 (2010), 4047.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Journal HIPAA. 2022. Hard Drive Theft Sees Data of 1 Million Individuals Exposed. https://www.hipaajournal.com/hard-drive-theft-sees-data-1-million-indiv iduals-exposed-8859/.Google ScholarGoogle Scholar
  36. [36] IDC. 2022. Data Age 2025. https://www.seagate.com/files/www-content/our-story/trends/files/idc-se agate-dataage-whitepaper.pdf.Google ScholarGoogle Scholar
  37. [37] Corporation Intel. 2022. Intel advanced encryption standard (AES) new instructions set. https://www.intel.com.bo/content/dam/doc/white-paper/advanced-encryptio n-standard-new-instructions-set-paper.pdf.Google ScholarGoogle Scholar
  38. [38] Jin Keren and Miller Ethan L.. 2009. The effectiveness of deduplication on virtual machine disk images. In Proceedings of the 2009 ACM International Conference on Systems and Storage (SYSTOR’09). 112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Juels Ari and Jr. Burton S. Kaliski2007. PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM SIGSAC Conference on Computer and Communications Security (CCS’07). 584597.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Kallahalla Mahesh, Riedel Erik, Swaminathan Ram, Wang Qian, and Fu Kevin. 2003. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST’03). 2942.Google ScholarGoogle Scholar
  41. [41] Katz Jonathan and Lindell Yehuda. 2014. Introduction to Modern Cryptography. Chapman and Hall/CRC.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Kerschbaum Florian. 2015. Frequency-hiding order-preserving encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). 656667.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Krohn Maxwell N., Freedman Michael J., and Mazieres David. 2004. On-the-fly verification of rateless erasure codes for efficient content distribution. In Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P’04). 226240.Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Kullback S. and Leibler R. A.. 1951. On information and sufficiency. Annals of Mathematical Statistics 22, 1 (1951), 7986.Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Lacharité Marie-Sarah and Paterson Kenneth G.. 2018. Frequency-smoothing encryption: Preventing snapshot attacks on deterministically encrypted data. IACR Transactions on Symmetric Cryptology 2018, 1 (2018), 277313.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Lewi Kevin and Wu David J.. 2016. Order-revealing encryption: New constructions, applications, and lower bounds. In Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security (CCS’16). 11671178.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Li Jingwei, Huang Suyu, Ren Yanjing, Yang Zuoru, Lee Patrick P. C., Zhang Xiao-song, and Hao Yao. 2022. Enabling secure and space-efficient metadata management in encrypted deduplication. IEEE Trans. Comput. 71, 4 (2022), 959–970.Google ScholarGoogle Scholar
  48. [48] Li Jingwei, Lee Patrick P. C., Tan Chufeng, Qin Chuan, and Zhang Xiaosong. 2020. Information leakage in encrypted deduplication via frequency analysis: Attacks and defenses. ACM Transactions on Storage 16, 1 (2020), 130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Li Jingwei, Qin Chuan, Lee Patrick P. C., and Li Jin. 2016. Rekeying for encrypted deduplication storage. In Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’16). 618629.Google ScholarGoogle ScholarCross RefCross Ref
  50. [50] Li Jingwei, Qin Chuan, Lee Patrick P. C., and Zhang Xiaosong. 2017. Information leakage in encrypted deduplication via frequency analysis. In Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’17). 112.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Li Jingwei, Yang Zuoru, Ren Yanjing, Lee Patrick P. C., and Zhang Xiaosong. 2020. Balancing storage efficiency and data confidentiality with tunable encrypted deduplication. In Proceedings of the 15th European Conference on Computer Systems (EuroSys’20). 115.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. [52] Li Mingqiang, Qin Chuan, and Lee Patrick P. C.. 2015. CDStore: Toward reliable, secure, and cost-efficient cloud storage via convergent dispersal. In Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC’15). 111124.Google ScholarGoogle Scholar
  53. [53] Lillibridge Mark, Eshghi Kave, and Bhagwat Deepavali. 2013. Improving restore speed for backup systems that use inline chunk-based deduplication. In Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST’13). 183197.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Lillibridge Mark, Eshghi Kave, Bhagwat Deepavali, Deolalikar Vinay, Trezis Greg, and Camble Peter. 2009. Sparse indexing: Large scale, inline deduplication using sampling and locality. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST’09). 111123.Google ScholarGoogle Scholar
  55. [55] Liu Jian, Asokan Nadarajah, and Pinkas Benny. 2015. Secure deduplication of encrypted data without additional independent servers. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). 874885.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Liu Jian, Duan Li, Li Yong, and Asokan N.. 2018. Secure deduplication of encrypted data: Refined model and new constructions. In Proceedings of the 2018 Cryptographers’ Track at the RSA Conference (CT-RSA’18). 374393.Google ScholarGoogle ScholarCross RefCross Ref
  57. [57] Meister Dirk, Brinkmann André, and Süß Tim. 2013. File recipe compression in data deduplication systems. In Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST’13). 175182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. [58] Mendes Ricardo, Oliveira Tiago, Cogo Vinicius Vielmo, Neves Nuno Ferreira, and Bessani Alysson Neves. 2021. Charon: A secure cloud-of-clouds system for storing and sharing big data. IEEE Transactions on Cloud Computing 9, 4 (2021), 13491361.Google ScholarGoogle ScholarCross RefCross Ref
  59. [59] Meyer Dutch T. and Bolosky William J.. 2011. A study of practical deduplication. ACM Transactions on Storage 7, 4 (2011), 120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. [60] Mulazzani Martin, Schrittwieser Sebastian, Leithner Manuel, Huber Markus, and Weippl Edgar. 2011. Dark clouds on the horizon: Using cloud storage as attack vector and online slack space. In Proceedings of the 20th USENIX Conference on Security (Security’11). 55.Google ScholarGoogle Scholar
  61. [61] Naor Moni and Reingold Omer. 2004. Number-theoretic constructions of efficient pseudo-random functions. J. ACM 51, 2 (2004), 231262.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. [62] Naveed Muhammad, Kamara Seny, and Wright Charles V.. 2015. Inference attacks on property-preserving encrypted databases. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). 644655.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. [63] OpenSSL. 2022. OpenSSL: Cryptography and SSL/TLS Toolkit. https://www.openssl.org/.Google ScholarGoogle Scholar
  64. [64] Paillier Pascal. 1999. Low-cost double-size modular exponentiation or how to stretch your cryptoprocessor. In Proceedings of the IACR International Workshop on Public Key Cryptography (PKC’99). 223234.Google ScholarGoogle ScholarCross RefCross Ref
  65. [65] Papadimitriou Christos H.. 1981. On the complexity of integer programming. J. ACM 28, 4 (1981), 765768.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. [66] Pooranian Zahra, Chen Kang-Cheng, Yu Chia-Mu, and Conti Mauro. 2018. RARE: Defeating side channels based on data-deduplication in cloud storage. In Proceedings of the 2018 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’18). 444449.Google ScholarGoogle ScholarCross RefCross Ref
  67. [67] Puzio Pasquale, Molva Refik, Önen Melek, and Loureiro Sergio. 2013. ClouDedup: Secure deduplication with encrypted data for cloud storage. In Proceedings of the 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom’13). 363370.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. [68] Qin Chuan, Li Jingwei, and Lee Patrick P. C.. 2017. The design and implementation of a rekeying-aware encrypted deduplication storage system. ACM Transactions on Storage 13, 1 (2017), 9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. [69] Michael O. Rabin. 1981. Fingerprinting by random polynomials. Department of Computer Science, Harvard University. Tech. Report TR-15-81. 1–12.Google ScholarGoogle Scholar
  70. [70] Resch Jason and Plank James. 2011. AONT-RS: Blending security and performance in dispersed storage systems. In Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST’11). 1414.Google ScholarGoogle Scholar
  71. [71] Ritzdorf Hubert, Karame Ghassan O., Soriente Claudio, and Čapkun Srdjan. 2016. On information leakage in deduplicated storage systems. In Proceedings of the 2016 ACM on Cloud Computing Security Workshop (CCSW’16). 6172.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. [72] Shah Peter and So Won. 2015. Lamassu: Storage-efficient host-side encryption. In Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC’15). 333345.Google ScholarGoogle Scholar
  73. [73] Shamir Adi. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612613.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. [74] Stanek Jan, Sorniotti Alessandro, Androulaki Elli, and Kencl Lukas. 2014. A secure data deduplication scheme for cloud storage. In Proceedings of International Conference on Financial Cryptography and Data Security (FC’14). 99118.Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Storer Mark W., Greenan Kevin, Long Darrell D. E., and Miller Ethan L.. 2008. Secure data deduplication. In Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS’08). 110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Storer Mark W., Greenan Kevin M., Miller Ethan L., and Voruganti Kaladhar. 2009. POTSHARDS-a secure, recoverable, long-term archival storage system. ACM Transactions on Storage 5, 2 (2009), 135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. [77] Sun Zhen, Kuenning Geoff, Mandal Sonam, Shilane Philip, Tarasov Vasily, Xiao Nong, and Zadok Erez. 2016. A long-term user-centric analysis of deduplication patterns. In Proceedings of the 32nd IEEE Symposium on Mass Storage Systems and Technologies (MSST’16). 17.Google ScholarGoogle ScholarCross RefCross Ref
  78. [78] Wallace Grant, Douglis Fred, Qian Hangwei, Shilane Philip, Smaldone Stephen, Chamness Mark, and Hsu Windsor. 2012. Characteristics of backup workloads in production systems. In Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST’12). 44.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. [79] Wilcox-O’Hearn Zooko. 2022. Drew Perttula and Attacks on Convergent Encryption. https://tahoe-lafs.org/hacktahoelafs/drew_perttula.html.Google ScholarGoogle Scholar
  80. [80] Wilcox-O’Hearn Zooko and Warner Brian. 2008. Tahoe: The least-authority filesystem. In Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS’08). 2126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. [81] Xia Wen, Jiang Hong, Feng Dan, and Hua Yu. 2011. SiLo: A similarity-locality based near-exact deduplication scheme with low RAM overhead and high throughput. In Proceedings of the 2011 USENIX Annual Technical Conference (USENIX ATC’11). 2630.Google ScholarGoogle Scholar
  82. [82] Xia Wen, Zhou Yukun, Jiang Hong, Feng Dan, Hua Yu, Hu Yuchong, Liu Qing, and Zhang Yucheng. 2016. FastCDC: A fast and efficient content-defined chunking approach for data deduplication. In Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC’16). 101114.Google ScholarGoogle Scholar
  83. [83] Yang Yue and Zhu Jianwen. 2016. Write skew and zipf distribution: Evidence and implications. ACM Transactions on Storage 12, 4 (2016), 119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. [84] Zhang Wei, Agun Daniel, Yang Tao, Wolski Rich, and Tang Hong. 2015. VM-centric snapshot deduplication for cloud data backup. In Proceedings of the 31st IEEE Symposium on Mass Storage Systems and Technologies (MSST’15). 112.Google ScholarGoogle ScholarCross RefCross Ref
  85. [85] Zhang Wei, Tang Hong, Jiang Hao, Yang Tao, Li Xiaogang, and Zeng Yue. 2012. Multi-level selective deduplication for VM snapshots in cloud storage. In Proceedings of the 5th IEEE International Conference on Cloud Computing (CLOUD’12). 550557.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. [86] Zhao Yongjun and Chow Sherman S. M.. 2017. Updatable block-level message-locked encryption. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIACCS’17). 449460.Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. [87] Zhou Yukun, Feng Dan, Xia Wen, Fu Min, Huang Fangting, Zhang Yucheng, and Li Chunguang. 2015. SecDep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management. In Proceedings of the 31st IEEE Symposium on Mass Storage Systems and Technologies (MSST’15). 114.Google ScholarGoogle ScholarCross RefCross Ref
  88. [88] Zhu Benjamin, Li Kai, and Patterson R. Hugo. 2008. Avoiding the disk bottleneck in the data domain deduplication file system. In Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST’08). 269282.Google ScholarGoogle Scholar
  89. [89] Zuo Pengfei, Hua Yu, Wang Cong, Xia Wen, Cao Shunde, Zhou Yukun, and Sun Yuanyuan. 2018. Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage. In Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS’18). 11531162.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Tunable Encrypted Deduplication with Attack-resilient Key Management

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Storage
        ACM Transactions on Storage  Volume 18, Issue 4
        November 2022
        279 pages
        ISSN:1553-3077
        EISSN:1553-3093
        DOI:10.1145/3570642
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 November 2022
        • Online AM: 27 September 2022
        • Accepted: 6 January 2022
        • Revised: 8 November 2021
        • Received: 22 June 2021
        Published in tos Volume 18, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!