Comments on "Privacy Aware Data Deduplication for Side Channel in Cloud Storage"

Cross-user deduplication is an emerging technique to eliminate uploading of redundant data in cloud storage. Even though it is able to improve storage and communication efficiency simultaneously, it suffers from the problem of privacy leakage by side channel attack, which is a major obstacle to the...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on cloud computing Vol. 12; no. 2; pp. 814 - 817
Main Authors Tang, Xin, Zhu, Yudan, Fu, Mingjun
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.04.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2168-7161
2372-0018
DOI10.1109/TCC.2024.3376996

Cover

Abstract Cross-user deduplication is an emerging technique to eliminate uploading of redundant data in cloud storage. Even though it is able to improve storage and communication efficiency simultaneously, it suffers from the problem of privacy leakage by side channel attack, which is a major obstacle to the practical application of this technique. In order to achieve a secure cross-user deduplication, Yu et al. recently proposed a zero-knowledge response (ZEUS) scheme, together with an advanced countermeasure ZEUS<inline-formula><tex-math notation="LaTeX">^\mathrm{+}</tex-math> <mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href="tang-ieq1-3376996.gif"/> </inline-formula> by combining ZEUS and the random threshold solution, each of which is claimed to be secure against side channel attack. However, in this paper we show that both ZEUS and ZEUS<inline-formula><tex-math notation="LaTeX">^\mathrm{+}</tex-math> <mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href="tang-ieq2-3376996.gif"/> </inline-formula> are easily subject to a random chunk generation attack, which in turn undermines the claimed security. Furthermore, we also propose a simple but effective method to improve the existing schemes.
AbstractList Cross-user deduplication is an emerging technique to eliminate uploading of redundant data in cloud storage. Even though it is able to improve storage and communication efficiency simultaneously, it suffers from the problem of privacy leakage by side channel attack, which is a major obstacle to the practical application of this technique. In order to achieve a secure cross-user deduplication, Yu et al. recently proposed a zero-knowledge response (ZEUS) scheme, together with an advanced countermeasure ZEUS<inline-formula><tex-math notation="LaTeX">^\mathrm{+}</tex-math> <mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href="tang-ieq1-3376996.gif"/> </inline-formula> by combining ZEUS and the random threshold solution, each of which is claimed to be secure against side channel attack. However, in this paper we show that both ZEUS and ZEUS<inline-formula><tex-math notation="LaTeX">^\mathrm{+}</tex-math> <mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href="tang-ieq2-3376996.gif"/> </inline-formula> are easily subject to a random chunk generation attack, which in turn undermines the claimed security. Furthermore, we also propose a simple but effective method to improve the existing schemes.
Cross-user deduplication is an emerging technique to eliminate uploading of redundant data in cloud storage. Even though it is able to improve storage and communication efficiency simultaneously, it suffers from the problem of privacy leakage by side channel attack, which is a major obstacle to the practical application of this technique. In order to achieve a secure cross-user deduplication, Yu et al. recently proposed a zero-knowledge response (ZEUS) scheme, together with an advanced countermeasure ZEUS[Formula Omitted] by combining ZEUS and the random threshold solution, each of which is claimed to be secure against side channel attack. However, in this paper we show that both ZEUS and ZEUS[Formula Omitted] are easily subject to a random chunk generation attack, which in turn undermines the claimed security. Furthermore, we also propose a simple but effective method to improve the existing schemes.
Author Zhu, Yudan
Tang, Xin
Fu, Mingjun
Author_xml – sequence: 1
  givenname: Xin
  orcidid: 0000-0002-5056-124X
  surname: Tang
  fullname: Tang, Xin
  email: xtang@uir.edu.cn
  organization: School of Cyber Science and Engineering, University of International Relations, Beijing, China
– sequence: 2
  givenname: Yudan
  surname: Zhu
  fullname: Zhu, Yudan
  email: yudan_zhu@126.com
  organization: School of Cyber Science and Engineering, University of International Relations, Beijing, China
– sequence: 3
  givenname: Mingjun
  orcidid: 0009-0007-8465-2901
  surname: Fu
  fullname: Fu, Mingjun
  email: mingjun_fu@126.com
  organization: School of Cyber Science and Engineering, University of International Relations, Beijing, China
BookMark eNp9kL1PwzAQxS1UJErpzsBglTnl7MR2PFYpX1IlKrXMlpM44CqNi5OA-t_j0g6IgVvupHu_e7p3iQaNawxC1wSmhIC8W2fZlAJNpnEsuJT8DA1pLGgEQNJBmAlPI0E4uUDjtt1AqJQRSeQQLTO33Zqma7Fr8GTp7acu9nj2pb3Bc91pPDdlv6ttoTsbFJXzeGVLg7N33TSmxrbBWe36Eq865_WbmVyh80rXrRmf-gi9Ptyvs6do8fL4nM0WUUEl7aKyYiCAVpzkwNOcpVAmjHNhRCmFBJHnJqnikucJ07nhkjPNgId3RBKzKqxG6PZ4d-fdR2_aTm1c75tgqWLgLOEJFzSo4KgqvGtbbyq183ar_V4RUIfoVIhOHaJTp-gCwv8ghe1-vu-8tvV_4M0RtMaYXz6JIBIg_gb9anq0
CODEN ITCCF6
CitedBy_id crossref_primary_10_1109_TNSM_2024_3474852
Cites_doi 10.1109/MSP.2010.187
10.1109/TCC.2018.2794542
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TCC.2024.3376996
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore (IEEE/IET Electronic Library - IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2372-0018
EndPage 817
ExternalDocumentID 10_1109_TCC_2024_3376996
10471900
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 62102113; 62172053
  funderid: 10.13039/501100001809
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
IEDLZ
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
RIG
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c292t-df50702f61b068b580d45667e7d97907bbe4f3d6b45abe6965a5060187435f4f3
IEDL.DBID RIE
ISSN 2168-7161
IngestDate Mon Jun 30 05:54:03 EDT 2025
Tue Jul 01 02:57:19 EDT 2025
Thu Apr 24 23:04:16 EDT 2025
Wed Aug 27 02:06:04 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c292t-df50702f61b068b580d45667e7d97907bbe4f3d6b45abe6965a5060187435f4f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5056-124X
0009-0007-8465-2901
PQID 3065464672
PQPubID 2040413
PageCount 4
ParticipantIDs proquest_journals_3065464672
crossref_citationtrail_10_1109_TCC_2024_3376996
ieee_primary_10471900
crossref_primary_10_1109_TCC_2024_3376996
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-04-01
PublicationDateYYYYMMDD 2024-04-01
PublicationDate_xml – month: 04
  year: 2024
  text: 2024-04-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on cloud computing
PublicationTitleAbbrev TCC
PublicationYear 2024
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref2
ref1
Bellare (ref3)
References_xml – ident: ref2
  doi: 10.1109/MSP.2010.187
– start-page: 179
  volume-title: Proc. 22nd USENIX Secur. Symp.
  ident: ref3
  article-title: DepLESS: Server-aided encryption for deduplicated storage
– ident: ref1
  doi: 10.1109/TCC.2018.2794542
SSID ssj0000851919
Score 2.3110719
Snippet Cross-user deduplication is an emerging technique to eliminate uploading of redundant data in cloud storage. Even though it is able to improve storage and...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 814
SubjectTerms Cloud computing
Data privacy
Data storage
Deduplication
existence privacy
Privacy
random chunk generation attack
Resists
Reviews
side channel attack
Side-channel attacks
Termination of employment
Title Comments on "Privacy Aware Data Deduplication for Side Channel in Cloud Storage"
URI https://ieeexplore.ieee.org/document/10471900
https://www.proquest.com/docview/3065464672
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjR1LSwJBeChPXbKHkWUxSJcOq-s-ZneOookEiaCCt2Ue34Ika9huUb--b_YhUhTdFnZmGL73N9-LkLswUCjjILBiCBzLc1RoSc8HK-RMKwUamDTvkE8TNl54j0t_WRar57UwAJAnn0HHfOaxfL1RmXkq65q2AqjA0EM_RDorirV2DyrGduA9XoUibd6dDwboADpex0Uu4qYt_57qyWep_BDAuVYZ1cmkuk-RTPLcyVLZUZ_fWjX--8In5Li0L2m_IIhTcgDJGalXsxtoycrnZGoqQ0wSBd0ktD3drt6E-qD9d7EFOhSpoEPUQbvYNkXTls5WGqipRkhgTVcJHaw3maYzdNpRJrUbZDF6mA_GVjldwVIOd1JLx2gK2k7MetJmofRDW6MxxQIINA_QZZYSvNjViCtfSGCc-cI0IzQz_Fw_xl8XpJZsErgk1GGChcJ2PRPVU7YvYrClYhrhIbnwWJN0K8BHqmw9biZgrKPcBbF5hKiKDKqiElVNcr_b8VK03fhjbcNAfm9dAfQmaVXIjUrGfI3cfPw7agfn6pdt1-TInF5k57RILd1mcIOGRypvc4L7As4708Q
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjR3JSsNAdBA96MW6Yl0H8eIhaZplkjlKaqlLi2CF3sIsL1AsqdRU0a_3TZZSFMVbIDPM8N68fSPkIgoV8jgIrRRC1_JdFVnSD8CKONNKgQYmjR-yP2C9J_92FIyqYvWiFgYAiuQzsM1nEcvXUzU3rrKWaSuAAgwt9DUU_H5QlmstXCpGe-BtXgcjHd4axjGagK5ve0hH3DTmXxI-xTSVHyy4kCvdBhnUNyrTSZ7teS5t9fmtWeO_r7xFNisNk16VT2KbrEC2Qxr19AZaEfMueTC1ISaNgk4zev4wG78J9UGv3sUMaEfkgnZQCi2i2xSVW_o41kBNPUIGEzrOaDyZzjV9RLMdudL5HnnqXg_jnlXNV7CUy93c0ikqg46bsrZ0WCSDyNGoTrEQQs1DNJqlBD_1NGIrEBIYZ4Ew7QjNFD8vSPHXPlnNphkcEOoywSLheL6J6yknECk4UjGN8JBc-KxJWjXgE1U1HzczMCZJYYQ4PEFUJQZVSYWqJrlc7HgpG2_8sXbPQH5pXQn0JjmukZtUpPmaeMUAeJQP7uEv287Iem_Yv0_ubwZ3R2TDnFTm6hyT1Xw2hxNUQ3J5Wjy-LxDP1xE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Comments+on+%22Privacy+Aware+Data+Deduplication+for+Side+Channel+in+Cloud+Storage%22&rft.jtitle=IEEE+transactions+on+cloud+computing&rft.au=Tang%2C+Xin&rft.au=Zhu%2C+Yudan&rft.au=Fu%2C+Mingjun&rft.date=2024-04-01&rft.pub=IEEE&rft.eissn=2372-0018&rft.volume=12&rft.issue=2&rft.spage=814&rft.epage=817&rft_id=info:doi/10.1109%2FTCC.2024.3376996&rft.externalDocID=10471900
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-7161&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-7161&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-7161&client=summon