Comments on "Privacy Aware Data Deduplication for Side Channel in Cloud Storage"
Cross-user deduplication is an emerging technique to eliminate uploading of redundant data in cloud storage. Even though it is able to improve storage and communication efficiency simultaneously, it suffers from the problem of privacy leakage by side channel attack, which is a major obstacle to the...
Saved in:
Published in | IEEE transactions on cloud computing Vol. 12; no. 2; pp. 814 - 817 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.04.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 2168-7161 2372-0018 |
DOI | 10.1109/TCC.2024.3376996 |
Cover
Abstract | Cross-user deduplication is an emerging technique to eliminate uploading of redundant data in cloud storage. Even though it is able to improve storage and communication efficiency simultaneously, it suffers from the problem of privacy leakage by side channel attack, which is a major obstacle to the practical application of this technique. In order to achieve a secure cross-user deduplication, Yu et al. recently proposed a zero-knowledge response (ZEUS) scheme, together with an advanced countermeasure ZEUS<inline-formula><tex-math notation="LaTeX">^\mathrm{+}</tex-math> <mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href="tang-ieq1-3376996.gif"/> </inline-formula> by combining ZEUS and the random threshold solution, each of which is claimed to be secure against side channel attack. However, in this paper we show that both ZEUS and ZEUS<inline-formula><tex-math notation="LaTeX">^\mathrm{+}</tex-math> <mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href="tang-ieq2-3376996.gif"/> </inline-formula> are easily subject to a random chunk generation attack, which in turn undermines the claimed security. Furthermore, we also propose a simple but effective method to improve the existing schemes. |
---|---|
AbstractList | Cross-user deduplication is an emerging technique to eliminate uploading of redundant data in cloud storage. Even though it is able to improve storage and communication efficiency simultaneously, it suffers from the problem of privacy leakage by side channel attack, which is a major obstacle to the practical application of this technique. In order to achieve a secure cross-user deduplication, Yu et al. recently proposed a zero-knowledge response (ZEUS) scheme, together with an advanced countermeasure ZEUS<inline-formula><tex-math notation="LaTeX">^\mathrm{+}</tex-math> <mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href="tang-ieq1-3376996.gif"/> </inline-formula> by combining ZEUS and the random threshold solution, each of which is claimed to be secure against side channel attack. However, in this paper we show that both ZEUS and ZEUS<inline-formula><tex-math notation="LaTeX">^\mathrm{+}</tex-math> <mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href="tang-ieq2-3376996.gif"/> </inline-formula> are easily subject to a random chunk generation attack, which in turn undermines the claimed security. Furthermore, we also propose a simple but effective method to improve the existing schemes. Cross-user deduplication is an emerging technique to eliminate uploading of redundant data in cloud storage. Even though it is able to improve storage and communication efficiency simultaneously, it suffers from the problem of privacy leakage by side channel attack, which is a major obstacle to the practical application of this technique. In order to achieve a secure cross-user deduplication, Yu et al. recently proposed a zero-knowledge response (ZEUS) scheme, together with an advanced countermeasure ZEUS[Formula Omitted] by combining ZEUS and the random threshold solution, each of which is claimed to be secure against side channel attack. However, in this paper we show that both ZEUS and ZEUS[Formula Omitted] are easily subject to a random chunk generation attack, which in turn undermines the claimed security. Furthermore, we also propose a simple but effective method to improve the existing schemes. |
Author | Zhu, Yudan Tang, Xin Fu, Mingjun |
Author_xml | – sequence: 1 givenname: Xin orcidid: 0000-0002-5056-124X surname: Tang fullname: Tang, Xin email: xtang@uir.edu.cn organization: School of Cyber Science and Engineering, University of International Relations, Beijing, China – sequence: 2 givenname: Yudan surname: Zhu fullname: Zhu, Yudan email: yudan_zhu@126.com organization: School of Cyber Science and Engineering, University of International Relations, Beijing, China – sequence: 3 givenname: Mingjun orcidid: 0009-0007-8465-2901 surname: Fu fullname: Fu, Mingjun email: mingjun_fu@126.com organization: School of Cyber Science and Engineering, University of International Relations, Beijing, China |
BookMark | eNp9kL1PwzAQxS1UJErpzsBglTnl7MR2PFYpX1IlKrXMlpM44CqNi5OA-t_j0g6IgVvupHu_e7p3iQaNawxC1wSmhIC8W2fZlAJNpnEsuJT8DA1pLGgEQNJBmAlPI0E4uUDjtt1AqJQRSeQQLTO33Zqma7Fr8GTp7acu9nj2pb3Bc91pPDdlv6ttoTsbFJXzeGVLg7N33TSmxrbBWe36Eq865_WbmVyh80rXrRmf-gi9Ptyvs6do8fL4nM0WUUEl7aKyYiCAVpzkwNOcpVAmjHNhRCmFBJHnJqnikucJ07nhkjPNgId3RBKzKqxG6PZ4d-fdR2_aTm1c75tgqWLgLOEJFzSo4KgqvGtbbyq183ar_V4RUIfoVIhOHaJTp-gCwv8ghe1-vu-8tvV_4M0RtMaYXz6JIBIg_gb9anq0 |
CODEN | ITCCF6 |
CitedBy_id | crossref_primary_10_1109_TNSM_2024_3474852 |
Cites_doi | 10.1109/MSP.2010.187 10.1109/TCC.2018.2794542 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TCC.2024.3376996 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore (IEEE/IET Electronic Library - IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2372-0018 |
EndPage | 817 |
ExternalDocumentID | 10_1109_TCC_2024_3376996 10471900 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 62102113; 62172053 funderid: 10.13039/501100001809 |
GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IEDLZ IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ RIA RIE AAYXX CITATION RIG 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c292t-df50702f61b068b580d45667e7d97907bbe4f3d6b45abe6965a5060187435f4f3 |
IEDL.DBID | RIE |
ISSN | 2168-7161 |
IngestDate | Mon Jun 30 05:54:03 EDT 2025 Tue Jul 01 02:57:19 EDT 2025 Thu Apr 24 23:04:16 EDT 2025 Wed Aug 27 02:06:04 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c292t-df50702f61b068b580d45667e7d97907bbe4f3d6b45abe6965a5060187435f4f3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-5056-124X 0009-0007-8465-2901 |
PQID | 3065464672 |
PQPubID | 2040413 |
PageCount | 4 |
ParticipantIDs | proquest_journals_3065464672 crossref_citationtrail_10_1109_TCC_2024_3376996 ieee_primary_10471900 crossref_primary_10_1109_TCC_2024_3376996 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-04-01 |
PublicationDateYYYYMMDD | 2024-04-01 |
PublicationDate_xml | – month: 04 year: 2024 text: 2024-04-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE transactions on cloud computing |
PublicationTitleAbbrev | TCC |
PublicationYear | 2024 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref2 ref1 Bellare (ref3) |
References_xml | – ident: ref2 doi: 10.1109/MSP.2010.187 – start-page: 179 volume-title: Proc. 22nd USENIX Secur. Symp. ident: ref3 article-title: DepLESS: Server-aided encryption for deduplicated storage – ident: ref1 doi: 10.1109/TCC.2018.2794542 |
SSID | ssj0000851919 |
Score | 2.3110719 |
Snippet | Cross-user deduplication is an emerging technique to eliminate uploading of redundant data in cloud storage. Even though it is able to improve storage and... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 814 |
SubjectTerms | Cloud computing Data privacy Data storage Deduplication existence privacy Privacy random chunk generation attack Resists Reviews side channel attack Side-channel attacks Termination of employment |
Title | Comments on "Privacy Aware Data Deduplication for Side Channel in Cloud Storage" |
URI | https://ieeexplore.ieee.org/document/10471900 https://www.proquest.com/docview/3065464672 |
Volume | 12 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjR1LSwJBeChPXbKHkWUxSJcOq-s-ZneOookEiaCCt2Ue34Ika9huUb--b_YhUhTdFnZmGL73N9-LkLswUCjjILBiCBzLc1RoSc8HK-RMKwUamDTvkE8TNl54j0t_WRar57UwAJAnn0HHfOaxfL1RmXkq65q2AqjA0EM_RDorirV2DyrGduA9XoUibd6dDwboADpex0Uu4qYt_57qyWep_BDAuVYZ1cmkuk-RTPLcyVLZUZ_fWjX--8In5Li0L2m_IIhTcgDJGalXsxtoycrnZGoqQ0wSBd0ktD3drt6E-qD9d7EFOhSpoEPUQbvYNkXTls5WGqipRkhgTVcJHaw3maYzdNpRJrUbZDF6mA_GVjldwVIOd1JLx2gK2k7MetJmofRDW6MxxQIINA_QZZYSvNjViCtfSGCc-cI0IzQz_Fw_xl8XpJZsErgk1GGChcJ2PRPVU7YvYrClYhrhIbnwWJN0K8BHqmw9biZgrKPcBbF5hKiKDKqiElVNcr_b8VK03fhjbcNAfm9dAfQmaVXIjUrGfI3cfPw7agfn6pdt1-TInF5k57RILd1mcIOGRypvc4L7As4708Q |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjR3JSsNAdBA96MW6Yl0H8eIhaZplkjlKaqlLi2CF3sIsL1AsqdRU0a_3TZZSFMVbIDPM8N68fSPkIgoV8jgIrRRC1_JdFVnSD8CKONNKgQYmjR-yP2C9J_92FIyqYvWiFgYAiuQzsM1nEcvXUzU3rrKWaSuAAgwt9DUU_H5QlmstXCpGe-BtXgcjHd4axjGagK5ve0hH3DTmXxI-xTSVHyy4kCvdBhnUNyrTSZ7teS5t9fmtWeO_r7xFNisNk16VT2KbrEC2Qxr19AZaEfMueTC1ISaNgk4zev4wG78J9UGv3sUMaEfkgnZQCi2i2xSVW_o41kBNPUIGEzrOaDyZzjV9RLMdudL5HnnqXg_jnlXNV7CUy93c0ikqg46bsrZ0WCSDyNGoTrEQQs1DNJqlBD_1NGIrEBIYZ4Ew7QjNFD8vSPHXPlnNphkcEOoywSLheL6J6yknECk4UjGN8JBc-KxJWjXgE1U1HzczMCZJYYQ4PEFUJQZVSYWqJrlc7HgpG2_8sXbPQH5pXQn0JjmukZtUpPmaeMUAeJQP7uEv287Iem_Yv0_ubwZ3R2TDnFTm6hyT1Xw2hxNUQ3J5Wjy-LxDP1xE |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Comments+on+%22Privacy+Aware+Data+Deduplication+for+Side+Channel+in+Cloud+Storage%22&rft.jtitle=IEEE+transactions+on+cloud+computing&rft.au=Tang%2C+Xin&rft.au=Zhu%2C+Yudan&rft.au=Fu%2C+Mingjun&rft.date=2024-04-01&rft.pub=IEEE&rft.eissn=2372-0018&rft.volume=12&rft.issue=2&rft.spage=814&rft.epage=817&rft_id=info:doi/10.1109%2FTCC.2024.3376996&rft.externalDocID=10471900 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-7161&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-7161&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-7161&client=summon |