2021
DOI: 10.1155/2021/6686281
|View full text |Cite
|
Sign up to set email alerts
|

Aggregation-Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack

Abstract: Tag deduplication is an emerging technique to eliminate redundancy in cloud storage, which works by signing integrity tags with a content-associated key instead of user-associated secret key. To achieve public auditability in this scenario, the linkage between cloud users and their integrity tags is firstly re-established in current solutions, which provides a potential side channel to malicious third-party auditor to steal the existence privacy of a certain target file. Such kind of attack, which is also poss… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Tang et al . [15] proposed a secure de-duplication scheme based on threshold re-encryption, which can resist sidechannel attacks while effectively reducing computational overhead. Gao et al .…”
Section: A Related Workmentioning
confidence: 99%
“…Tang et al . [15] proposed a secure de-duplication scheme based on threshold re-encryption, which can resist sidechannel attacks while effectively reducing computational overhead. Gao et al .…”
Section: A Related Workmentioning
confidence: 99%
“…A secure aggregation-based tag deduplication method (ATDS) was designed in [15] for side channel attack recognition through the public verification. The Lagrangian interpolation-based aggregation method was developed to attain tag deduplication.…”
Section: Related Workmentioning
confidence: 99%
“…However, when uploading data to the CS, users want to encrypt the data to protect their privacy and prevent the data content from being obtained by CS or other attackers [5], [6]. However, with traditional encryption schemes, users randomly select keys and encrypt the plaintext.…”
mentioning
confidence: 99%