2012 5th International Conference on New Technologies, Mobility and Security (NTMS) 2012
DOI: 10.1109/ntms.2012.6208705
|View full text |Cite
|
Sign up to set email alerts
|

Improving the Resistance to Side-Channel Attacks on Cloud Storage Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 7 publications
0
21
0
Order By: Relevance
“…The rationale is that if a proxy, sitting between the user and cloud, able to cache dc requests, it can obfuscate the network traffic by manipulating the order of transmitting data. For example, Heen et al [14] assumed that each user will be equipped with a gateway from the cloud storage provider. In this sense, the gateway can break the deterministic relation between dc requests and dc responses by the late forwarding policy.…”
Section: State-of-the-art Solutions and Their Weaknessesmentioning
confidence: 99%
See 2 more Smart Citations
“…The rationale is that if a proxy, sitting between the user and cloud, able to cache dc requests, it can obfuscate the network traffic by manipulating the order of transmitting data. For example, Heen et al [14] assumed that each user will be equipped with a gateway from the cloud storage provider. In this sense, the gateway can break the deterministic relation between dc requests and dc responses by the late forwarding policy.…”
Section: State-of-the-art Solutions and Their Weaknessesmentioning
confidence: 99%
“…Based on the above observation, a straightforward strategy for the side channel defense is to randomize the duplicate check procedures. Unfortunately, only very few countermeasures [14], [15], [20], [26], [30] have been deployed in the cloud storage system or been proposed in the literature.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There have been lots of efforts devoted to deal with these issues and provide a secure and efficient data deduplication [8], [10], [11], [4], [5], [12], [13], [6], [14], [7], [15], [16]. However, we are not aware of any single solution that is capable of addressing, at the same time, the three types of attacks that malicious users can attempt on the deduplication system.…”
Section: Backup Time Observationmentioning
confidence: 99%
“…However, this method does not address the others types of attacks mentioned in Section I. In [12], the authors propose a gateway-based deduplication scheme which relies on users gateways to run the deduplication process. In order to mitigate the attacks based on network traffic monitoring, gateways send a random network traffic compounded of encrypted packets with a Time-To-Live (TTL) parameter equal to 1.…”
Section: Related Workmentioning
confidence: 99%