2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017
DOI: 10.1109/dsn.2017.28
|View full text |Cite
|
Sign up to set email alerts
|

Information Leakage in Encrypted Deduplication via Frequency Analysis

Abstract: Encrypted deduplication combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mainly build on deterministic encryption to preserve deduplication effectiveness. However, such deterministic encryption reveals the underlying frequency distribution of the original plaintext chunks. This allows an adversary to launch frequency analysis against the ciphertext chunks and infer the content of the original plaintext ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(2 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…The previous schemes enable attackers at the untrusted server to identify if a given block is a duplicate or not, thus being susceptible to information leakage (e.g., revealing potential associations between users and the data these share) [31].…”
Section: Secure Deduplicationmentioning
confidence: 99%
“…The previous schemes enable attackers at the untrusted server to identify if a given block is a duplicate or not, thus being susceptible to information leakage (e.g., revealing potential associations between users and the data these share) [31].…”
Section: Secure Deduplicationmentioning
confidence: 99%
“…IDC (International Data Corporation) statistic shows that the global data volume reached 4.4 ZB in 2013, reached 8.61 ZB by the end of 2015, the growth rate of data volume is more than 50%, and expected to 2020, it will unexpectedly reach 44 ZB [5]. More than half of the cloud storage space is occupied by the duplicate data, and the expenditure for managing the duplicate data is 8 times that of the original data [6]. Along with the explosive growth of cloud data, massive duplicate data occupied the storage space and the huge expenditure bring a severe challenge to the limited cloud storage space.…”
Section: Introductionmentioning
confidence: 99%