2020
DOI: 10.1109/tdsc.2019.2911502
|View full text |Cite
|
Sign up to set email alerts
|

Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…us, every one of the data owners could easily work out the convergent encryption key. A lot of successive works [13][14][15][16][17] focused on how to resist possible side channel attack in this scenario. Among them, some works [14,18] relied on an independent key server (KS) to introduce randomness into the generation of convergent key, where inefficient interactive blind signature protocol is usually needed.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…us, every one of the data owners could easily work out the convergent encryption key. A lot of successive works [13][14][15][16][17] focused on how to resist possible side channel attack in this scenario. Among them, some works [14,18] relied on an independent key server (KS) to introduce randomness into the generation of convergent key, where inefficient interactive blind signature protocol is usually needed.…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, they presented a novel framework, in which deduplication is triggered only when the corresponding file has already been a popular one; thus, there is no risk of privacy leakage. As a follow-up work, Zhang et al [15] resorted to the k-anonymity technique to achieve a concrete deduplication strategy. In their design, the cloud user firstly generates a convergent ciphertext based on CE scheme.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For page fault service I k , when the VM resumes running on the target server, first check whether there are any memory pages for service I k , and if so, push the memory pages according to the initial priority calculated by (8).…”
Section: Priority Calculationmentioning
confidence: 99%
“…erefore, defense against side-channel attacks is crucial for edge computing. At the moment, virtual machine migration technology is frequently used to defend against side-channel attacks, which is the primary method of defense [8,9]. Compared with traditional countermeasures, the VM migration method is general and immediately deployable [10].…”
Section: Introductionmentioning
confidence: 99%