Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage
Proceedings of the 2017 Symposium on Cloud Computing, 2017•dl.acm.org
Data deduplication [3] is able to effectively identify and eliminate redundant data and only
maintain a single copy of files and chunks. Hence, it is widely used in cloud storage systems
to save the users' network bandwidth for uploading data. However, the occurrence of
deduplication can be easily identified by monitoring and analyzing network traffic, which
leads to the risk of user privacy leakage. The attacker can carry out a very dangerous side
channel attack, ie, learn-the-remaining-information (LRI) attack, to reveal users' privacy …
maintain a single copy of files and chunks. Hence, it is widely used in cloud storage systems
to save the users' network bandwidth for uploading data. However, the occurrence of
deduplication can be easily identified by monitoring and analyzing network traffic, which
leads to the risk of user privacy leakage. The attacker can carry out a very dangerous side
channel attack, ie, learn-the-remaining-information (LRI) attack, to reveal users' privacy …
Data deduplication [3] is able to effectively identify and eliminate redundant data and only maintain a single copy of files and chunks. Hence, it is widely used in cloud storage systems to save the users' network bandwidth for uploading data. However, the occurrence of deduplication can be easily identified by monitoring and analyzing network traffic, which leads to the risk of user privacy leakage. The attacker can carry out a very dangerous side channel attack, i.e., learn-the-remaining-information (LRI) attack, to reveal users' privacy information by exploiting the side channel of network traffic in deduplication [1]. In the LRI attack, the attacker knows a large part of the target file in the cloud and tries to learn the remaining unknown parts via uploading all possible versions of the file's content. For example, the attacker knows all the contents of the target file X except the sensitive information θ. To learn the sensitive information, the attacker needs to upload m files with all possible values of θ, respectively. If a file Xd with the value θd is deduplicated and other files are not, the attacker knows that the information θ = θd.
In the threat model of the LRI attack, we consider a general cloud storage service model that includes two entities, i.e., the user and cloud storage server. The attack is launched by the users who aim to steal the privacy information of other users [1]. The attacker can act as a user via its own account or use multiple accounts to disguise as multiple users. The cloud storage server communicates with the users through Internet. The connections from the clients to the cloud storage server are encrypted by SSL or TLS protocol. Hence, the attacker can monitor and measure the amount of network traffic between the client and server but cannot intercept and analyze the contents of the transmitted data due to the encryption. The attacker can then perform the sophisticated traffic analysis with sufficient computing resources.
We propose a simple yet effective scheme, called randomized redundant chunk scheme (RRCS), to significantly mitigate the risk of the LRI attack while maintaining the high bandwidth efficiency of deduplication. The basic idea behind RRCS is to add randomized redundant chunks to mix up the real deduplication states of files used for the LRI attack, which effectively obfuscates the view of the attacker, who attempts to exploit the side channel of network traffic for the LRI attack. RRCS includes three key function modules, range generation (RG), secure bounds setting (SBS), and security-irrelevant redundancy elimination (SRE). When uploading the random-number redundant chunks, RRCS first uses RG to generate a fixed range [0,λN] (λ ε (0,1]), in which the number of added redundant chunks is randomly chosen, where N is the total number of chunks in a file and λ is a system parameter. However, the fixed range may cause a security issue. SBS is used to deal with the bounds of the fixed range to avoid the security issue. There may exist security-irrelevant redundant chunks in RRCS. SRE reduces the security-irrelevant redundant chunks to improve the deduplication efficiency. The design details are presented in our technical report [5].
Our security analysis demonstrates RRCS can significantly reduce the risk of the LRI attack [5]. We examine the performance of RRCS using three real-world trace-based datasets, i.e., Fslhomes [2], MacOS [2], and Onefull [4], and compare RRCS with the randomized threshold scheme (RTS) [1]. Our experimental results show that source-based deduplication eliminates 100% data redundancy which however has no security guarantee. File-level (chunk-level) RTS only eliminates 8.1% -- 16.8% (9.8% -- 20.3 …
ACM Digital Library
Showing the best result for this search. See all results