TY - GEN
T1 - The perils of cross-silo deduplication
T2 - 2013 5th IEEE International Workshop on Information Forensics and Security, WIFS 2013
AU - Rozier, Eric
PY - 2013/12/1
Y1 - 2013/12/1
N2 - With the increasing interest in public cloud infrastructures, a crucial need has evolved for trustworthy remote data storage and processing. At the same time the increased demand for storage, from backup services, to cloud infrastructures has driven the use of deduplication to eliminate redundant data in the cloud as a means to improve storage efficiency, and save bandwidth, reducing the cost of deploying and maintaining cloud infrastructures. It is assumed that it is in the best interest of both the cloud provider, and the customer to perform cross-silo deduplication, i.e. deduplicating across user-silos within the cloud. In this paper we challenge this assumption, providing experimental data which examines the benefits of cross-silo deduplication using real data for varying silo sizes, and data similarity. We also present an in-depth analysis of the issues inherent to cross-silo deduplication, detailing the attack vectors it enables through inadvertent data leakage, including a novel pair of attacks ignored by previous works. We then discuss solutions presented in the literature, the problems inherent in these solutions, and challenge the notion that cross-silo deduplication is worth the cost in lost security.
AB - With the increasing interest in public cloud infrastructures, a crucial need has evolved for trustworthy remote data storage and processing. At the same time the increased demand for storage, from backup services, to cloud infrastructures has driven the use of deduplication to eliminate redundant data in the cloud as a means to improve storage efficiency, and save bandwidth, reducing the cost of deploying and maintaining cloud infrastructures. It is assumed that it is in the best interest of both the cloud provider, and the customer to perform cross-silo deduplication, i.e. deduplicating across user-silos within the cloud. In this paper we challenge this assumption, providing experimental data which examines the benefits of cross-silo deduplication using real data for varying silo sizes, and data similarity. We also present an in-depth analysis of the issues inherent to cross-silo deduplication, detailing the attack vectors it enables through inadvertent data leakage, including a novel pair of attacks ignored by previous works. We then discuss solutions presented in the literature, the problems inherent in these solutions, and challenge the notion that cross-silo deduplication is worth the cost in lost security.
UR - http://www.scopus.com/inward/record.url?scp=84894190680&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84894190680&partnerID=8YFLogxK
U2 - 10.1109/WIFS.2013.6707799
DO - 10.1109/WIFS.2013.6707799
M3 - Conference contribution
AN - SCOPUS:84894190680
SN - 9781467355933
T3 - Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013
SP - 85
EP - 90
BT - Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013
Y2 - 18 November 2013 through 21 November 2013
ER -