The perils of cross-silo deduplication: Trading user security for provider storage efficiency

Eric Rozier

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

With the increasing interest in public cloud infrastructures, a crucial need has evolved for trustworthy remote data storage and processing. At the same time the increased demand for storage, from backup services, to cloud infrastructures has driven the use of deduplication to eliminate redundant data in the cloud as a means to improve storage efficiency, and save bandwidth, reducing the cost of deploying and maintaining cloud infrastructures. It is assumed that it is in the best interest of both the cloud provider, and the customer to perform cross-silo deduplication, i.e. deduplicating across user-silos within the cloud. In this paper we challenge this assumption, providing experimental data which examines the benefits of cross-silo deduplication using real data for varying silo sizes, and data similarity. We also present an in-depth analysis of the issues inherent to cross-silo deduplication, detailing the attack vectors it enables through inadvertent data leakage, including a novel pair of attacks ignored by previous works. We then discuss solutions presented in the literature, the problems inherent in these solutions, and challenge the notion that cross-silo deduplication is worth the cost in lost security.

Original languageEnglish (US)
Title of host publicationProceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013
Pages85-90
Number of pages6
DOIs
StatePublished - Dec 1 2013
Event2013 5th IEEE International Workshop on Information Forensics and Security, WIFS 2013 - Guangzhou, China
Duration: Nov 18 2013Nov 21 2013

Publication series

NameProceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013

Other

Other2013 5th IEEE International Workshop on Information Forensics and Security, WIFS 2013
CountryChina
CityGuangzhou
Period11/18/1311/21/13

ASJC Scopus subject areas

  • Information Systems

Fingerprint Dive into the research topics of 'The perils of cross-silo deduplication: Trading user security for provider storage efficiency'. Together they form a unique fingerprint.

  • Cite this

    Rozier, E. (2013). The perils of cross-silo deduplication: Trading user security for provider storage efficiency. In Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013 (pp. 85-90). [6707799] (Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013). https://doi.org/10.1109/WIFS.2013.6707799