The perils of cross-silo deduplication

Trading user security for provider storage efficiency

Eric Rozier

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

With the increasing interest in public cloud infrastructures, a crucial need has evolved for trustworthy remote data storage and processing. At the same time the increased demand for storage, from backup services, to cloud infrastructures has driven the use of deduplication to eliminate redundant data in the cloud as a means to improve storage efficiency, and save bandwidth, reducing the cost of deploying and maintaining cloud infrastructures. It is assumed that it is in the best interest of both the cloud provider, and the customer to perform cross-silo deduplication, i.e. deduplicating across user-silos within the cloud. In this paper we challenge this assumption, providing experimental data which examines the benefits of cross-silo deduplication using real data for varying silo sizes, and data similarity. We also present an in-depth analysis of the issues inherent to cross-silo deduplication, detailing the attack vectors it enables through inadvertent data leakage, including a novel pair of attacks ignored by previous works. We then discuss solutions presented in the literature, the problems inherent in these solutions, and challenge the notion that cross-silo deduplication is worth the cost in lost security.

Original languageEnglish
Title of host publicationProceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013
Pages85-90
Number of pages6
DOIs
StatePublished - Dec 1 2013
Event2013 5th IEEE International Workshop on Information Forensics and Security, WIFS 2013 - Guangzhou, China
Duration: Nov 18 2013Nov 21 2013

Other

Other2013 5th IEEE International Workshop on Information Forensics and Security, WIFS 2013
CountryChina
CityGuangzhou
Period11/18/1311/21/13

Fingerprint

Costs
Bandwidth
Data storage equipment
Processing

ASJC Scopus subject areas

  • Information Systems

Cite this

Rozier, E. (2013). The perils of cross-silo deduplication: Trading user security for provider storage efficiency. In Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013 (pp. 85-90). [6707799] https://doi.org/10.1109/WIFS.2013.6707799

The perils of cross-silo deduplication : Trading user security for provider storage efficiency. / Rozier, Eric.

Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013. 2013. p. 85-90 6707799.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rozier, E 2013, The perils of cross-silo deduplication: Trading user security for provider storage efficiency. in Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013., 6707799, pp. 85-90, 2013 5th IEEE International Workshop on Information Forensics and Security, WIFS 2013, Guangzhou, China, 11/18/13. https://doi.org/10.1109/WIFS.2013.6707799
Rozier E. The perils of cross-silo deduplication: Trading user security for provider storage efficiency. In Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013. 2013. p. 85-90. 6707799 https://doi.org/10.1109/WIFS.2013.6707799
Rozier, Eric. / The perils of cross-silo deduplication : Trading user security for provider storage efficiency. Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013. 2013. pp. 85-90
@inproceedings{563dddda4d8d403ea0ebac49a30db798,
title = "The perils of cross-silo deduplication: Trading user security for provider storage efficiency",
abstract = "With the increasing interest in public cloud infrastructures, a crucial need has evolved for trustworthy remote data storage and processing. At the same time the increased demand for storage, from backup services, to cloud infrastructures has driven the use of deduplication to eliminate redundant data in the cloud as a means to improve storage efficiency, and save bandwidth, reducing the cost of deploying and maintaining cloud infrastructures. It is assumed that it is in the best interest of both the cloud provider, and the customer to perform cross-silo deduplication, i.e. deduplicating across user-silos within the cloud. In this paper we challenge this assumption, providing experimental data which examines the benefits of cross-silo deduplication using real data for varying silo sizes, and data similarity. We also present an in-depth analysis of the issues inherent to cross-silo deduplication, detailing the attack vectors it enables through inadvertent data leakage, including a novel pair of attacks ignored by previous works. We then discuss solutions presented in the literature, the problems inherent in these solutions, and challenge the notion that cross-silo deduplication is worth the cost in lost security.",
author = "Eric Rozier",
year = "2013",
month = "12",
day = "1",
doi = "10.1109/WIFS.2013.6707799",
language = "English",
isbn = "9781467355933",
pages = "85--90",
booktitle = "Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013",

}

TY - GEN

T1 - The perils of cross-silo deduplication

T2 - Trading user security for provider storage efficiency

AU - Rozier, Eric

PY - 2013/12/1

Y1 - 2013/12/1

N2 - With the increasing interest in public cloud infrastructures, a crucial need has evolved for trustworthy remote data storage and processing. At the same time the increased demand for storage, from backup services, to cloud infrastructures has driven the use of deduplication to eliminate redundant data in the cloud as a means to improve storage efficiency, and save bandwidth, reducing the cost of deploying and maintaining cloud infrastructures. It is assumed that it is in the best interest of both the cloud provider, and the customer to perform cross-silo deduplication, i.e. deduplicating across user-silos within the cloud. In this paper we challenge this assumption, providing experimental data which examines the benefits of cross-silo deduplication using real data for varying silo sizes, and data similarity. We also present an in-depth analysis of the issues inherent to cross-silo deduplication, detailing the attack vectors it enables through inadvertent data leakage, including a novel pair of attacks ignored by previous works. We then discuss solutions presented in the literature, the problems inherent in these solutions, and challenge the notion that cross-silo deduplication is worth the cost in lost security.

AB - With the increasing interest in public cloud infrastructures, a crucial need has evolved for trustworthy remote data storage and processing. At the same time the increased demand for storage, from backup services, to cloud infrastructures has driven the use of deduplication to eliminate redundant data in the cloud as a means to improve storage efficiency, and save bandwidth, reducing the cost of deploying and maintaining cloud infrastructures. It is assumed that it is in the best interest of both the cloud provider, and the customer to perform cross-silo deduplication, i.e. deduplicating across user-silos within the cloud. In this paper we challenge this assumption, providing experimental data which examines the benefits of cross-silo deduplication using real data for varying silo sizes, and data similarity. We also present an in-depth analysis of the issues inherent to cross-silo deduplication, detailing the attack vectors it enables through inadvertent data leakage, including a novel pair of attacks ignored by previous works. We then discuss solutions presented in the literature, the problems inherent in these solutions, and challenge the notion that cross-silo deduplication is worth the cost in lost security.

UR - http://www.scopus.com/inward/record.url?scp=84894190680&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84894190680&partnerID=8YFLogxK

U2 - 10.1109/WIFS.2013.6707799

DO - 10.1109/WIFS.2013.6707799

M3 - Conference contribution

SN - 9781467355933

SP - 85

EP - 90

BT - Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013

ER -