Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses

04/11/2019
by   Jingwei Li, et al.
0

Encrypted deduplication combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mainly build on deterministic encryption to preserve deduplication effectiveness. However, such deterministic encryption reveals the underlying frequency distribution of the original plaintext chunks. This allows an adversary to launch frequency analysis against the ciphertext chunks and infer the content of the original plaintext chunks. In this paper, we study how frequency analysis affects information leakage in encrypted deduplication storage, from both attack and defense perspectives. Specifically, we target backup workloads, and propose a new inference attack that exploits chunk locality to increase the coverage of inferred chunks. We further combine the new inference attack with the knowledge of chunk sizes and show its attack effectiveness against variable-size chunks. We conduct trace-driven evaluation on both real-world and synthetic datasets and show that our proposed attacks infer a significant fraction of plaintext chunks under backup workloads. To defend against frequency analysis, we present two defense approaches, namely MinHash encryption and scrambling. Our trace-driven evaluation shows that our combined MinHash encryption and scrambling scheme effectively mitigates the severity of the inference attacks, while maintaining high storage efficiency and incurring limited metadata access overhead.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/10/2021

Equi-Joins Over Encrypted Data for Series of Queries

Encryption provides a method to protect data outsourced to a DBMS provid...
research
06/12/2022

RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis

Encryption ransomware has become a notorious malware. It encrypts user d...
research
10/09/2021

A Multiple Snapshot Attack on Deniable Storage Systems

While disk encryption is suitable for use in most situations where confi...
research
02/04/2020

Bicycle Attacks Considered Harmful: Quantifying the Damage of Widespread Password Length Leakage

We examine the issue of password length leakage via encrypted traffic i....
research
11/17/2021

BigFoot: Exploiting and Mitigating Leakage in Encrypted Write-Ahead Logs

Modern databases and data-warehousing systems separate query processing ...
research
06/29/2023

SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores

Numerous studies have underscored the significant privacy risks associat...
research
02/10/2020

Adversarial Data Encryption

In the big data era, many organizations face the dilemma of data sharing...

Please sign up or login with your details

Forgot password? Click here to reset