Secure Single-Server Nearly-Identical Image Deduplication

05/05/2020
by   Jonathan Takeshita, et al.
0

Cloud computing is often utilized for file storage. Clients of cloud storage services want to ensure the privacy of their data, and both clients and servers want to use as little storage as possible. Cross-user deduplication is one method to reduce the amount of storage a server uses. Deduplication and privacy are naturally conflicting goals, especially for nearly-identical (“fuzzy”) deduplication, as some information about the data must be used to perform deduplication. Prior solutions thus utilize multiple servers, or only function for exact deduplication. In this paper, we present a single-server protocol for cross-user nearly-identical deduplication based on secure locality-sensitive hashing (SLSH). We formally define our ideal security, and rigorously prove our protocol secure against fully malicious, colluding adversaries with a proof by simulation. We show experimentally that the individual parts of the protocol are computationally feasible, and further discuss practical issues of security and efficiency.

READ FULL TEXT

page 1

page 10

research
12/12/2017

Keyword-Based Delegable Proofs of Storage

Cloud users (clients) with limited storage capacity at their end can out...
research
05/08/2018

An Efficient Secure Distributed Cloud Storage for Append-only Data

Cloud computing enables users (clients) to outsource large volume of the...
research
05/06/2022

Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients

In secure machine learning inference, most current schemes assume that t...
research
10/13/2021

3LSAA: A Secure And Privacy-preserving Zero-knowledge-based Data-sharing Approach Under An Untrusted Environment

As data collection and analysis become critical functions for many cloud...
research
09/04/2018

More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting

The problem of Oblivious RAM (ORAM) has traditionally been studied in a ...
research
11/20/2018

FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions

Machine learning as a service has been widely deployed to utilize deep n...
research
10/12/2021

StateAFL: Greybox Fuzzing for Stateful Network Servers

Fuzzing network servers is a technical challenge, since the behavior of ...

Please sign up or login with your details

Forgot password? Click here to reset