-
Keyword-Based Delegable Proofs of Storage
Cloud users (clients) with limited storage capacity at their end can out...
read it
-
An Efficient Secure Distributed Cloud Storage for Append-only Data
Cloud computing enables users (clients) to outsource large volume of the...
read it
-
Interactive Verifiable Polynomial Evaluation
Cloud computing platforms have created the possibility for computational...
read it
-
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
The problem of Oblivious RAM (ORAM) has traditionally been studied in a ...
read it
-
Privacy-Preserving Cloud-Aided Broad Learning System
With the rapid development of artificial intelligence and the advent of ...
read it
-
Multiple Classification with Split Learning
Privacy issues were raised in the process of training deep learning in m...
read it
-
FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions
Machine learning as a service has been widely deployed to utilize deep n...
read it
Secure Single-Server Nearly-Identical Image Deduplication
Cloud computing is often utilized for file storage. Clients of cloud storage services want to ensure the privacy of their data, and both clients and servers want to use as little storage as possible. Cross-user deduplication is one method to reduce the amount of storage a server uses. Deduplication and privacy are naturally conflicting goals, especially for nearly-identical (“fuzzy”) deduplication, as some information about the data must be used to perform deduplication. Prior solutions thus utilize multiple servers, or only function for exact deduplication. In this paper, we present a single-server protocol for cross-user nearly-identical deduplication based on secure locality-sensitive hashing (SLSH). We formally define our ideal security, and rigorously prove our protocol secure against fully malicious, colluding adversaries with a proof by simulation. We show experimentally that the individual parts of the protocol are computationally feasible, and further discuss practical issues of security and efficiency.
READ FULL TEXT
Comments
There are no comments yet.