The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2010 vol.8)
pp: 40-47
Danny Harnik , IBM Haifa Research Lab
Benny Pinkas , Bar Ilan University
Alexandra Shulman-Peleg , IBM Haifa Research Lab
Although deduplication is most effective when applied across multiple users, cross-user deduplication has serious privacy implications. Some simple mechanisms can enable cross-user deduplication while greatly reducing the risk of data leakage.
Cloud storage, deduplication, side channels, differential privacy
Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg, "Side Channels in Cloud Services: Deduplication in Cloud Storage", IEEE Security & Privacy, vol.8, no. 6, pp. 40-47, November/December 2010, doi:10.1109/MSP.2010.187
1. A.W.C. Stanley Zaffos, "Cloud Storage: Benefits, Risks and Cost Considerations," Gartner, Apr. 2009.
2. M. Armbrust et al., "Above the Clouds: A Berkeley View of Cloud Computing," tech. report UCB/EECS-2009-28, Electrical Eng. and Computer Science Dept., Univ. Calif., Berkeley, 2009; EECS-2009-28.html.
3. D. Russell, "Data Deduplication Will Be Even Bigger in 2010," Gartner, Feb. 2010.
4. M. Dutch and L. Freeman, "Understanding Data Deduplication Ratios," data management forum report, Storage Networking Industry Assoc. (SNIA), 2009; .
5. H.S. Gunawi et al., "Deconstructing Commodity Storage Clusters," Proc. 32nd Ann. Int'l Symp. Computer Architecture (ISCA 05), IEEE CS Press, 2005, pp. 60–71.
6. J.R. Douceur et al., "Reclaiming Space from Duplicate Files in a Serverless Distributed File System," Proc. Int'l Conf. Distributed Computing Systems, IEEE CS Press, 2002, pp. 617–630.
7. S. Quinlan and S. Dorward, "Venti: A New Approach to Archival Storage," Proc. 1st Usenix Conf. File and Storage Technologies (FAST '02), Usenix Assoc., 2002, pp. 89–101.
8. A. Muthitacharoen, B. Chen, and D. Mazieres, "A Low-Bandwidth Network File System," Proc. Symp. Operating Systems Principles (SOSP 01), ACM Press, 2001, pp. 174–187.
9. L.L. You, K.T. Pollack, and D.D.E. Long, "Deep Store: An Archival Storage System Architecture," Proc. 21st Int'l Conf. Data Eng. (ICDE 05), IEEE Press, 2005, pp. 804–815.
10. M.W. Storer et al., "Secure Data Deduplication," Proc. 4th ACM Int'l Workshop Storage Security and Survivability (StorageSS), ACM Press, 2008, pp. 1–10.
11. C. Dwork, "Differential Privacy: A Survey of Results," Pro-c. 5th Int'l Conf. Theory and Applications of Models of Computation (TAMC 08), Springer-Verlag, 2008, pp. 1–19.
347 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool