ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
abstract
Deduplication is a technique used to reduce the amount of storage needed by service providers. It is based on the intuition that several users may want (for different reasons) to store the same content. Hence, storing a single copy of these files would be sufficient. Albeit simple in theory, the implementation of this concept introduces many security risks. In this paper, we address the most severe one: an adversary, possessing only a fraction of the original file, or colluding with a rightful owner who leaks arbitrary portions of it, becomes able to claim possession of the entire file. The paper’s contributions are manifold: first, we review the security issues introduced by deduplication, and model related security threats; second, we introduce a novel Proof of Ownership (POW) scheme with all the features of the state-of-the-art solution and only a fraction of its overhead. We also show that the security of the proposed mechanisms relies on information-theoretical rather than computational assumptions, and propose viable optimization techniques that further improve the scheme’s performance. Finally, the quality of our proposal is supported by extensive benchmarking.
7. Conclusions
We have presented a suite of novel security protocols to implement proof of ownership in a deduplication scenario. Our core scheme is provably secure and achieves better performance than the state-of-the-art solution in the most sensitive areas of clientside I/O and computation. Furthermore, it is resilient to a malicious client leaking large portions of the input file to third parties, whereas other schemes described in the literature will be compromised in case of leaks that are larger than a pre-defined amount (64 MiB). On the downside, server-side I/O and computation are slightly higher than for state of the art solutions, but they can be conveniently mitigated by deferring them to moments of low system load. Note that the proposed solutions are fully customizable in the system parameters. Finally, extensive simulation results support the quality and viability of our proposal.