Encrypted Deduplication (Current Focus)
Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. It builds on the idea that encrypts each message with a key derived from the content of the message itself, so that identical messages are always encrypted into identical ciphertexts for deduplication.
In this project, we address the practical issues of encrypted deduplication, in order to improve its usability in real systems.
- FeatureSpy is a secure deduplicated storage system that effectively detects learning-content attacks based on the observation that such attacks often generate a large volume of similar data (INFOCOM’23).
- DEBE realizes deduplication-before-encryption via SGX (ATC’22).
- SGXDedup implements a high performance encrypted deduplication system via SGX (ATC’21).
- TED proposes a tunable encrypted deduplication approach to balance data confidentiality and storage efficiency (Eurosys’20).
- Metadedup presents encrypted deduplication storage with space-efficient metadata management (MSST’19, TC’21).
- Freqanalysis toolkit reveals the underlying security risk against encrypted deduplication (DSN’17, TOS’20, INFOCOM’22).
- REED augments encrypted deduplication storage systems with dynamic access control (DSN’16, TOS’17).
- CDStore provides a unified multi-cloud storage solution with reliability, security and cost efficiency (ATC’15, IC’16).
- Dekey provides a cost-efficient way for managing large-scale convergent keys (TPDS’14).
Outsourced Attribute-based Cryptographic Primitives
In this project, we introduce outsourced computation into attribute-based primitives and enable to securely delegate the heavy computations from resource-constrained clients to third-party servers:
- We propose various outsourced attribute-based encryption (ABE) primitives that can delegate the computation of key generation and encryption to third party.
- We augment outsourced decryption with checkability that can verify the correctness of results.
- We apply outsourcing computation to attribute-based signature and identity-based encryption, and delegate the sign and revocation operation to third party, respectively.