[1] Chen X Y, An J P, Xiong Z H, et al. Covert communications: a comprehensive survey [J]. IEEE Communications Surveys & Tutorials, 2023, 25(2): 1173-1198. [2] Meyer D T, Bolosky W J. A study of practical deduplication [J]. ACM Transactions on Storage, 2012, 7(4): 1-20. [3] 唐鑫, 周琳娜, 单伟杰, 等. 基于阈值重加密的抗边信道攻击云数据安全去重方法[J]. 通信学报, 2020, 41(6): 98-111. Tang X, Zhou L N, Shan W J, et al. Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack [J]. Journal on Communications, 2020, 41(6): 98-111. (in Chinese) [4] Tang X, Chen X, Zhou R, et al. Marking based obfuscation strategy to resist side channel attack in cross-user deduplication for cloud storage [C]//IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2022: 547-555. [5] Tang X, Zhang Y, Zhou L N, et al. Request merging based cross-user deduplication for cloud storage with resistance against appending chunks attack [J]. Chinese Journal of Electronics, 2021, 30(2): 199-209. [6] 唐鑫, 周琳娜. 基于响应模糊化的抗附加块攻击云数据安全去重方法[J]. 计算机应用, 2020, 40(4): 1085-1090. Tang X, Zhou L N. Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack [J]. Journal of Computer Applications, 2020, 40(4): 1085-1090. (in Chinese) [7] Ha G X, Chen H, Jia C F, et al. Threat model and defense scheme for side-channel attacks in client-side deduplication [J]. Tsinghua Science and Technology, 2023, 28(1): 1-12. [8] Pietro D R, Sorniotti A. Boosting efficiency and security in proof of ownership for deduplication [C]//Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012: 81-82. [9] Ouyang J, Zhang H R, Hu H Q, et al. Enhanced deduplication protocol for side channel in cloud storages [J]. International Journal of Network Security, 2021, 23(2): 270-277. [10] Harnik D, Pinkas B, Shulman-Peleg A. Side channels in cloud services: deduplication in cloud storage [J]. IEEE Security & Privacy, 2010, 8(6): 40-47. [11] Hovhannisyan H, Lu K J, Yang R W, et al. A novel deduplication-based covert channel in cloud storage service [C]//2015 IEEE Global Communications Conference (GLOBECOM), 2015: 1-6. [12] Hovhannisyan H, Qi W, Lu K J, et al. Whispers in the cloud storage: a novel cross-user deduplication-based covert channel design [J]. Peer-to-Peer Networking and Applications, 2018, 11(2): 277-286. [13] Chan C K, Cheng L M. Hiding data in images by simple LSB substitution [J]. Pattern Recognition, 2004, 37(3): 469-474. [14] Tang X, Liu Z, Shao Y, et al. Side channel attack resistant cross-user generalized deduplication for cloud storage [C]//IEEE International Conference on Communications, 2022: 998-1003. [15] Caviglione L, Podolski M, Mazurczyk W, et al. Covert channels in personal cloud storage services: the case of dropbox [J]. IEEE Transactions on Industrial Informatics, 2017, 13(4): 1921-1931. [16] Yu C M, Chen C Y, Chao H C. Proof of ownership in deduplicated cloud storage with mobile device efficiency [J]. IEEE Network, 2015, 29(2): 51-55. |