relying solely on compression instead of dedupli-
cation to reduce storage usage. Another approach
to counter this attack is to encrypt the data inside
the virtual machines. However, all of the discussed
countermeasures impact the achievable storage space
reductions negatively. Therefore, we plan to explore
how to better mitigate such attacks in future work.
While this paper focused on detecting individual files,
we believe that it is also possible to discover multiple
consecutive files. In this case, each of the written
files has to be aligned to the block size of the file
system. We leave the extension of the measurement
application as future work. Nevertheless, due to
the severity of the presented attack, we propose to
reconsider relying on data deduplication in multi-user
and shared cloud environments.
REFERENCES
Harnik, D., Pinkas, B., and Shulman-Peleg, A. (2010). Side
Channels in Cloud Services: Deduplication in Cloud
Storage. IEEE Security & Privacy, 8:40–47.
Hovhannisyan, H., Lu, K., Yang, R., Qi, W., Wang, J.,
and Wen, M. (2015). A Novel Deduplication-Based
Covert Channel in Cloud Storage Service. In 2015
IEEE Global Communications Conference, GLOBE-
COM 2015, San Diego, CA, USA, December 6-10,
2015, pages 1–6. IEEE.
Irazoqui, G., Inci, M. S., Eisenbarth, T., and Sunar, B.
(2015). Know Thy Neighbor: Crypto Library Detec-
tion in Cloud. PoPETs, 2015:25–40.
Jin, K. and Miller, E. L. (2009). The effectiveness of
deduplication on virtual machine disk images. In The
Israeli Experimental Systems Conference – SYSTOR
2009, ACM International Conference Proceeding
Series, page 7. ACM.
Kogan, P. (2014). Full disk encryption with luks (including
/boot). https://www.pavelkogan.com/2014/05/23/luks-
full-disk-encryption/. Last accessed on Mar 13, 2019.
Landau, P. (2018). Full-system encryption needs
to be supported out-of-the-box including /boot
and should not delete other installed systems.
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+
bug/1773457/. Last accessed on Mar 13, 2019.
Maurice, C., Weber, M., Schwarz, M., Giner, L., Gruss, D.,
Boano, C. A., Mangard, S., and R
¨
omer, K. (2017).
Hello from the Other Side: SSH over Robust Cache
Covert Channels in the Cloud. In Network and Dis-
tributed System Security Symposium – NDSS 2017.
The Internet Society.
Ng, C., Ma, M., Wong, T., Lee, P. P. C., and Lui, J. C. S.
(2011). Live Deduplication Storage of Virtual Ma-
chine Images in an Open-Source Cloud. In Interna-
tional Middleware Conference 2011, volume 7049 of
LNCS, pages 81–100. Springer.
Paoloni, G. (2010). How to benchmark code execution
times on intel ia-32 and ia-64 instruction set architec-
tures. Intel Corporation, page 123.
Pooranian, Z., Chen, K., Yu, C., and Conti, M. (2018).
RARE: Defeating side channels based on data-
deduplication in cloud storage. In IEEE INFOCOM
2018 - IEEE Conference on Computer Communi-
cations Workshops, INFOCOM Workshops 2018,
Honolulu, HI, USA, April 15-19, 2018, pages 444–
449. IEEE.
Puzio, P., Molva, R.,
¨
Onen, M., and Loureiro, S. (2013).
ClouDedup: Secure Deduplication with Encrypted
Data for Cloud Storage. In IEEE 5th International
Conference on Cloud Computing Technology and
Science, CloudCom 2013, Bristol, United Kingdom,
December 2-5, 2013, Volume 1, pages 363–370. IEEE
Computer Society.
Suzaki, K., Iijima, K., Yagi, T., and Artho, C. (2011).
Memory deduplication as a threat to the guest OS. In
European Workshop on System Security – EUROSEC
2011, page 1. ACM.
Tromer, E., Osvik, D. A., and Shamir, A. (2010). Efficient
Cache Attacks on AES, and Countermeasures. J.
Cryptology, 23:37–71.
Yarom, Y. and Falkner, K. (2014). FLUSH+RELOAD: A
High Resolution, Low Noise, L3 Cache Side-Channel
Attack. In USENIX Security Symposium 2014, pages
719–732. USENIX Association.
Zhao, X., Zhang, Y., Wu, Y., Chen, K., Jiang, J., and Li,
K. (2014). Liquid: A Scalable Deduplication File
System for Virtual Machine Images. IEEE Trans.
Parallel Distrib. Syst., 25:1257–1266.
Prying CoW: Inferring Secrets across Virtual Machine Boundaries
197