Modeling the side-channel attacks in data deduplication with game theory | IEEE Conference Publication | IEEE Xplore