Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage

被引:37
|
作者
He, Debiao [1 ,2 ]
Wang, Huaqun [3 ]
Zhang, Jianhong [4 ]
Wang, Lina [5 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan, Peoples R China
[2] Anhui Univ, Coinnovat Ctr Informat Supply & Assurance Technol, Hefei, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[4] North China Univ Technol, Coll Sci, Beijing, Peoples R China
[5] Wuhan Univ, Comp Sch, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Public auditing; Identity-based cryptography; Provable security; Bilinear pairing; CHECKING;
D O I
10.1016/j.ins.2016.09.049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public auditing protocol is very significant for implementing secure cloud storage since it can be used to check the integrity of the data stored in the cloud without downloading them. Recently, Zhang and Dong presented an identity-based public auditing (IBPA) protocol using the bilinear pairing and claimed that their protocol is provably secure in the random oracle model. Through proposing two concrete attacks, we demonstrate that the adversary against Zhang-Dong's protocol can break the data integrity without being found by the auditor. The analysis shows that their protocol is not secure for the cloud storage. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [31] An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1359 - 1371
  • [32] Incentive Public Auditing Scheme with Identity-Based Designated Verifier in Cloud
    Shao, Bilin
    Zhang, Li
    Bian, Genqing
    ELECTRONICS, 2023, 12 (06)
  • [33] A new identity-based public auditing against malicious auditor in the cloud
    Qian, Kun
    Huang, Hui
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) : 452 - 460
  • [34] Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage
    Deng, Lunzhi
    Feng, Shuai
    Wang, Tao
    Hu, Zhenyu
    Li, Siwei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3644 - 3655
  • [35] Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
    Zhang, Yue
    Yu, Jia
    Hao, Rong
    Wang, Cong
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 608 - 619
  • [36] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [37] Identity-Based Integrity Verification and Public Auditing Scheme in Cloud Storage System Against Malicious Auditors
    Zhang, Haojue
    Yuan, Yilin
    Xin, Xianwei
    Qu, Yanbo
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2023, 30 (02): : 408 - 415
  • [38] Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
    Zhang, Xiaojun
    Wang, Huaxiong
    Xu, Chunxiang
    INFORMATION SCIENCES, 2019, 472 : 223 - 234
  • [39] Identity-Based Encryption with Outsourced Revocation in Cloud Computing
    Li, Jin
    Li, Jingwei
    Chen, Xiaofeng
    Jia, Chunfu
    Lou, Wenjing
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 425 - 437
  • [40] Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
    Yuan, Yilin
    Gu, Yifan
    Zhang, Zhenzhen
    International Journal of Network Security, 2023, 25 (04) : 609 - 619