Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage

被引:37
|
作者
He, Debiao [1 ,2 ]
Wang, Huaqun [3 ]
Zhang, Jianhong [4 ]
Wang, Lina [5 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan, Peoples R China
[2] Anhui Univ, Coinnovat Ctr Informat Supply & Assurance Technol, Hefei, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[4] North China Univ Technol, Coll Sci, Beijing, Peoples R China
[5] Wuhan Univ, Comp Sch, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Public auditing; Identity-based cryptography; Provable security; Bilinear pairing; CHECKING;
D O I
10.1016/j.ins.2016.09.049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public auditing protocol is very significant for implementing secure cloud storage since it can be used to check the integrity of the data stored in the cloud without downloading them. Recently, Zhang and Dong presented an identity-based public auditing (IBPA) protocol using the bilinear pairing and claimed that their protocol is provably secure in the random oracle model. Through proposing two concrete attacks, we demonstrate that the adversary against Zhang-Dong's protocol can break the data integrity without being found by the auditor. The analysis shows that their protocol is not secure for the cloud storage. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [41] Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage
    Yu, Yong
    Li, Yannan
    Yang, Bo
    Susilo, Willy
    Yang, Guomin
    Bai, Jian
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 377 - 390
  • [42] Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage"
    Han, Lidong
    Xu, Guangwu
    Xie, Qi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3934 - 3935
  • [43] Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 331 - 346
  • [44] Secure fuzzy identity-based public verification for cloud storage
    Xu, Yongliang
    Jin, Chunhua
    Qin, Wenyu
    Shan, Jinsong
    Jin, Ying
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 128
  • [45] Secure fuzzy identity-based public verification for cloud storage
    Xu, Yongliang
    Jin, Chunhua
    Qin, Wenyu
    Shan, Jinsong
    Jin, Ying
    Journal of Systems Architecture, 2022, 128
  • [46] Public Auditing: Cloud Data Storage
    Parwekar, Pritee
    Saxena, Mayuri
    Kumar, Prakash
    Saxena, Sakshi
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 169 - 173
  • [47] Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
    Liu, Hongyu
    Chen, Leiting
    Davar, Zahra
    Pour, Mohammad Ramezanian
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 473 - 482
  • [48] PPADT: Privacy-Preserving Identity-Based Public Auditing With Efficient Data Transfer for Cloud-Based IoT Data
    Gai, Chao
    Shen, Wenting
    Yang, Ming
    Yu, Jia
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (22) : 20065 - 20079
  • [49] Cloud data integrity checking with an identity-based auditing mechanism from RSA
    Yu, Yong
    Xue, Liang
    Au, Man Ho
    Susilo, Willy
    Ni, Jianbing
    Zhang, Yafang
    Vasilakos, Athanasios V.
    Shen, Jian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 85 - 91
  • [50] RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage
    Guo, Zirui
    Zhang, Kai
    Wei, Lifei
    Chen, Siyuan
    Wang, Liangliang
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 141