On the Security of a Public Auditing Protocol for Shared Data with Efficient User Revocation in the Cloud

被引:0
|
作者
Ma, FangChao [1 ]
Li, Hechao [2 ]
Guo, Hua [2 ]
Xia, ChunHe [1 ]
机构
[1] Beihang Univ, Beijing Key Lab Network Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
关键词
Public auditing; Shared data; Cloud storage; User revocation; Cryptanalysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Wang et. al. proposed a public auditing protocol with efficient user's revocation for shared data in the cloud storage (InfoCom 2013, 2904-2912). By taking a careful look at the scheme, we noticed that their scheme has inherent limitations. In short, In short, the auditor cannot find the correct public key to verify those re-signatures which are converted from the original signatures. In this paper, we show a detailed weakness analysis on Wang et al.'s protocol, and propose a solution to remedy the weakness without sacrificing any desirable features of the mechanism.
引用
收藏
页码:1647 / 1655
页数:9
相关论文
共 50 条
  • [1] Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2904 - 2912
  • [2] Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (01) : 92 - 106
  • [3] Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Dongare, Dnyanada
    Kadroli, Vijayalakshmi
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [4] Public Auditing for shared data in cloud with safe user revocation
    Samundiswary, S.
    Dongre, Nilima M.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 53 - 57
  • [5] Public Integrity Auditing for Shared Data with Efficient and Secure User Revocation in Cloud Computing
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 588 - 593
  • [6] CLUSTER BASED PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT GROUP USER REVOCATION IN THE CLOUD
    Raghavan, Parimala
    Subasree
    Sakthivel
    IIOAB JOURNAL, 2016, 7 (09) : 503 - 508
  • [7] Public Auditing for Shared Data Utilizing Backups with User Revocation in the Cloud
    LIU Hequn
    WANG Baocang
    LU Ke
    GAO Ziyuan
    ZHAN Yu
    WuhanUniversityJournalofNaturalSciences, 2018, 23 (02) : 129 - 138
  • [8] Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation
    Luo, Yuchuan
    Xu, Ming
    Fu, Shaojing
    Wang, Dongsheng
    Deng, Junquan
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 434 - 442
  • [9] Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
    Jiang, Tao
    Chen, Xiaofeng
    Ma, Jianfeng
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2363 - 2373
  • [10] Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing
    Luo, Yuchuan
    Xu, Ming
    Huang, Kai
    Wang, Dongsheng
    Fu, Shaojing
    COMPUTERS & SECURITY, 2018, 73 : 492 - 506