On the Security of a Public Auditing Protocol for Shared Data with Efficient User Revocation in the Cloud

被引:0
|
作者
Ma, FangChao [1 ]
Li, Hechao [2 ]
Guo, Hua [2 ]
Xia, ChunHe [1 ]
机构
[1] Beihang Univ, Beijing Key Lab Network Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
关键词
Public auditing; Shared data; Cloud storage; User revocation; Cryptanalysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Wang et. al. proposed a public auditing protocol with efficient user's revocation for shared data in the cloud storage (InfoCom 2013, 2904-2912). By taking a careful look at the scheme, we noticed that their scheme has inherent limitations. In short, In short, the auditor cannot find the correct public key to verify those re-signatures which are converted from the original signatures. In this paper, we show a detailed weakness analysis on Wang et al.'s protocol, and propose a solution to remedy the weakness without sacrificing any desirable features of the mechanism.
引用
收藏
页码:1647 / 1655
页数:9
相关论文
共 50 条
  • [41] Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments
    Chen, Feng
    Zhou, Hong
    Luo, Yuchuan
    Chen, Yingwen
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 1 - 8
  • [42] User Data Control Protocol for Cloud Security
    Rao, Gumpina Babu
    Devi, G. Lavanya
    Murthy, N. V. E. S.
    HELIX, 2019, 9 (01): : 4763 - 4768
  • [43] Efficient public auditing scheme for non-administrator group with secure user revocation
    Chen, Jinliang
    Zhou, Tianqi
    Ji, Sai
    Tan, Haowen
    Zheng, Wenying
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 80
  • [44] Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud
    Ullah, Fasee
    Pun, Chi-Man
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (03) : 3090 - 3107
  • [45] Privacy preserving integrity checking of shared dynamic cloud data with user revocation
    Thokchom, Surmila
    Saikia, Dilip Kr
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
  • [46] Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage
    Zhang, Yinghui
    Chen, Chen
    Zheng, Dong
    Guo, Rui
    Xu, Shengmin
    IEEE ACCESS, 2019, 7 : 113832 - 113843
  • [47] Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data
    Yang, Haibin
    Yi, Zhengge
    Wang, Xu An
    Su, Yunxuan
    Tu, Zheng
    Yang, Xiaoyuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [48] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [49] Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (01) : 43 - 56
  • [50] Verification of Multi-Owner Shared Data with Collusion Resistant User Revocation in Cloud
    Kasunde, Dipali S.
    Manjrekar, A. A.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,