Improved secure fuzzy auditing protocol for cloud data storage

被引:0
|
作者
Jindan Zhang
Baocang Wang
Debiao He
Xu An Wang
机构
[1] Xidian University,State Key Laboratory of Integrated Service Networks, School of Telecommunications Engineering
[2] Xianyang Vocational Technique College,Key Laboratory of Information and Network Security
[3] Engineering University of CAPF,School of Computer Science
[4] Wuhan University,Guangxi Key Laboratory of Cryptography and Information Security
[5] Guilin University of Electronic Technology,undefined
来源
Soft Computing | 2019年 / 23卷
关键词
Cloud auditing protocol; Security analysis; Attack;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, more and more people prefer to outsource their storage to the cloud; however, due to some accidents, cloud storage service providers may lose some data outsourced by the data owners. Thus a mechanism to ensure the outsourced cloud data remaining intact is needed for smoothly running the cloud storage service. Fuzzy cloud auditing protocol is such a mechanism running between data owners and cloud storage service providers. In these protocols, the data owner fuzzy challenges the cloud storage servers on the randomly chosen data blocks with random values, the servers need to response with corrected aggregated tag proof to pass through the auditing process. Until now, there are many fuzzy cloud auditing protocols with various interesting properties. In 2015, Yuan et al. proposed an auditing scheme supporting publicly integrity checking and dynamic data sharing with multi-user modification, which aims at allowing multiple cloud users to modify data while ensuring the cloud data’s integrity. Also recently Yuan et al. proposed a public proofs of retrievability (POR) in cloud with constant cost, they showed their scheme is the first POR scheme which can simultaneously achieve public verifiability, constant communication and computational costs on users, and prove the security of their scheme. However, in this paper, we show their schemes are not secure, concretely, the tags in their schemes can be easily forged. We also give an improved fuzzy cloud auditing scheme for the data owners.
引用
收藏
页码:3411 / 3422
页数:11
相关论文
共 50 条
  • [31] Enabling online/offline remote data auditing for secure cloud storage
    Gan, Qingqing
    Wang, Xiaoming
    Li, Jianwei
    Yan, Jiajun
    Li, Suyu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3027 - 3041
  • [32] Enabling online/offline remote data auditing for secure cloud storage
    Qingqing Gan
    Xiaoming Wang
    Jianwei Li
    Jiajun Yan
    Suyu Li
    Cluster Computing, 2021, 24 : 3027 - 3041
  • [33] On the security of auditing mechanisms for secure cloud storage
    Yu, Yong
    Niu, Lei
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 127 - 132
  • [34] Secure Auditing and Deduplicating Data in Cloud
    Li, Jingwei
    Li, Jin
    Xie, Dongqing
    Cai, Zhang
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2386 - 2396
  • [35] Efficient Data Integrity Auditing Supporting Provable Data Update for Secure Cloud Storage
    Yang, Changsong
    Song, Bowen
    Ding, Yong
    Ou, Jiangtao
    Fan, Chengyuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [36] Secure sustainable storage auditing protocol (SSSAP) with efficient key updates for cloud computing
    Zheng, Wenying
    Liu, Dengzhi
    Li, Xiong
    Sangaiah, Arun Kumar
    SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2020, 28
  • [37] DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage
    Zheng, Xiangshuo
    Shen, Wenting
    Su, Ye
    Gao, Yuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 299 - 316
  • [38] A provably secure and public auditing protocol based on the bell triangle for cloud data
    Tian, Junfeng
    Wang, Haoning
    COMPUTER NETWORKS, 2021, 195
  • [39] Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
    Zhang, Xingjun
    Si, Wei
    IEEE ACCESS, 2021, 9 : 37951 - 37960
  • [40] Data integrity auditing for secure cloud storage using user behavior prediction
    Tian, Junfeng
    Wang, Haoning
    Wang, Meng
    COMPUTERS & SECURITY, 2021, 105