Improved secure fuzzy auditing protocol for cloud data storage

被引:0
|
作者
Jindan Zhang
Baocang Wang
Debiao He
Xu An Wang
机构
[1] Xidian University,State Key Laboratory of Integrated Service Networks, School of Telecommunications Engineering
[2] Xianyang Vocational Technique College,Key Laboratory of Information and Network Security
[3] Engineering University of CAPF,School of Computer Science
[4] Wuhan University,Guangxi Key Laboratory of Cryptography and Information Security
[5] Guilin University of Electronic Technology,undefined
来源
Soft Computing | 2019年 / 23卷
关键词
Cloud auditing protocol; Security analysis; Attack;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, more and more people prefer to outsource their storage to the cloud; however, due to some accidents, cloud storage service providers may lose some data outsourced by the data owners. Thus a mechanism to ensure the outsourced cloud data remaining intact is needed for smoothly running the cloud storage service. Fuzzy cloud auditing protocol is such a mechanism running between data owners and cloud storage service providers. In these protocols, the data owner fuzzy challenges the cloud storage servers on the randomly chosen data blocks with random values, the servers need to response with corrected aggregated tag proof to pass through the auditing process. Until now, there are many fuzzy cloud auditing protocols with various interesting properties. In 2015, Yuan et al. proposed an auditing scheme supporting publicly integrity checking and dynamic data sharing with multi-user modification, which aims at allowing multiple cloud users to modify data while ensuring the cloud data’s integrity. Also recently Yuan et al. proposed a public proofs of retrievability (POR) in cloud with constant cost, they showed their scheme is the first POR scheme which can simultaneously achieve public verifiability, constant communication and computational costs on users, and prove the security of their scheme. However, in this paper, we show their schemes are not secure, concretely, the tags in their schemes can be easily forged. We also give an improved fuzzy cloud auditing scheme for the data owners.
引用
收藏
页码:3411 / 3422
页数:11
相关论文
共 50 条
  • [41] Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage
    Yu, Yong
    Li, Yannan
    Yang, Bo
    Susilo, Willy
    Yang, Guomin
    Bai, Jian
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 377 - 390
  • [42] A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage
    Rabaninejad, Reyhaneh
    Attari, Mahmoud Ahmadian
    Asaar, Maryam Rajabzadeh
    Aref, Mohammad Reza
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 1 - 15
  • [43] Improved Cloud Auditing Protocol and Its Application for Pandemic Data Management
    Wang, Xu An
    Yi, Zhengge
    Yang, Xiaoyuan
    Zhang, Jindan
    Xie, Yun
    Zhang, Manman
    Wu, Guixin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [44] New version of iSCSI protocol to secure Cloud Data Storage
    Elghazi, Abdellatif
    Berrezzouq, Maryem
    Abdelali, Zineelabidine
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 141 - 145
  • [45] Secure and Efficient Public Auditing scheme for Cloud Storage
    More, Swapnali S.
    Chaudhari, Sangita S.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 439 - 444
  • [46] Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure
    Liu, Jiasen
    Wang, Xu An
    Zhao, Kaiyang
    Wang, Han
    ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES (EIDWT 2020), 2020, 47 : 290 - 300
  • [47] Secure Cloud Auditing over Encrypted Data
    Shaikh, Sarah
    Vora, Deepali
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 693 - 697
  • [48] ANALYSIS AND DESIGN OF AN OPTIMIZED SECURE AUDITING PROTOCOL FOR STORING DATA DYNAMICALLY IN CLOUD COMPUTING
    Kumar, Raman
    Singh, Gurpreet
    MATERIALS TODAY-PROCEEDINGS, 2018, 5 (01) : 1037 - 1047
  • [49] A Secure Certificate-Based Data Integrity Auditing Protocol with Cloud Service Providers
    Tian, Yuan
    Zhou, Xuan
    Zhou, Tanping
    Zhong, Weidong
    Li, Ruifeng
    Yang, Xiaoyuan
    MATHEMATICS, 2024, 12 (13)
  • [50] Public Auditing: Cloud Data Storage
    Parwekar, Pritee
    Saxena, Mayuri
    Kumar, Prakash
    Saxena, Sakshi
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 169 - 173