Comment on "A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage"

被引:1
|
作者
Chang, Jinyong [1 ]
Shao, Bilin [2 ]
Ji, Yanyan [2 ]
Bian, Genqing [1 ]
机构
[1] XiAn Univ Architecture & Technol, Sch Informat Control & Engn, Xian 710055, Shaanxi, Peoples R China
[2] XiAn Univ Architecture & Technol, Sch Management, Xian 710055, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Servers; Protocols; Mathematical model; Resistance; Heuristic algorithms; Computer architecture; Cloud storage; provable security; shared data; user revocation;
D O I
10.1109/TSC.2021.3056660
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Rabaninejad et al. (2019) proposed an excellent auditing protocol for shared data (CoRPA, for short) [IEEE Trans. Ser. Comp., DOI 10.1109/TSC.2019.2919627], which has many better properties, like the identity-privacy, collusion resistant, efficient user revocation and supporting dynamic update etc. In addition, they also presented the detailed security analysis for CoRPA and described the reduction from the soundness of CoRPA to discrete logarithm assumption. However, in this article, we analyze their original security reduction (to discrete logarithm) and find out that it is incorrect and misleading. That is, the soundness of CoRPA cannot be obtained from the discrete logarithm assumption. Now, we give a new proof for their CoRPA based on the square-CDH assumption, which is also used by them to prove the security of homomorphic proxy re-signature scheme. We also hope the new security proof will provide theoretical guarantee when using CoRPA in practical scenes.
引用
收藏
页码:2633 / 2634
页数:2
相关论文
共 50 条
  • [21] Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data
    Yang, Haibin
    Yi, Zhengge
    Wang, Xu An
    Su, Yunxuan
    Tu, Zheng
    Yang, Xiaoyuan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [22] Public Auditing for Shared Data in Cloud Storage with an Effective User Dismissal
    Samundiswary, S.
    Dongre, Nilima
    [J]. COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018, 2019, 810 : 97 - 104
  • [23] Secure deduplication with efficient user revocation in cloud storage
    Wang, Yunling
    Miao, Meixia
    Wang, Jianfeng
    Zhang, Xuefeng
    [J]. COMPUTER STANDARDS & INTERFACES, 2021, 78
  • [24] Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage
    Zhang, Yinghui
    Chen, Chen
    Zheng, Dong
    Guo, Rui
    Xu, Shengmin
    [J]. IEEE ACCESS, 2019, 7 : 113832 - 113843
  • [25] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Daniel, Esther
    Vasanthi, N. A.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1247 - 1258
  • [26] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Esther Daniel
    N. A. Vasanthi
    [J]. Cluster Computing, 2019, 22 : 1247 - 1258
  • [27] Public Auditing Scheme for Cloud Data with User Revocation and Data Dynamics
    Yang Xiaodong
    Liu Tingting
    Yang Ping
    An Faying
    Yang Miaomiao
    Xiao Likun
    [J]. PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 813 - 817
  • [28] Data integrity auditing for secure cloud storage using user behavior prediction
    Tian, Junfeng
    Wang, Haoning
    Wang, Meng
    [J]. COMPUTERS & SECURITY, 2021, 105
  • [29] Secure and Efficient Data Sharing with User Revocation in Cloud
    Mallela, Nalini Sri
    Devarakonda, Nagaraju
    [J]. ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 563 - 573
  • [30] Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
    Guo, Hua
    Ma, Fangchao
    Li, Zhoujun
    Xia, Chunhe
    [J]. TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 127 - 136