Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage

被引:6
|
作者
Kang, Baoyuan [1 ]
Wang, Jiaqiang [1 ]
Shao, Dongyang [1 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Sci & Software, Tianjin 300387, Peoples R China
关键词
DATA POSSESSION; CHECKING;
D O I
10.1155/2017/8062182
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the development of Internet, cloud computing has emerged to provide service to data users. But, it is necessary for an auditor on behalf of users to check the integrity of the data stored in the cloud. The cloud server alsomust ensure the privacy of the data. In a usual public integrity check scheme, the linear combination of data blocks is needed for verification. But, after times of auditing on the same data blocks, based on collected linear combinations, the auditor might derive these blocks. Recently, a number of public auditing schemes with privacy-preserving are proposed. With blinded linear combinations of data blocks, the authors of these schemes believed that the auditor cannot derive any information about the data blocks and claimed that their schemes are provably secure in the random oracle model. In this paper, with detailed security analysis of these schemes, we show that these schemes are vulnerable to an attack from the malicious cloud server who modifies the data blocks and succeeds in forging proof information for data integrity check.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [2] Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage
    Zhao, Xia'nan
    Wang, Dongsheng
    [J]. 2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 486 - 491
  • [3] Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
    Yan, Hao
    Liu, Yanan
    Zhang, Zheng
    Wang, Qian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713
  • [5] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [6] Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain
    Miao, Ying
    Huang, Qiong
    Xiao, Meiyan
    Li, Hongbo
    [J]. IEEE ACCESS, 2020, 8 : 139813 - 139826
  • [7] Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
    Liu, Hongyu
    Chen, Leiting
    Davar, Zahra
    Pour, Mohammad Ramezanian
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 473 - 482
  • [8] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    Yang Zhen
    Wang Wenyu
    Huang Yongfeng
    Li Xing
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (01) : 179 - 187
  • [9] Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage
    Ren Zhengwei
    Wang Lina
    Wu Qianhong
    Deng Ruyi
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 297 - 301
  • [10] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    YANG Zhen
    WANG Wenyu
    HUANG Yongfeng
    LI Xing
    [J]. Chinese Journal of Electronics, 2019, 28 (01) : 179 - 187