Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage

被引:6
|
作者
Kang, Baoyuan [1 ]
Wang, Jiaqiang [1 ]
Shao, Dongyang [1 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Sci & Software, Tianjin 300387, Peoples R China
关键词
DATA POSSESSION; CHECKING;
D O I
10.1155/2017/8062182
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the development of Internet, cloud computing has emerged to provide service to data users. But, it is necessary for an auditor on behalf of users to check the integrity of the data stored in the cloud. The cloud server alsomust ensure the privacy of the data. In a usual public integrity check scheme, the linear combination of data blocks is needed for verification. But, after times of auditing on the same data blocks, based on collected linear combinations, the auditor might derive these blocks. Recently, a number of public auditing schemes with privacy-preserving are proposed. With blinded linear combinations of data blocks, the authors of these schemes believed that the auditor cannot derive any information about the data blocks and claimed that their schemes are provably secure in the random oracle model. In this paper, with detailed security analysis of these schemes, we show that these schemes are vulnerable to an attack from the malicious cloud server who modifies the data blocks and succeeds in forging proof information for data integrity check.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Privacy-preserving public auditing for educational multimedia data in cloud computing
    Daeyeong Kim
    Hyunsoo Kwon
    Changhee Hahn
    Junbeom Hur
    Multimedia Tools and Applications, 2016, 75 : 13077 - 13091
  • [32] Privacy-Preserving Cloud Auditing with Multiple Uploaders
    Wu, Ge
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 10060 : 224 - 237
  • [33] Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme
    Li, Haifeng
    Liu, Liangliang
    Lan, Caihui
    Wang, Caifen
    Guo, He
    IEEE ACCESS, 2020, 8 : 86797 - 86809
  • [34] Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code
    Pasupuleti, Syam Kumar
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2019, 9 (04) : 1 - 20
  • [35] Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage
    Zhang, Yinghui
    Zhang, Tiantian
    Guo, Rui
    Xu, Shengmin
    Zheng, Dong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11): : 5653 - 5672
  • [36] Privacy-preserving TPA auditing scheme based on skip list for cloud storage
    Zhao, Haichun
    Yao, Xuanxia
    Zheng, Xuefeng
    International Journal of Network Security, 2019, 21 (03) : 451 - 461
  • [37] Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
    Jianhong Zhang
    Xubing Zhao
    Cluster Computing, 2016, 19 : 47 - 56
  • [38] Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
    Zhang, Jianhong
    Zhao, Xubing
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 47 - 56
  • [39] Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics
    Wang, Boyang
    Li, Hui
    Li, Ming
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [40] Privacy-Preserving Public Auditing for Shared Cloud Data With Secure Group Management
    Kim, Dongmin
    Kim, Kee Sung
    IEEE ACCESS, 2022, 10 : 44212 - 44223