Improved secure fuzzy auditing protocol for cloud data storage

被引:22
|
作者
Zhang, Jindan [1 ,2 ,5 ]
Wang, Baocang [1 ]
He, Debiao [4 ]
Wang, Xu An [3 ,5 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, State Key Lab Integrated Serv Networks, Xian, Shaanxi, Peoples R China
[2] Xianyang Vocat Tech Coll, Xian, Shaanxi, Peoples R China
[3] Engn Univ CAPF Xian, Key Lab Informat & Network Secur, Xian, Shaanxi, Peoples R China
[4] Wuhan Univ, Sch Comp Sci, Wuhan, Hubei, Peoples R China
[5] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cloud auditing protocol; Security analysis; Attack; INTEGRITY CHECKING; PROOFS;
D O I
10.1007/s00500-017-3000-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, more and more people prefer to outsource their storage to the cloud; however, due to some accidents, cloud storage service providers may lose some data outsourced by the data owners. Thus a mechanism to ensure the outsourced cloud data remaining intact is needed for smoothly running the cloud storage service. Fuzzy cloud auditing protocol is such a mechanism running between data owners and cloud storage service providers. In these protocols, the data owner fuzzy challenges the cloud storage servers on the randomly chosen data blocks with random values, the servers need to response with corrected aggregated tag proof to pass through the auditing process. Until now, there are many fuzzy cloud auditing protocols with various interesting properties. In 2015, Yuan et al. proposed an auditing scheme supporting publicly integrity checking and dynamic data sharing with multi-user modification, which aims at allowing multiple cloud users to modify data while ensuring the cloud data's integrity. Also recently Yuan et al. proposed a public proofs of retrievability (POR) in cloud with constant cost, they showed their scheme is the first POR scheme which can simultaneously achieve public verifiability, constant communication and computational costs on users, and prove the security of their scheme. However, in this paper, we show their schemes are not secure, concretely, the tags in their schemes can be easily forged. We also give an improved fuzzy cloud auditing scheme for the data owners.
引用
收藏
页码:3411 / 3422
页数:12
相关论文
共 50 条
  • [1] Improved secure fuzzy auditing protocol for cloud data storage
    Jindan Zhang
    Baocang Wang
    Debiao He
    Xu An Wang
    [J]. Soft Computing, 2019, 23 : 3411 - 3422
  • [2] Public Auditing System: Improved Remote Data Possession Checking Protocol for Secure Cloud Storage
    Rashmi, Patil R.
    Sangve, S. M.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 75 - 80
  • [3] IPAPS: An improved public auditing protocol for secure data storage in cloud-based medical storage system
    Tang, Caiyuan
    Wang, Feng
    Zhao, Chenbin
    Chen, Xiuqiang
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (09):
  • [4] An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
    Yang, Kan
    Jia, Xiaohua
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) : 1717 - 1726
  • [5] A Compressive Integrity Auditing Protocol for Secure Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (03) : 1197 - 1209
  • [6] Privacy Preserving Data Auditing Protocol for Secure Storage in Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2725 - 2729
  • [7] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Daniel, Esther
    Vasanthi, N. A.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1247 - 1258
  • [8] An efficient and secure public batch auditing protocol for dynamic cloud storage data
    Yang, Liu
    Xia, Lili
    [J]. 2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 671 - 675
  • [9] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Esther Daniel
    N. A. Vasanthi
    [J]. Cluster Computing, 2019, 22 : 1247 - 1258
  • [10] Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data
    Yang, Haibin
    Yi, Zhengge
    Wang, Xu An
    Su, Yunxuan
    Tu, Zheng
    Yang, Xiaoyuan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021