On the security of auditing mechanisms for secure cloud storage

被引:34
|
作者
Yu, Yong [1 ,2 ]
Niu, Lei [1 ]
Yang, Guomin [2 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 新加坡国家研究基金会; 澳大利亚研究理事会;
关键词
Cloud storage; Privacy-preserving; Auditing; Cryptanalysis; CHALLENGES; SIGNATURES;
D O I
10.1016/j.future.2013.05.005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism. We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data without being detected by the auditor in the verification phase. We also propose a solution to remedy the weakness without sacrificing any desirable features of these mechanisms. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [1] A Compressive Integrity Auditing Protocol for Secure Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (03) : 1197 - 1209
  • [2] Secure and Efficient Public Auditing scheme for Cloud Storage
    More, Swapnali S.
    Chaudhari, Sangita S.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 439 - 444
  • [3] Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure
    Liu, Jiasen
    Wang, Xu An
    Zhao, Kaiyang
    Wang, Han
    ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES (EIDWT 2020), 2020, 47 : 290 - 300
  • [4] On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage
    Ni, Jianbing
    Yu, Yong
    Mu, Yi
    Xia, Qi
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (10) : 2760 - 2761
  • [5] An Efficient Auditing Scheme for Data Storage Security in Cloud
    Agarkhed, Jayashree
    Ashalatha, R.
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [6] On the Security of a Cloud Data Storage Auditing Protocol IPAD
    Wang, Xu An
    Luo, Xiaoshuang
    Zhang, Jindan
    Yang, Xiaoyuan
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 611 - 617
  • [7] Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing
    Zhang, Wenfang
    Jiao, Heng
    Yan, Zhuoqun
    Wang, Xiaomin
    Khan, Muhammad Khurram
    COMPUTERS & SECURITY, 2023, 125
  • [8] A survey of public auditing for secure data storage in cloud computing
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [9] Improved secure fuzzy auditing protocol for cloud data storage
    Zhang, Jindan
    Wang, Baocang
    He, Debiao
    Wang, Xu An
    SOFT COMPUTING, 2019, 23 (10) : 3411 - 3422
  • [10] A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
    Tian, Junfeng
    Jing, Xuan
    IEEE ACCESS, 2019, 7 : 68071 - 68082