On the security of auditing mechanisms for secure cloud storage

被引:34
|
作者
Yu, Yong [1 ,2 ]
Niu, Lei [1 ]
Yang, Guomin [2 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 新加坡国家研究基金会; 澳大利亚研究理事会;
关键词
Cloud storage; Privacy-preserving; Auditing; Cryptanalysis; CHALLENGES; SIGNATURES;
D O I
10.1016/j.future.2013.05.005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism. We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data without being detected by the auditor in the verification phase. We also propose a solution to remedy the weakness without sacrificing any desirable features of these mechanisms. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [21] A Novel approach to Secure Cloud Data Storage and Dynamic Data Auditing in a Cloud
    Brindha, K.
    Jeyanthi, N.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [22] Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    Ma, Jixin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1408 - 1421
  • [23] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [24] A Decentralized Public Auditing Scheme for Secure Cloud Storage Based on Blockchain
    Chen, Jiannan
    Wang, Ying
    Huang, Zhaohui
    Ruan, Conghao
    Hu, Chunqiang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [25] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    S. Anbuchelian
    C. M. Sowmya
    C. Ramesh
    Cluster Computing, 2019, 22 : 9767 - 9775
  • [26] SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment
    Aujla, Gagangeet Singh
    Chaudhary, Rajat
    Kumar, Neeraj
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) : 78 - 85
  • [27] Secure public data auditing scheme for cloud storage in smart city
    Libing Wu
    Jing Wang
    Neeraj Kumar
    Debiao He
    Personal and Ubiquitous Computing, 2017, 21 : 949 - 962
  • [28] An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
    Yang, Kan
    Jia, Xiaohua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) : 1717 - 1726
  • [29] Secure public data auditing scheme for cloud storage in smart city
    Wu, Libing
    Wang, Jing
    Kumar, Neeraj
    He, Debiao
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 949 - 962
  • [30] Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
    Yu, Jia
    Wang, Huaqun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1931 - 1940