On the security of auditing mechanisms for secure cloud storage

被引:34
|
作者
Yu, Yong [1 ,2 ]
Niu, Lei [1 ]
Yang, Guomin [2 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 新加坡国家研究基金会; 澳大利亚研究理事会;
关键词
Cloud storage; Privacy-preserving; Auditing; Cryptanalysis; CHALLENGES; SIGNATURES;
D O I
10.1016/j.future.2013.05.005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism. We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data without being detected by the auditor in the verification phase. We also propose a solution to remedy the weakness without sacrificing any desirable features of these mechanisms. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [31] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [32] Efficient TPA-based auditing scheme for secure cloud storage
    Shao, Bilin
    Ji, Yanyan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1989 - 2000
  • [33] Enabling online/offline remote data auditing for secure cloud storage
    Gan, Qingqing
    Wang, Xiaoming
    Li, Jianwei
    Yan, Jiajun
    Li, Suyu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3027 - 3041
  • [34] Efficient TPA-based auditing scheme for secure cloud storage
    Bilin Shao
    Yanyan Ji
    Cluster Computing, 2021, 24 : 1989 - 2000
  • [35] Enabling online/offline remote data auditing for secure cloud storage
    Qingqing Gan
    Xiaoming Wang
    Jianwei Li
    Jiajun Yan
    Suyu Li
    Cluster Computing, 2021, 24 : 3027 - 3041
  • [36] Towards an analysis of data accountability and auditing for secure cloud data storage
    Prassanna, J.
    Punitha, K.
    Neelanarayanan, V
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 543 - 550
  • [37] Secure cloud storage service for detection of security violations
    Batista de Carvalho, Carlos Andre
    de Castro, Miguel Franklin
    de Castro Andrade, Rossana Maria
    2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, : 715 - 718
  • [38] Efficient data integrity auditing for storage security in mobile health cloud
    Yongjun Ren
    Jian Shen
    Yuhui Zheng
    Jin Wang
    Han-Chieh Chao
    Peer-to-Peer Networking and Applications, 2016, 9 : 854 - 863
  • [39] Efficient data integrity auditing for storage security in mobile health cloud
    Ren, Yongjun
    Shen, Jian
    Zheng, Yuhui
    Wang, Jin
    Chao, Han-Chieh
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (05) : 854 - 863
  • [40] Privacy Preserving Data Auditing Protocol for Secure Storage in Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2725 - 2729