On the security of auditing mechanisms for secure cloud storage

被引:34
|
作者
Yu, Yong [1 ,2 ]
Niu, Lei [1 ]
Yang, Guomin [2 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 新加坡国家研究基金会; 澳大利亚研究理事会;
关键词
Cloud storage; Privacy-preserving; Auditing; Cryptanalysis; CHALLENGES; SIGNATURES;
D O I
10.1016/j.future.2013.05.005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism. We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data without being detected by the auditor in the verification phase. We also propose a solution to remedy the weakness without sacrificing any desirable features of these mechanisms. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [41] Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
    Tian, Hui
    Chen, Yuxiang
    Chang, Chin-Chen
    Jiang, Hong
    Huang, Yongfeng
    Chen, Yonghong
    Liu, Jin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) : 701 - 714
  • [42] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713
  • [43] An identity-based online/offline secure cloud storage auditing scheme
    Reyhaneh Rabaninejad
    Maryam Rajabzadeh Asaar
    Mahmoud Ahmadian Attari
    Mohammad Reza Aref
    Cluster Computing, 2020, 23 : 1455 - 1468
  • [44] Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
    Zhang, Xingjun
    Si, Wei
    IEEE ACCESS, 2021, 9 : 37951 - 37960
  • [45] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Daniel, Esther
    Vasanthi, N. A.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1247 - 1258
  • [46] Data integrity auditing for secure cloud storage using user behavior prediction
    Tian, Junfeng
    Wang, Haoning
    Wang, Meng
    COMPUTERS & SECURITY, 2021, 105
  • [47] Secure Storage of Electronic Health Records on Cloud Using Integrity Verification Auditing
    Srinivasan, S.
    Keerthi, Kethineni
    Tejaswi, Gummadi
    Shobana, Kodali Divya
    REVISTA GEINTEC-GESTAO INOVACAO E TECNOLOGIAS, 2021, 11 (02): : 2132 - 2141
  • [48] Dynamic proof of retrievability based on public auditing for coded secure cloud storage
    Chawki El Balmany
    Ahmed Asimi
    Mohamed Bamarouf
    Zakariae Tbatou
    Multimedia Tools and Applications, 2022, 81 : 39229 - 39249
  • [49] Privacy-Preserving Time-Based Auditing for Secure Cloud Storage
    Wang, Min
    Yu, Jia
    Shen, Wenting
    Hao, Rong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7866 - 7878
  • [50] An efficient and secure public batch auditing protocol for dynamic cloud storage data
    Yang, Liu
    Xia, Lili
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 671 - 675