Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage

被引:37
|
作者
He, Debiao [1 ,2 ]
Wang, Huaqun [3 ]
Zhang, Jianhong [4 ]
Wang, Lina [5 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan, Peoples R China
[2] Anhui Univ, Coinnovat Ctr Informat Supply & Assurance Technol, Hefei, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[4] North China Univ Technol, Coll Sci, Beijing, Peoples R China
[5] Wuhan Univ, Comp Sch, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Public auditing; Identity-based cryptography; Provable security; Bilinear pairing; CHECKING;
D O I
10.1016/j.ins.2016.09.049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public auditing protocol is very significant for implementing secure cloud storage since it can be used to check the integrity of the data stored in the cloud without downloading them. Recently, Zhang and Dong presented an identity-based public auditing (IBPA) protocol using the bilinear pairing and claimed that their protocol is provably secure in the random oracle model. Through proposing two concrete attacks, we demonstrate that the adversary against Zhang-Dong's protocol can break the data integrity without being found by the auditor. The analysis shows that their protocol is not secure for the cloud storage. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [1] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Wu, Li-bing
    Wang, Jing
    He, De-biao
    Khan, Muhammad-Khurram
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 1972 - 1977
  • [2] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Li-bing Wu
    Jing Wang
    De-biao He
    Muhammad-Khurram Khan
    [J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1972 - 1977
  • [3] Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data
    Tian, Hui
    Peng, Fang
    Quan, Hanyu
    Chang, Chin-Chen
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [4] Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy
    Yu, Haiyang
    Cai, Yongquan
    Kong, Shanshan
    Ning, Zhenhu
    Xue, Fei
    Zhong, Han
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (10): : 5019 - 5041
  • [5] On the Insecurity of a Certificateless Public Verification Protocol for the Outsourced Data Integrity in Cloud Storage
    Wang, Xu An
    Pan, Xiaozhong
    Wei, Lixian
    Zhao, Yize
    [J]. ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES (EIDWT-2022), 2022, 118 : 63 - 67
  • [6] An identity-based public auditing protocol in cloud-assisted IoT
    Asal Ramezani
    Maryam Rajabzadeh Asaar
    [J]. Cluster Computing, 2022, 25 : 4339 - 4354
  • [7] An identity-based public auditing protocol in cloud-assisted IoT
    Ramezani, Asal
    Asaar, Maryam Rajabzadeh
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 4339 - 4354
  • [8] Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
    Zhao, Chenbin
    Xu, Li
    Li, Jiguo
    Wang, Feng
    Fang, He
    [J]. IEEE ACCESS, 2019, 7 : 160459 - 160471
  • [9] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    [J]. IEEE ACCESS, 2020, 8 : 206396 - 206405
  • [10] An improved identity-based public audit protocol for cloud storage
    Wang, Haoming
    Zhang, Yuanhang
    Wang, Xu An
    Yang, Xiaoyuan
    [J]. HELIYON, 2024, 10 (16)