Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage

被引:1
|
作者
Liu, Hongyu [1 ]
Chen, Leiting [1 ]
Davar, Zahra [2 ]
Pour, Mohammad Ramezanian [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Cloud storage; Data integrity; Privacy-preserving; Security analysis; SECURITY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud storage has a long string of merits but at the same time, poses many challenges on data integrity and privacy. A cloud data auditing protocol, which enables a cloud server to prove the integrity of stored files to a verifier, is a powerful tool for secure cloud storage. Wang et al. proposed a privacy-preserving public auditing protocol, however, Worku et al. found the protocol is seriously insecure and proposed an improvement to remedy the weakness. In this paper, unfortunately, we demonstrate that the new protocol due to Worku et al. fails to achieve soundness and obtains merely limited privacy. Specifically, we show even deleting all the files of a data owner, a malicious cloud server is able to generate a response to a challenge without being caught by TPA in their enhanced but unrealistic security model. Worse still, the protocol is insecure even in a correct security model. For privacy, a dishonest verifier can tell which file is stored on the cloud. Solutions to efficient public auditing mechanisms with perfect privacy protection are still worth exploring.
引用
收藏
页码:473 / 482
页数:10
相关论文
共 50 条
  • [21] Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (01) : 43 - 56
  • [22] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [23] User stateless privacy-preserving TPA auditing scheme for cloud storage
    Zhao, Haichun
    Yao, Xuanxia
    Zheng, Xuefeng
    Qiu, Tie
    Ning, Huansheng
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 129 : 62 - 70
  • [24] Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
    Tian, Hui
    Nan, Fulin
    Chang, Chin-Chen
    Huang, Yongfeng
    Lu, Jing
    Du, Yongqian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 59 - 69
  • [25] Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wu, Yulin
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Peng
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 562 - 567
  • [26] Privacy-preserving auditing scheme for shared data in public clouds
    Wu, Libing
    Wang, Jing
    Zeadally, Sherali
    He, Debiao
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 6156 - 6183
  • [27] Privacy-preserving auditing scheme for shared data in public clouds
    Libing Wu
    Jing Wang
    Sherali Zeadally
    Debiao He
    [J]. The Journal of Supercomputing, 2018, 74 : 6156 - 6183
  • [28] Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain
    Miao, Ying
    Huang, Qiong
    Xiao, Meiyan
    Li, Hongbo
    [J]. IEEE ACCESS, 2020, 8 : 139813 - 139826
  • [29] An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System
    Li, Xiong
    Liu, Shanpeng
    Lu, Rongxing
    Khan, Muhammad Khurram
    Gu, Ke
    Zhang, Xiaosong
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 2020 - 2031
  • [30] Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage
    Ming, Yang
    Shi, Wenchang
    [J]. IEEE ACCESS, 2019, 7 : 122091 - 122105