Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage

被引:1
|
作者
Liu, Hongyu [1 ]
Chen, Leiting [1 ]
Davar, Zahra [2 ]
Pour, Mohammad Ramezanian [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Cloud storage; Data integrity; Privacy-preserving; Security analysis; SECURITY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud storage has a long string of merits but at the same time, poses many challenges on data integrity and privacy. A cloud data auditing protocol, which enables a cloud server to prove the integrity of stored files to a verifier, is a powerful tool for secure cloud storage. Wang et al. proposed a privacy-preserving public auditing protocol, however, Worku et al. found the protocol is seriously insecure and proposed an improvement to remedy the weakness. In this paper, unfortunately, we demonstrate that the new protocol due to Worku et al. fails to achieve soundness and obtains merely limited privacy. Specifically, we show even deleting all the files of a data owner, a malicious cloud server is able to generate a response to a challenge without being caught by TPA in their enhanced but unrealistic security model. Worse still, the protocol is insecure even in a correct security model. For privacy, a dishonest verifier can tell which file is stored on the cloud. Solutions to efficient public auditing mechanisms with perfect privacy protection are still worth exploring.
引用
收藏
页码:473 / 482
页数:10
相关论文
共 50 条
  • [31] Privacy-preserving public auditing for educational multimedia data in cloud computing
    Kim, Daeyeong
    Kwon, Hyunsoo
    Hahn, Changhee
    Hur, Junbeom
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13077 - 13091
  • [32] Privacy-preserving TPA auditing scheme based on skip list for cloud storage
    Zhao, Haichun
    Yao, Xuanxia
    Zheng, Xuefeng
    [J]. International Journal of Network Security, 2019, 21 (03) : 451 - 461
  • [33] Privacy-preserving public auditing for educational multimedia data in cloud computing
    Daeyeong Kim
    Hyunsoo Kwon
    Changhee Hahn
    Junbeom Hur
    [J]. Multimedia Tools and Applications, 2016, 75 : 13077 - 13091
  • [34] Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme
    Li, Haifeng
    Liu, Liangliang
    Lan, Caihui
    Wang, Caifen
    Guo, He
    [J]. IEEE ACCESS, 2020, 8 : 86797 - 86809
  • [35] Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing
    Li, Shiyu
    Zhang, Yuan
    Xu, Chunxiang
    Chen, Kefei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2564 - 2565
  • [36] Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networksv
    Zhang, Xinpeng
    Xu, Chunxiang
    Zhang, Xiaojun
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [37] Pseudo-ID-based public auditing with privacy-preserving for cloud storage
    Liu, Xue-Yan
    He, Xiao-Mei
    Lu, Ting-Ting
    [J]. Journal of Computers (Taiwan), 2020, 31 (03) : 154 - 167
  • [38] Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
    Liu, Jian
    Huang, Kun
    Rong, Hong
    Wang, Huimei
    Xian, Ming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1513 - 1528
  • [39] Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
    Jianhong Zhang
    Xubing Zhao
    [J]. Cluster Computing, 2016, 19 : 47 - 56
  • [40] Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
    Zhang, Jianhong
    Zhao, Xubing
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 47 - 56