Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing

被引:11
作者
Zhang, Wenfang [1 ]
Jiao, Heng [1 ]
Yan, Zhuoqun [1 ]
Wang, Xiaomin [1 ]
Khan, Muhammad Khurram [2 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Sichuan, Peoples R China
[2] King Saud Univ, Coll Comp & Informat Sci, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
关键词
Cloud storage; IoT; Data integrity checking; Fog computing; Security analysis;
D O I
10.1016/j.cose.2022.103019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Human society has drastically changed as a result of the widespread application of Internet of Things (IoT) technology, particularly in various industrial fields. In spite of the advantages brought by IoT services, the underlying security challenges cannot be underestimated. Cloud-based IoT data collection poses a number of challenges, including how to ensure its integrity. In order to address this issue, Tian et al. have proposed a fog-to-cloud computing-based public auditing scheme in IoT scenarios, which provides the data-privacy preserving mechanism and tag transformation strategy. However, in this paper, we show that Tian et al.'s scheme fails to achieve soundness, an essential security property, by giving two attacks. In the first attack, the malicious cloud server can delete all the data and then deceive the Third Party Auditor (TPA) into believing that the data is well-preserved. In the second attack, the malicious cloud server can modify the outsourced data and then deceive TPA into believing that all the data is kept intact. We further provide a simple but effective solution for Tian et al.'s scheme to resist the above-mentioned attacks. Security analysis and performance evaluation are also given to demonstrate the robustness and high efficiency of the improved scheme.(c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 17 条
[1]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[2]   Towards Usable Cloud Storage Auditing [J].
Chen, Fei ;
Meng, Fengming ;
Xiang, Tao ;
Dai, Hua ;
Li, Jianqiang ;
Qin, Jing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (11) :2605-2617
[3]   Dynamic Group-Oriented Provable Data Possession in the Cloud [J].
He, Kun ;
Chen, Jing ;
Yuan, Quan ;
Ji, Shouling ;
He, Debiao ;
Du, Ruiying .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1394-1408
[4]   Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation [J].
Jiang, Tao ;
Chen, Xiaofeng ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2363-2373
[5]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[6]   Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems [J].
Li, Yannan ;
Yu, Yong ;
Min, Geyong ;
Susilo, Willy ;
Ni, Jianbing ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) :72-83
[7]   Compact Proofs of Retrievability [J].
Shacham, Hovav ;
Waters, Brent .
JOURNAL OF CRYPTOLOGY, 2013, 26 (03) :442-483
[8]   An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data [J].
Shen, Jian ;
Shen, Jun ;
Chen, Xiaofeng ;
Huang, Xinyi ;
Susilo, Willy .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) :2402-2415
[9]   Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage [J].
Shen, Wenting ;
Qin, Jing ;
Yu, Jia ;
Hao, Rong ;
Hu, Jiankun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) :331-346
[10]   Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables [J].
Sookhak, Mehdi ;
Yu, F. Richard ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2018, 29 (05) :999-1012