Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage

被引:6
|
作者
Kang, Baoyuan [1 ]
Wang, Jiaqiang [1 ]
Shao, Dongyang [1 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Sci & Software, Tianjin 300387, Peoples R China
关键词
DATA POSSESSION; CHECKING;
D O I
10.1155/2017/8062182
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the development of Internet, cloud computing has emerged to provide service to data users. But, it is necessary for an auditor on behalf of users to check the integrity of the data stored in the cloud. The cloud server alsomust ensure the privacy of the data. In a usual public integrity check scheme, the linear combination of data blocks is needed for verification. But, after times of auditing on the same data blocks, based on collected linear combinations, the auditor might derive these blocks. Recently, a number of public auditing schemes with privacy-preserving are proposed. With blinded linear combinations of data blocks, the authors of these schemes believed that the auditor cannot derive any information about the data blocks and claimed that their schemes are provably secure in the random oracle model. In this paper, with detailed security analysis of these schemes, we show that these schemes are vulnerable to an attack from the malicious cloud server who modifies the data blocks and succeeds in forging proof information for data integrity check.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing
    Zhao, Pu
    Yu, Jia
    Zhang, Hanlin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (03) : 635 - 650
  • [22] Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (01) : 43 - 56
  • [23] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [24] Cryptanalysis and Countermeasures on Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
    Liu, Mei-Ping
    Jiang, Rui
    Kong, Hua-Feng
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONIC INFORMATION ENGINEERING (CEIE 2016), 2016, 116 : 275 - 283
  • [25] Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage"
    Zhang, Jindan
    Lu, Rongxing
    Wang, Baocang
    Wang, Xu An
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1288 - 1289
  • [26] An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System
    Li, Xiong
    Liu, Shanpeng
    Lu, Rongxing
    Khan, Muhammad Khurram
    Gu, Ke
    Zhang, Xiaosong
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 2020 - 2031
  • [27] Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
    Tu, Tengfei
    Rao, Lu
    Zhang, Hua
    Wen, Qiaoyan
    Xiao, Jia
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [28] User stateless privacy-preserving TPA auditing scheme for cloud storage
    Zhao, Haichun
    Yao, Xuanxia
    Zheng, Xuefeng
    Qiu, Tie
    Ning, Huansheng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 129 : 62 - 70
  • [29] Privacy-Preserving Time-Based Auditing for Secure Cloud Storage
    Wang, Min
    Yu, Jia
    Shen, Wenting
    Hao, Rong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7866 - 7878
  • [30] Privacy-preserving public auditing for educational multimedia data in cloud computing
    Kim, Daeyeong
    Kwon, Hyunsoo
    Hahn, Changhee
    Hur, Junbeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13077 - 13091