Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage

被引:6
|
作者
Kang, Baoyuan [1 ]
Wang, Jiaqiang [1 ]
Shao, Dongyang [1 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Sci & Software, Tianjin 300387, Peoples R China
关键词
DATA POSSESSION; CHECKING;
D O I
10.1155/2017/8062182
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the development of Internet, cloud computing has emerged to provide service to data users. But, it is necessary for an auditor on behalf of users to check the integrity of the data stored in the cloud. The cloud server alsomust ensure the privacy of the data. In a usual public integrity check scheme, the linear combination of data blocks is needed for verification. But, after times of auditing on the same data blocks, based on collected linear combinations, the auditor might derive these blocks. Recently, a number of public auditing schemes with privacy-preserving are proposed. With blinded linear combinations of data blocks, the authors of these schemes believed that the auditor cannot derive any information about the data blocks and claimed that their schemes are provably secure in the random oracle model. In this paper, with detailed security analysis of these schemes, we show that these schemes are vulnerable to an attack from the malicious cloud server who modifies the data blocks and succeeds in forging proof information for data integrity check.
引用
收藏
页数:6
相关论文
共 50 条
  • [42] Threshold privacy-preserving cloud auditing with multiple uploaders
    Ge Wu
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Futai Zhang
    International Journal of Information Security, 2019, 18 : 321 - 331
  • [43] Privacy-Preserving Certificateless Cloud Auditing with Multiple Users
    Ge Wu
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Futai Zhang
    Wireless Personal Communications, 2019, 106 : 1161 - 1182
  • [44] Threshold privacy-preserving cloud auditing with multiple uploaders
    Wu, Ge
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Zhang, Futai
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (03) : 321 - 331
  • [45] Privacy-Preserving Certificateless Cloud Auditing with Multiple Users
    Wu, Ge
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Zhang, Futai
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (03) : 1161 - 1182
  • [46] PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing
    Xu, Yan
    Ding, Long
    Cui, Jie
    Zhong, Hong
    Yu, Jia
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3730 - 3739
  • [47] Survey on Security and Privacy Preserving Public Auditing for Content Storage in Cloud Environment
    Kumar, Arun K.
    Gnanadeepa, S.
    John, Hepzibha
    Janani, G. K.
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [48] Privacy preserving file auditing schemes for cloud storage using verifiable random function
    Mishra, Bharati
    Jena, Debasish
    Patnaik, Srikanta
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2021, 26 (01) : 50 - 75
  • [49] AN EFFICIENT, DYNAMIC, PRIVACY PRESERVING PUBLIC AUDITING METHOD ON UNTRUSTED CLOUD STORAGE
    Navajothi, R.
    Fenelon, S. Jean Adrien
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [50] Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage
    Guan, Xuening
    Chang, Jinyong
    Zhang, Wei
    COMPUTER COMMUNICATIONS, 2024, 224 : 285 - 301