On the security of auditing mechanisms for secure cloud storage

被引:34
作者
Yu, Yong [1 ,2 ]
Niu, Lei [1 ]
Yang, Guomin [2 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2014年 / 30卷
基金
中国国家自然科学基金; 新加坡国家研究基金会; 澳大利亚研究理事会;
关键词
Cloud storage; Privacy-preserving; Auditing; Cryptanalysis; CHALLENGES; SIGNATURES;
D O I
10.1016/j.future.2013.05.005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism. We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data without being detected by the auditor in the verification phase. We also propose a solution to remedy the weakness without sacrificing any desirable features of these mechanisms. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 20 条
  • [1] Ateniese G., 2008, P 4 EAI SECURECOMM, P1, DOI 10.1145/1460877.1460889
  • [2] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [3] Short group signatures
    Boneh, D
    Boyen, X
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 41 - 55
  • [4] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [5] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [6] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [7] Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
  • [8] Juels A., P CCS 07, P584
  • [9] A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    Khorshed, Md. Tanzim
    Ali, A. B. M. Shawkat
    Wasimi, Saleh A.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (06): : 833 - 851
  • [10] Nan XF, 2010, IEEE INT C BIOINFORM, P520, DOI 10.1109/BIBM.2010.5706621