Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage

被引:37
作者
He, Debiao [1 ,2 ]
Wang, Huaqun [3 ]
Zhang, Jianhong [4 ]
Wang, Lina [5 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan, Peoples R China
[2] Anhui Univ, Coinnovat Ctr Informat Supply & Assurance Technol, Hefei, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[4] North China Univ Technol, Coll Sci, Beijing, Peoples R China
[5] Wuhan Univ, Comp Sch, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Public auditing; Identity-based cryptography; Provable security; Bilinear pairing; CHECKING;
D O I
10.1016/j.ins.2016.09.049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public auditing protocol is very significant for implementing secure cloud storage since it can be used to check the integrity of the data stored in the cloud without downloading them. Recently, Zhang and Dong presented an identity-based public auditing (IBPA) protocol using the bilinear pairing and claimed that their protocol is provably secure in the random oracle model. Through proposing two concrete attacks, we demonstrate that the adversary against Zhang-Dong's protocol can break the data integrity without being found by the auditor. The analysis shows that their protocol is not secure for the cloud storage. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [31] Multiple-Replica Public Auditing Protocol for Cloud Storage
    Liu, Hongwei
    Wang, Shulan
    Zhang, Peng
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 999 - 1004
  • [32] Blockchain-Based Decentralized Public Auditing for Cloud Storage
    Shu, Jiangang
    Zou, Xing
    Jia, Xiaohua
    Zhang, Weizhe
    Xie, Ruitao
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2366 - 2380
  • [33] Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 577 - 585
  • [34] Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage
    Zhang, Yinghui
    Zhang, Tiantian
    Guo, Rui
    Xu, Shengmin
    Zheng, Dong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11): : 5653 - 5672
  • [35] Identity-Preserving Public Auditing for Shared Cloud Data
    He, Kai
    Huang, Chuanhe
    Yang, Kan
    Shi, Jiaoli
    [J]. 2015 IEEE 23RD INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2015, : 159 - 164
  • [36] An identity-based cryptographic scheme for cloud storage applications
    Medhioub, Manel
    Hamdi, Mohamed
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (02) : 93 - 104
  • [37] Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
    Yu, Yong
    Au, Man Ho
    Ateniese, Giuseppe
    Huang, Xinyi
    Susilo, Willy
    Dai, Yuanshun
    Min, Geyong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 767 - 778
  • [38] Escrow-Less Identity-Based Signature Scheme with Outsourced Protection in Cloud Computing
    Mahender Kumar
    Satish Chand
    [J]. Wireless Personal Communications, 2020, 114 : 3115 - 3136
  • [39] Public Auditing for Big Data Storage in Cloud Computing -- A Survey
    Liu, Chang
    Ranjan, Rajiv
    Zhang, Xuyun
    Yang, Chi
    Georgakopoulos, Dimitrios
    Chen, Jinjun
    [J]. 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 1128 - 1135
  • [40] Escrow-Less Identity-Based Signature Scheme with Outsourced Protection in Cloud Computing
    Kumar, Mahender
    Chand, Satish
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 3115 - 3136