Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage

被引:37
作者
He, Debiao [1 ,2 ]
Wang, Huaqun [3 ]
Zhang, Jianhong [4 ]
Wang, Lina [5 ]
机构
[1] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan, Peoples R China
[2] Anhui Univ, Coinnovat Ctr Informat Supply & Assurance Technol, Hefei, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[4] North China Univ Technol, Coll Sci, Beijing, Peoples R China
[5] Wuhan Univ, Comp Sch, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Public auditing; Identity-based cryptography; Provable security; Bilinear pairing; CHECKING;
D O I
10.1016/j.ins.2016.09.049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public auditing protocol is very significant for implementing secure cloud storage since it can be used to check the integrity of the data stored in the cloud without downloading them. Recently, Zhang and Dong presented an identity-based public auditing (IBPA) protocol using the bilinear pairing and claimed that their protocol is provably secure in the random oracle model. Through proposing two concrete attacks, we demonstrate that the adversary against Zhang-Dong's protocol can break the data integrity without being found by the auditor. The analysis shows that their protocol is not secure for the cloud storage. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
[41]   Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage [J].
Ni, Jianbing ;
Zhang, Kuan ;
Yu, Yong ;
Yang, Tingting .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) :1753-1769
[42]   Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing [J].
Zhao, Jining ;
Xu, Chunxiang ;
Chen, Kefei .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02) :1043-1063
[43]   Identity-Based Integrity Auditing Scheme With Sensitive Information Hiding for Proxy-Server-Assisted Cloud Storage Applications [J].
Hu, Xinran ;
Chang, Jinyong ;
Ahmad, Tanvir ;
Zhang, Funing ;
Zhang, Yuchen .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06) :6673-6684
[44]   Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems [J].
Zhang, Xiaojun ;
Zhao, Jie ;
Mu, Liming ;
Tang, Yao ;
Xu, Chunxiang .
PERVASIVE AND MOBILE COMPUTING, 2019, 56 :18-28
[45]   Identity-based controlled delegated outsourcing data integrity auditing scheme [J].
Du, Jianming ;
Dong, Guofang ;
Ning, Juangui ;
Xu, Zhengnan ;
Yang, Ruicheng .
SCIENTIFIC REPORTS, 2024, 14 (01)
[46]   Identity-based cloud storage integrity checking from lattices [J].
Tian M. ;
Gao C. ;
Chen J. .
Tongxin Xuebao/Journal on Communications, 2019, 40 (04) :128-139
[47]   Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing [J].
Singh, Anirudha Pratap ;
Pasupuleti, Syam Kumar .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 :751-759
[48]   Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud [J].
Wang, Huaqun ;
He, Debiao ;
Tang, Shaohua .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1165-1176
[49]   IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage [J].
Zhao, Jie ;
Huang, Hejiao ;
He, Daojing ;
Zhang, Xiaojun ;
Zhang, Yuan ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16) :27214-27231
[50]   Public Auditing for Network Coding Based Secure Cloud Storage [J].
Liu, Xiang ;
Huang, Jie ;
Zong, Guowen .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :713-720