Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems"

被引:7
|
作者
Guo, Wei [1 ,2 ]
Qin, Sujuan [1 ]
Gao, Fei [1 ]
Zhang, Hua [1 ]
Li, Wenmin [1 ]
Jin, Zhengping [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; data integrity; replication; data availability; dynamic update;
D O I
10.1109/TIFS.2020.2970591
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Replication is a fundamental solution for the cloud service provider (CSP) to guarantee data availability. To provide users with convincing evidence that the copies required by them are all stored correctly, a number of multi-copy integrity auditing schemes were presented. Recently, Barsoum and Hasan proposed a map-based provable multi-copy dynamic data possession scheme (IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 485-497, 2015), which was claimed to be secure and can ensure that the CSP possesses all copies required by the contract. However, in this letter, we show that the scheme is easily subject to a copy-summation attack and a single-copy attack, by which a cheating CSP only needs to invest a storage cost of a single copy-while can still pass the verifier's challenge at all times. Therefore, the scheme is no longer secure in this case. Furthermore, we propose some simple but effective countermeasures and give a repaired scheme which is free from the above two attacks.
引用
收藏
页码:2584 / 2586
页数:3
相关论文
共 50 条
  • [1] Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
    Barsoum, Ayad F.
    Hasan, M. Anwar
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 485 - 497
  • [2] Provable Data Possession in Cloud Computing
    Shuang, Tan
    Zhang Jianfeng
    Chen Zhikun
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1406 - 1413
  • [3] Multicopy and Multiserver Provable Data Possession for Cloud-Based IoT
    Shen, Jiayan
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 12300 - 12310
  • [4] An Authentication Data Structure of Provable Data Possession with Dynamic Data Operation in Cloud Computing
    Xu, Hongyun
    Jiang, Jiesi
    Xu, Cheng
    SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 371 - 381
  • [5] Towards Comprehensive Provable Data Possession in Cloud Computing
    LI Chaoling
    CHEN Yue
    TAN Pengxu
    YANG Gang
    Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 265 - 271
  • [6] Provable multiple-replica dynamic data possession for big data storage in cloud computing
    Hou, Huiying
    Yu, Jia
    Hao, Rong
    International Journal of Network Security, 2018, 20 (03) : 575 - 584
  • [7] Hybrid Provable Data Possession at Untrusted Stores In Cloud Computing
    Lee, Narn-Yih
    Chang, Yun-Kuan
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 638 - 645
  • [8] An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage
    Yao, Ge
    Li, Yong
    Lei, Linan
    Wang, Huaqun
    Lin, Changlu
    GREEN, PERVASIVE, AND CLOUD COMPUTING, 2016, 9663 : 63 - 81
  • [9] Dynamic Group-Oriented Provable Data Possession in the Cloud
    He, Kun
    Chen, Jing
    Yuan, Quan
    Ji, Shouling
    He, Debiao
    Du, Ruiying
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1394 - 1408
  • [10] Provable Data Possession Schemes from Standard Lattices for Cloud Computing
    Luo, Fucai
    Al-Kuwari, Saif
    Lin, Changlu
    Wang, Fuqun
    Chen, Kefei
    COMPUTER JOURNAL, 2022, 65 (12): : 3223 - 3239