Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems"

被引:7
|
作者
Guo, Wei [1 ,2 ]
Qin, Sujuan [1 ]
Gao, Fei [1 ]
Zhang, Hua [1 ]
Li, Wenmin [1 ]
Jin, Zhengping [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; data integrity; replication; data availability; dynamic update;
D O I
10.1109/TIFS.2020.2970591
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Replication is a fundamental solution for the cloud service provider (CSP) to guarantee data availability. To provide users with convincing evidence that the copies required by them are all stored correctly, a number of multi-copy integrity auditing schemes were presented. Recently, Barsoum and Hasan proposed a map-based provable multi-copy dynamic data possession scheme (IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 485-497, 2015), which was claimed to be secure and can ensure that the CSP possesses all copies required by the contract. However, in this letter, we show that the scheme is easily subject to a copy-summation attack and a single-copy attack, by which a cheating CSP only needs to invest a storage cost of a single copy-while can still pass the verifier's challenge at all times. Therefore, the scheme is no longer secure in this case. Furthermore, we propose some simple but effective countermeasures and give a repaired scheme which is free from the above two attacks.
引用
收藏
页码:2584 / 2586
页数:3
相关论文
共 50 条
  • [21] A Provable Data Possession Scheme with Data Hierarchy in Cloud
    Lin, Changlu
    Luo, Fucai
    Wang, Huaxiong
    Zhu, Yan
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 301 - 321
  • [22] Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage"
    Yu, Jia
    Hao, Rong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 2090 - 2092
  • [23] Provable data transfer from provable data possession and deletion in cloud storage
    Xue, Liang
    Ni, Jianbing
    Li, Yannan
    Shen, Jian
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 46 - 54
  • [24] Efficient Dynamic Data Possession Checking in Cloud Computing
    Jiao, Wenzhe
    Wang, Guoqing
    Ye, Xiaoxue
    Zhai, Zhengjun
    ADVANCES IN APPLIED SCIENCE, ENGINEERING AND TECHNOLOGY, 2013, 709 : 603 - 610
  • [25] Outsourced dynamic provable data possession with batch update for secure cloud storage
    Guo, Wei
    Zhang, Hua
    Qin, Sujuan
    Gao, Fei
    Jin, Zhengping
    Li, Wenmin
    Wen, Qiaoyan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 : 309 - 322
  • [26] Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System
    Yuan, Yilin
    Zhang, Jianbiao
    Xu, Wanshan
    IEEE ACCESS, 2020, 8 : 120778 - 120784
  • [27] Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage
    Liu, Yudong
    Wang, Xu An
    Cao, Yunfei
    Tang, Dianhua
    Yang, Xiaoyuan
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 445 - 452
  • [28] Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage"
    Han, Lidong
    Xu, Guangwu
    Xie, Qi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3934 - 3935
  • [29] Oriented Group Provable Data Possession in Public Cloud
    Ren, Yongjun
    Xu, Jiang
    Wang, Jin
    Fang, Liming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 775 - 778
  • [30] A delayed-update Provable Data Possession in the Cloud
    Wang, Huifeng
    Li, Zhanhuai
    Zhang, Xiao
    Sun, Jian
    He, Qinlu
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND COMMUNICATIONS (SCAC), 2014, : 96 - 101