Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems"

被引:7
|
作者
Guo, Wei [1 ,2 ]
Qin, Sujuan [1 ]
Gao, Fei [1 ]
Zhang, Hua [1 ]
Li, Wenmin [1 ]
Jin, Zhengping [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; data integrity; replication; data availability; dynamic update;
D O I
10.1109/TIFS.2020.2970591
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Replication is a fundamental solution for the cloud service provider (CSP) to guarantee data availability. To provide users with convincing evidence that the copies required by them are all stored correctly, a number of multi-copy integrity auditing schemes were presented. Recently, Barsoum and Hasan proposed a map-based provable multi-copy dynamic data possession scheme (IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 485-497, 2015), which was claimed to be secure and can ensure that the CSP possesses all copies required by the contract. However, in this letter, we show that the scheme is easily subject to a copy-summation attack and a single-copy attack, by which a cheating CSP only needs to invest a storage cost of a single copy-while can still pass the verifier's challenge at all times. Therefore, the scheme is no longer secure in this case. Furthermore, we propose some simple but effective countermeasures and give a repaired scheme which is free from the above two attacks.
引用
收藏
页码:2584 / 2586
页数:3
相关论文
共 50 条
  • [31] PDPMT: Provable Data Possession for Multiple Cloud Tenants
    Huang, Daoli
    Wan, Changsheng
    2017 10TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI), 2017,
  • [32] AN IMPROVED DYNAMIC PROVABLE DATA POSSESSION MODEL
    Liu, Feifei
    Gu, Dawu
    Lu, Haining
    2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 290 - 295
  • [33] Group provable data possession with deduplication in cloud storage
    Wang H.-Y.
    Zhu L.-H.
    Li L.-Y.-J.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1417 - 1431
  • [34] Privacy Preserving Dynamic Provable Data Possession with Batch Update for Secure Cloud Storage
    Chaudhari, Smita
    Swain, Gandharba
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (06) : 589 - 598
  • [35] MF-PDP: MULTI-FUNCTION PROVABLE DATA POSSESSION SCHEME IN CLOUD COMPUTING
    Yu, Xiaojun
    Wen, Qiaoyan
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 597 - 603
  • [36] Secure and Efficient Certificateless Provable Data Possession for Cloud-Based Data Management Systems
    Zhang, Jing
    Cui, Jie
    Zhong, Hong
    Gu, Chengjie
    Liu, Lu
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2021), PT I, 2021, 12681 : 71 - 87
  • [37] New provable data transfer from provable data possession and deletion for secure cloud storage
    Liu, Yudong
    Xiao, Shuai
    Wang, Han
    Wang, Xu An
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04)
  • [38] An efficient provable data possession scheme based on counting bloom filter for dynamic data in the cloud storage
    Jung E.
    Jeong J.
    2016, Science and Engineering Research Support Society (11): : 9 - 16
  • [39] Provable Data Possession Supporting Secure Data Transfer for Cloud Storage
    Yu, Yong
    Ni, Jianbing
    Yu, Yong
    Wu, Wei
    Wang, Yilei
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 38 - 42
  • [40] Leakage Resilient Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Chen, Yaping
    Wang, Jin
    Fang, Liming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 706 - 709