Improved group-oriented proofs of cloud storage in IoT setting

被引:16
作者
Wang, Xu An [1 ,2 ]
Liu, Yudong [1 ]
Zhang, Jindan [2 ,3 ,4 ]
Yang, Xiaoyuan [1 ]
Zhang, Minqing [1 ]
机构
[1] Engn Univ Chinese Armed Police Force, Key Lab Cryptog & Informat Secur, Xian, Shaanxi, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Shaanxi, Peoples R China
[4] Xianyang Vocat Tech Coll, Xianyang, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud auditing; group-oriented proofs of storage; insecurity; meta-data; tag; PROVABLE DATA POSSESSION;
D O I
10.1002/cpe.4781
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the IoT setting, many resource constrained devices outsource their collected data to the Cloud. To ensure the outsourced data has not been lost, these devices need some mechanism to check the integrity of their data. Furthermore, in some settings, ad hoc devices need to act as a group, and in this group, any member may require to verify the integrity of outsourced cloud storage. Aiming at solving this problem, in AISACCS'15, first proposed the concept of group-based proofs of storage (GPoS). In GPoS, a group manager can authorize data owners as group members, and then these group members can outsource files to the cloud storage server; later, each member can verify the integrity of the outsourced cloud storage. They also give a concrete construction of GPoS. Unfortunately, in this paper, we find their scheme is not secure. Recently, also proposed a dynamic group-based integrity auditing protocol for outsrouced cloud storage; we also show their scheme is not secure either. Finally, we give an improved scheme and roughly analysis to its security and performance.
引用
收藏
页数:11
相关论文
共 37 条
  • [1] [Anonymous], 2008, P 14 INT C THEOR APP
  • [2] [Anonymous], 2007, P 14 ACM C COMP COMM
  • [3] [Anonymous], P 18 ACM C COMP COMM
  • [4] [Anonymous], 2007, P 14 ACM C COMP COMM
  • [5] Remote Data Checking Using Provable Data Possession
    Ateniese, Giuseppe
    Burns, Randal
    Curtmola, Reza
    Herring, Joseph
    Khan, Osama
    Kissner, Lea
    Peterson, Zachary
    Song, Dawn
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [6] Cash D, 2013, LECT NOTES COMPUT SC, V7881, P279, DOI 10.1007/978-3-642-38348-9_17
  • [7] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
    He, Debiao
    Kumar, Neeraj
    Wang, Huaqun
    Wang, Lina
    Choo, Kim-Kwang Raymond
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2017, 314 : 31 - 43
  • [8] Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
    He, Debiao
    Zeadally, Sherali
    Wu, Libing
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (01): : 64 - 73
  • [9] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    [J]. INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [10] Detection of sensitive information leakage in Android applications using signature generation
    Kuzuno, Hiroki
    Tonami, Satoshi
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (01) : 53 - 62