Cryptanalysis and Countermeasures on Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

被引:0
|
作者
Liu, Mei-Ping [1 ]
Jiang, Rui
Kong, Hua-Feng
机构
[1] Southeast Univ, Sch Informat Sci & Engn, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Public Auditing; Integrity; Privacy-Preserving; Regenerating-Code;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As an on-demand of computational resource, cloud computing appears to be part of a larger upward trend. Data owners can store outsourced data in the cloud and enjoy the high quality service. However, it brings new challenges, including the potential risks of the integrity of data, confidentiality of data, and mutual authentication. Recently, Liu et al. proposed a privacy-preserving public auditing for regenerating-code-based cloud storage and claimed that their scheme was secure and highly efficient. Unfortunately, we find out that there are risks of two attacks and a shortage in the scheme. In this paper, we first point out that Liu et al.' s scheme suffers from two attacks. The first attack is that it cannot resist against forgery attack, which makes cloud servers store the wrong data without being detected. The second attack is that the efficiency of data recovery is easily reduced by attackers since cloud servers may store many useless redundant data. In addition, there is a drawback in Liu et al.' s scheme. The drawback is that the data in the cloud cannot be shared if the data owner uses a private key to encrypt it.
引用
收藏
页码:275 / 283
页数:9
相关论文
共 50 条
  • [1] Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
    Liu, Jian
    Huang, Kun
    Rong, Hong
    Wang, Huimei
    Xian, Ming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1513 - 1528
  • [2] Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage"
    Zhang, Jindan
    Lu, Rongxing
    Wang, Baocang
    Wang, Xu An
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1288 - 1289
  • [3] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [4] Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain
    Miao, Ying
    Huang, Qiong
    Xiao, Meiyan
    Li, Hongbo
    IEEE ACCESS, 2020, 8 : 139813 - 139826
  • [5] Privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT
    Liu, Dengzhi
    Ding, Yongdong
    Yu, Geng
    Zhong, Zhaoman
    Song, Yuanzhao
    INTERNET OF THINGS, 2024, 25
  • [6] Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code
    Pasupuleti, Syam Kumar
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2019, 9 (04) : 1 - 20
  • [7] Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage
    Kang, Baoyuan
    Wang, Jiaqiang
    Shao, Dongyang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [8] Pseudo-ID-based public auditing with privacy-preserving for cloud storage
    Liu, Xue-Yan
    He, Xiao-Mei
    Lu, Ting-Ting
    Journal of Computers (Taiwan), 2020, 31 (03) : 154 - 167
  • [9] Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage
    Zhao, Xia'nan
    Wang, Dongsheng
    2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 486 - 491
  • [10] Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
    Yan, Hao
    Liu, Yanan
    Zhang, Zheng
    Wang, Qian
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021