Provably-Secure Public Auditing with Deduplication

被引:2
|
作者
Kim, Dongmin [1 ]
Jeong, Ik Rae [1 ]
机构
[1] Korea Univ, CIST, Seoul 136713, South Korea
关键词
Public auditing; deduplication; data integrity; tag-unforgeability; proof-unforgebility; SHARED DATA; PRIVACY;
D O I
10.3837/tiis.2017.04.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.
引用
收藏
页码:2219 / 2236
页数:18
相关论文
共 50 条
  • [1] A brief history of provably-secure public-key encryption
    Dent, Alexander W.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 357 - 370
  • [2] Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure
    Liu, Jiasen
    Wang, Xu An
    Zhao, Kaiyang
    Wang, Han
    ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES (EIDWT 2020), 2020, 47 : 290 - 300
  • [3] Towards Provably-Secure Performance Locking
    Zaman, Monir
    Sengupta, Abhrajit
    Liu, Danqing
    Sinanoglu, Ozgur
    Makris, Yiorgos
    Rajendran, Jeyavijayan
    PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 1592 - 1597
  • [4] Asynchronous Provably-Secure Hidden Services
    Camacho, Philippe
    Krell, Fernando
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 179 - 197
  • [5] Efficient public integrity auditing with secure deduplication in cloud computing
    Huo, Huixia
    Jiang, Tao
    Tan, Shichong
    Tao, Xiaoling
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (06) : 764 - 777
  • [6] Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
    Yuan, Jiawei
    Yu, Shucheng
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 145 - 153
  • [7] A PROVABLY-SECURE STRONGLY-RANDOMIZED CIPHER
    MAUERER, UM
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 361 - 373
  • [8] Public Auditing and Secure Deduplication of Dynamic Data Based on Blockchain
    Tian, Yanan
    Tan, Shichong
    Tian, Guohua
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 12 - 21
  • [9] Provably-secure programming languages for remote evaluation
    Volpano, D
    ACM SIGPLAN NOTICES, 1997, 32 (01) : 117 - 119
  • [10] ON THE DESIGN OF PROVABLY-SECURE CRYPTOGRAPHIC HASH FUNCTIONS
    DESANTIS, A
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 412 - 431