Provably-Secure Public Auditing with Deduplication

被引:2
|
作者
Kim, Dongmin [1 ]
Jeong, Ik Rae [1 ]
机构
[1] Korea Univ, CIST, Seoul 136713, South Korea
关键词
Public auditing; deduplication; data integrity; tag-unforgeability; proof-unforgebility; SHARED DATA; PRIVACY;
D O I
10.3837/tiis.2017.04.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.
引用
收藏
页码:2219 / 2236
页数:18
相关论文
共 50 条
  • [11] DeepSecure: Scalable Provably-Secure Deep Learning
    Rouhani, Bita Darvish
    Riazi, M. Sadegh
    Koushanfar, Farinaz
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [12] Blockchain-based public auditing and secure deduplication with fair arbitration
    Yuan, Haoran
    Chen, Xiaofeng
    Wang, Jianfeng
    Yuan, Jiaming
    Yan, Hongyang
    Susilo, Willy
    INFORMATION SCIENCES, 2020, 541 : 409 - 425
  • [13] Traceable privacy of recent provably-secure RFID protocols
    Ouafi, Khaled
    Phan, Raphael C. -W.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 479 - +
  • [14] Provably-Secure Logic Locking: From Theory To Practice
    Yasin, Muhammad
    Sengupta, Abhrajit
    Nabeel, Mohammed Thari
    Ashraf, Mohammed
    Rajendran, Jeyavijayan
    Sinanoglu, Ozgur
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1601 - 1618
  • [15] Efficient and identity-based signcryption with provably-secure
    Wen Y.
    Ma J.
    Moon S.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [16] Efficient and provably-secure certificateless blind signature scheme
    Yang, Xiao-Yuan
    Chen, Hai-Bin
    Guo, Dun-Tao
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 64 - 69
  • [17] Efficient provably-secure hierarchical key assignment schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (41) : 5684 - 5699
  • [18] Efficient and provably-secure certificateless aggregate signature scheme
    Du, Hong-Zhen
    Huang, Mei-Juan
    Wen, Qiao-Yan
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2013, 41 (01): : 72 - 76
  • [19] Efficient provably-secure hierarchical key assignment schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2007, PROCEEDINGS, 2007, 4708 : 371 - +
  • [20] Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 467 - 474