Provably-Secure Public Auditing with Deduplication

被引:2
|
作者
Kim, Dongmin [1 ]
Jeong, Ik Rae [1 ]
机构
[1] Korea Univ, CIST, Seoul 136713, South Korea
关键词
Public auditing; deduplication; data integrity; tag-unforgeability; proof-unforgebility; SHARED DATA; PRIVACY;
D O I
10.3837/tiis.2017.04.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.
引用
收藏
页码:2219 / 2236
页数:18
相关论文
共 50 条
  • [21] An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems
    Guo, Rui
    Wen, Qiaoyan
    Shi, Huixian
    Jin, Zhengping
    Zhang, Hua
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
  • [22] Secure and efficient cloud data deduplication supporting dynamic data public auditing
    Ma, Hua
    Han, Xiaoyu
    Peng, Ting
    Zhang, Linchao
    International Journal of Network Security, 2018, 20 (06) : 1074 - 1084
  • [23] Conditionally-perfect secrecy and a provably-secure randomized cipher
    Maurer, Ueli
    Journal of Cryptology, 1992, 5 (01) : 53 - 66
  • [24] Provably-Secure Remote Memory Attestation for Heap Overflow Protection
    Boldyreva, Alexandra
    Kim, Taesoo
    Lipton, Richard
    Warinschi, Bogdan
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 83 - 103
  • [25] A provably secure and public auditing protocol based on the bell triangle for cloud data
    Tian, Junfeng
    Wang, Haoning
    COMPUTER NETWORKS, 2021, 195
  • [26] Provably-secure schemes for basic query support in outsourced databases
    Amanatidis, Georgios
    Boldyreva, Alexandra
    O'Neill, Adam
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 14 - +
  • [27] Yet another efficient and provably-secure certificateless public key signature scheme without pairing
    School of Mathematics and Computer Engineering, Xihua University, Chengdu, China
    不详
    WRI Int. Conf. Commun. Mob. Comput., CMC, 2010, (51-55):
  • [28] An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems
    Rui Guo
    Qiaoyan Wen
    Huixian Shi
    Zhengping Jin
    Hua Zhang
    Journal of Medical Systems, 2013, 37
  • [29] Provably-secure quantum randomness expansion with uncharacterised homodyne detection
    Chao Wang
    Ignatius William Primaatmaja
    Hong Jie Ng
    Jing Yan Haw
    Raymond Ho
    Jianran Zhang
    Gong Zhang
    Charles Lim
    Nature Communications, 14
  • [30] Efficient and provably-secure certificateless sequential aggregate signature scheme
    Wang, Zhu
    Yang, Siqi
    Li, Fenghua
    Geng, Kui
    Peng, Tingting
    Shi, Mengyao
    Tongxin Xuebao/Journal on Communications, 2022, 43 (05): : 58 - 67