Provably-Secure Public Auditing with Deduplication

被引:2
|
作者
Kim, Dongmin [1 ]
Jeong, Ik Rae [1 ]
机构
[1] Korea Univ, CIST, Seoul 136713, South Korea
关键词
Public auditing; deduplication; data integrity; tag-unforgeability; proof-unforgebility; SHARED DATA; PRIVACY;
D O I
10.3837/tiis.2017.04.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.
引用
收藏
页码:2219 / 2236
页数:18
相关论文
共 50 条
  • [31] A Provably-Secure Transmission Scheme for Wireless Body Area Networks
    Anyembe Andrew Omala
    Niyifasha Robert
    Fagen Li
    Journal of Medical Systems, 2016, 40
  • [32] Provably-secure proxy signature scheme from bilinear pairings
    Xu, Feng
    Cui, Jun
    Huang, Hao
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (03): : 439 - 443
  • [33] A Provably-Secure Transmission Scheme for Wireless Body Area Networks
    Omala, Anyembe Andrew
    Robert, Niyifasha
    Li, Fagen
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [34] Secure and efficient client-side data deduplication with public auditing in cloud storage
    Dang, Qianlong
    Ma, Hua
    Liu, Zhenhua
    Xie, Ying
    International Journal of Network Security, 2020, 22 (03) : 462 - 475
  • [35] On session key construction in provably-secure key establishment protocols
    Choo, KKR
    Boyd, C
    Hitchcock, Y
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 116 - 131
  • [36] Provably-secure quantum randomness expansion with uncharacterised homodyne detection
    Wang, Chao
    Primaatmaja, Ignatius William
    Ng, Hong Jie
    Haw, Jing Yan
    Ho, Raymond
    Zhang, Jianran
    Zhang, Gong
    Lim, Charles
    NATURE COMMUNICATIONS, 2023, 14 (01)
  • [37] SecDedup: Secure data deduplication with dynamic auditing in the cloud
    Peng, Li
    Yan, Zheng
    Liang, Xueqin
    Yu, Xixun
    INFORMATION SCIENCES, 2023, 644
  • [38] Dynamic Auditing and Deduplication with Secure Data Deletion in Cloud
    Dinesh, N.
    Juvanna, I.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2016, 2017, 517 : 305 - 313
  • [39] More efficient, provably-secure direct anonymous attestation from lattices
    El Kassem, Nada
    Chen, Liqun
    El Bansarkhani, Rachid
    El Kaafarani, Ali
    Camenisch, Jan
    Hough, Patrick
    Martins, Paulo
    Sousa, Leonel
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 : 425 - 458
  • [40] An efficient and provably-secure certificateless signature scheme without bilinear pairings
    He, D.
    Chen, J.
    Zhang, R.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (11) : 1432 - 1442