Provably-Secure Public Auditing with Deduplication

被引:2
|
作者
Kim, Dongmin [1 ]
Jeong, Ik Rae [1 ]
机构
[1] Korea Univ, CIST, Seoul 136713, South Korea
关键词
Public auditing; deduplication; data integrity; tag-unforgeability; proof-unforgebility; SHARED DATA; PRIVACY;
D O I
10.3837/tiis.2017.04.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.
引用
收藏
页码:2219 / 2236
页数:18
相关论文
共 50 条
  • [41] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    Ateniese, Giuseppe
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    JOURNAL OF CRYPTOLOGY, 2012, 25 (02) : 243 - 270
  • [42] An Efficient and Provably-Secure Broadcast Authentication Scheme in Wireless Sensor Networks
    Guo, Rui
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Zhao, Jing
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (06): : 977 - 985
  • [43] Provably-Secure One-Message Unilateral Entity Authentication Schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Flores, Manuela
    Masucci, Barbara
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1665 - 1679
  • [44] Practical and provably-secure multicasting over high-delay networks
    Nam, JY
    Kim, H
    Kim, S
    Won, D
    Yang, HK
    COMPUTATIONAL SCIENCE - ICCS 2005, PT 2, 2005, 3515 : 493 - 501
  • [45] Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach
    Mishra, Rahul
    Ramesh, Dharavath
    Kanhere, Salil S.
    Edla, Damodar Reddy
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2023, 14 (03)
  • [47] Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wu, Yulin
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Peng
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 562 - 567
  • [48] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    Giuseppe Ateniese
    Alfredo De Santis
    Anna Lisa Ferrara
    Barbara Masucci
    Journal of Cryptology, 2012, 25 : 243 - 270
  • [49] Post-quantum Provably-Secure Authentication and MAC from Mersenne Primes
    Ferradi, Houda
    Xagawa, Keita
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 469 - 495
  • [50] Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction
    Jayasankaran, N. G.
    Borbon, A. Sanabria
    Sanchez-Sinencio, E.
    Hu, J.
    Rajendran, J.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (01) : 386 - 403