Skip to main content

2016 | OriginalPaper | Buchkapitel

A Note on “IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model”

verfasst von : Wenting Shen, Jia Yu, Hui Xia, Rong Hao

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud storage is an increasingly popular data storage manner which allows cloud data owners to outsource their data to the cloud for storage and maintaining. However, users will lose their physical control over their data after their data are outsourced to the cloud. To ensure the integrity of data stored in the cloud, many public auditing schemes have been proposed. Recently, Zhang et al. proposed an ID-based public auditing scheme for the outsourced data in the standard model. In this note, we prove this scheme is not secure. We show that the malicious cloud can pass the auditor’s verification even if it has deleted or modified the users’ data in this scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a Berkeley view of cloud computing. EECS Department University of California Berkeley, vol. 53, no. 4, pp. 50–58 (2015) Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a Berkeley view of cloud computing. EECS Department University of California Berkeley, vol. 53, no. 4, pp. 50–58 (2015)
2.
Zurück zum Zitat Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)CrossRef Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)CrossRef
3.
Zurück zum Zitat Song, D., Shi, E., Fischer, I., Shankar, U.: Cloud data protection for the masses. IEEE Comput. 45(1), 39–45 (2012)CrossRef Song, D., Shi, E., Fischer, I., Shankar, U.: Cloud data protection for the masses. IEEE Comput. 45(1), 39–45 (2012)CrossRef
6.
Zurück zum Zitat Wang, Q., Wang, C., Ren, K.: Enabling public auditability and cloud data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K.: Enabling public auditability and cloud data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
7.
Zurück zum Zitat Yu, Y., Zhang, Y., Ni, J., Au, M., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77–85 (2015)CrossRef Yu, Y., Zhang, Y., Ni, J., Au, M., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77–85 (2015)CrossRef
8.
Zurück zum Zitat Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1717–1726 (2015)CrossRef Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1717–1726 (2015)CrossRef
9.
Zurück zum Zitat Yu, J., Ren, K., Wang, C., Varadharajan, V.: Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. Inf. Forensics Secur. 10(6), 1167–1179 (2015)CrossRef Yu, J., Ren, K., Wang, C., Varadharajan, V.: Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. Inf. Forensics Secur. 10(6), 1167–1179 (2015)CrossRef
10.
Zurück zum Zitat Zhang, Y., Blanton, M.: Efficient dynamic provable possession of remote data via balanced update trees. In: Department of 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 183–194. ACM (2013) Zhang, Y., Blanton, M.: Efficient dynamic provable possession of remote data via balanced update trees. In: Department of 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 183–194. ACM (2013)
11.
Zurück zum Zitat Guan, C., Ren, K., Zhang, F., Kerschbaum, F., Yu, J.: Symmetric-key based proofs of retrievability supporting public verification. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS. LNCS, vol. 9326, pp. 203–223. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24174-6_11 CrossRef Guan, C., Ren, K., Zhang, F., Kerschbaum, F., Yu, J.: Symmetric-key based proofs of retrievability supporting public verification. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS. LNCS, vol. 9326, pp. 203–223. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-24174-6_​11 CrossRef
12.
Zurück zum Zitat Wang, H.: Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551–558 (2013)CrossRef Wang, H.: Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551–558 (2013)CrossRef
13.
Zurück zum Zitat Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web-Internet Web Inf. Syst. 15(4), 409–428 (2012)CrossRef Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web-Internet Web Inf. Syst. 15(4), 409–428 (2012)CrossRef
14.
Zurück zum Zitat Wang, B., Li, H., Li, M.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: 2013 IEEE International Conference on IEEE Communications (ICC), pp. 1946–1950 (2013) Wang, B., Li, H., Li, M.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: 2013 IEEE International Conference on IEEE Communications (ICC), pp. 1946–1950 (2013)
15.
Zurück zum Zitat Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y., Susilo, W.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 11(3), 658–659 (2016)CrossRef Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y., Susilo, W.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 11(3), 658–659 (2016)CrossRef
16.
Zurück zum Zitat Yang, G., Yu, J., Shen, W., Su, Q., Zhang, F., Hao, R.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130–139 (2016)CrossRef Yang, G., Yu, J., Shen, W., Su, Q., Zhang, F., Hao, R.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130–139 (2016)CrossRef
17.
Zurück zum Zitat Zhang, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 6(6), 1–14 (2016)MathSciNet Zhang, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 6(6), 1–14 (2016)MathSciNet
18.
Zurück zum Zitat Wang, H., Wu, Q., Qin, B., Ferrer, D.: Identity-based remote data possession checking in public clouds. Inf. Secur. 8(2), 114–121 (2014)CrossRef Wang, H., Wu, Q., Qin, B., Ferrer, D.: Identity-based remote data possession checking in public clouds. Inf. Secur. 8(2), 114–121 (2014)CrossRef
19.
Zurück zum Zitat Tan, S., Jia, Y.: NaEPASC: a novel and efficient public auditing scheme for cloud data. J. Zhejiang Univ. Sci. C 15(9), 794–804 (2014)CrossRef Tan, S., Jia, Y.: NaEPASC: a novel and efficient public auditing scheme for cloud data. J. Zhejiang Univ. Sci. C 15(9), 794–804 (2014)CrossRef
20.
Zurück zum Zitat Zhang, J., Li, P., Mao, J.: IPad: ID-based public auditing for the outsourced data in the standard mode. Cluster Comput. 19(1), 1–12 (2015) Zhang, J., Li, P., Mao, J.: IPad: ID-based public auditing for the outsourced data in the standard mode. Cluster Comput. 19(1), 1–12 (2015)
22.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of ACM CCS 2007, pp. 598–610 (2007) Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of ACM CCS 2007, pp. 598–610 (2007)
Metadaten
Titel
A Note on “IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model”
verfasst von
Wenting Shen
Jia Yu
Hui Xia
Rong Hao
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-48671-0_30