Skip to main content
Top
Published in: The Journal of Supercomputing 7/2020

17-10-2018

Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme

Authors: Kuan Fan, Mingxi Liu, Guofang Dong, Wenbo Shi

Published in: The Journal of Supercomputing | Issue 7/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The cloud storage service becomes a popular tendency based on the cloud computing, which can solve user’s storage bottleneck problem. Data security problems are solved by remote data auditing in cloud storage, which attracts more researchers to pay attention to data verification. In this paper, a new replay attack is defined, and attack process is analyzed in some schemes which cannot avoid the new replay attack. An auditing protocol is proposed that can withstand this attack and supports public auditing, dynamic auditing and batch auditing. The proposed scheme introduces a new data structure which is stored locally by users for dynamic operation. It can avoid the third part auditor getting the outsourced data information. Compared with the related schemes, the experimental results show that the computation costs of the proposal are reasonable and are highly efficient in the stage of verification.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Dewan H, Hansdah RC (July 2011) A survey of cloud storage facilities. In: Proceeding of the 7th IEEE World Congress Service, pp 224–231 Dewan H, Hansdah RC (July 2011) A survey of cloud storage facilities. In: Proceeding of the 7th IEEE World Congress Service, pp 224–231
2.
go back to reference Liu C, Ranjan R, Zhang X et al (2014) Public auditing for big data storage in cloud computing—a survey. In: IEEE International Conference on Computational Science and Engineering. IEEE, pp 1128–1135 Liu C, Ranjan R, Zhang X et al (2014) Public auditing for big data storage in cloud computing—a survey. In: IEEE International Conference on Computational Science and Engineering. IEEE, pp 1128–1135
4.
go back to reference Ryoo J, Rizvi S, Aiken W, Kissell J (2014) Cloud security auditing: challenges and emerging approaches. IEEE Secur Priv 12(6):68–74CrossRef Ryoo J, Rizvi S, Aiken W, Kissell J (2014) Cloud security auditing: challenges and emerging approaches. IEEE Secur Priv 12(6):68–74CrossRef
5.
go back to reference Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Virginia, USA, pp 598–609 Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Virginia, USA, pp 598–609
6.
go back to reference Hsien WF, Yang CC, Hwang MS (2016) A survey of public auditing for secure data storage in cloud computing. Int J Netw Secur 18(1):133–142 Hsien WF, Yang CC, Hwang MS (2016) A survey of public auditing for secure data storage in cloud computing. Int J Netw Secur 18(1):133–142
7.
go back to reference Zhang Y, Xu C, Liang X et al (2017) Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Inf Forensics Secur 12(3):676–688CrossRef Zhang Y, Xu C, Liang X et al (2017) Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Inf Forensics Secur 12(3):676–688CrossRef
8.
go back to reference Tian H, Chen Y, Chang CC et al (2015) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput 1:99 Tian H, Chen Y, Chang CC et al (2015) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput 1:99
9.
go back to reference Sookhak M, Yu FR, Zomaya AY (2018) Auditing big data storage in cloud computing using divide and conquer tables. IEEE Trans Parallel Distrib Syst 29(5):999–1012CrossRef Sookhak M, Yu FR, Zomaya AY (2018) Auditing big data storage in cloud computing using divide and conquer tables. IEEE Trans Parallel Distrib Syst 29(5):999–1012CrossRef
10.
go back to reference Zhu Y, Ahn GJ, Hu H et al (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227–238CrossRef Zhu Y, Ahn GJ, Hu H et al (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227–238CrossRef
11.
go back to reference Shen J, Shen J, Chen X et al (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415CrossRef Shen J, Shen J, Chen X et al (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415CrossRef
12.
go back to reference Garg N, Bawa S (2017) RITS-MHT: relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. J Netw Comput Appl 84:1–13CrossRef Garg N, Bawa S (2017) RITS-MHT: relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. J Netw Comput Appl 84:1–13CrossRef
13.
go back to reference Juels A, Burton J, Kaliski S (2007) Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Virginia, USA, pp 584–597 Juels A, Burton J, Kaliski S (2007) Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Virginia, USA, pp 584–597
14.
go back to reference Wang C, Wang Q, Ren K, Lou W (2009) Ensuring data storage security in cloud computing. In: Proceedings of the 17th International Workshop on Quality of Service (IWQoS’09), South Carolina, USA, pp 1–9 Wang C, Wang Q, Ren K, Lou W (2009) Ensuring data storage security in cloud computing. In: Proceedings of the 17th International Workshop on Quality of Service (IWQoS’09), South Carolina, USA, pp 1–9
15.
go back to reference Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859CrossRef Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859CrossRef
16.
go back to reference Erway C, Papamanthou AKC, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Illinois, USA, pp 213–222 Erway C, Papamanthou AKC, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Illinois, USA, pp 213–222
17.
go back to reference Wang C, Chow SSM, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375MathSciNetCrossRef Wang C, Chow SSM, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375MathSciNetCrossRef
18.
go back to reference Shen W, Yu J, Xia H et al (2017) Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J Netw Comput Appl 82:56–64CrossRef Shen W, Yu J, Xia H et al (2017) Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J Netw Comput Appl 82:56–64CrossRef
19.
go back to reference Wang C, Ren K, Lou W, Li J (2010) Toward publicly auditable secure cloud data storage services. IEEE Netw 24(4):19–24CrossRef Wang C, Ren K, Lou W, Li J (2010) Toward publicly auditable secure cloud data storage services. IEEE Netw 24(4):19–24CrossRef
20.
go back to reference Wang J, Chen X, Huang X et al (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303MathSciNetCrossRef Wang J, Chen X, Huang X et al (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303MathSciNetCrossRef
21.
go back to reference Yan Y, Wu L, Gao G et al (2018) A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter. J Inf Secur Appl 39:10–18 Yan Y, Wu L, Gao G et al (2018) A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter. J Inf Secur Appl 39:10–18
22.
go back to reference Yu Y, Zhang Y, Ni J et al (2015) Remote data possession checking with enhanced security for cloud storage. Future Gener Comput Syst 52:77–85CrossRef Yu Y, Zhang Y, Ni J et al (2015) Remote data possession checking with enhanced security for cloud storage. Future Gener Comput Syst 52:77–85CrossRef
23.
go back to reference Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: Proceeding of the IEEE INFOCOM, pp 1–9 Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: Proceeding of the IEEE INFOCOM, pp 1–9
24.
go back to reference Sookhak M, Gani A, Khan MK et al (2017) Dynamic remote data auditing for securing big data storage in cloud computing. Inf Sci 380:101–116CrossRef Sookhak M, Gani A, Khan MK et al (2017) Dynamic remote data auditing for securing big data storage in cloud computing. Inf Sci 380:101–116CrossRef
25.
go back to reference Yi M, Wei J, Song L (2017) Efficient integrity verification of replicated data in cloud computing system. Comput Secur 65:202–212CrossRef Yi M, Wei J, Song L (2017) Efficient integrity verification of replicated data in cloud computing system. Comput Secur 65:202–212CrossRef
26.
go back to reference Feng B, Ma X, Guo C et al (2016) An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access 4:7899–7911CrossRef Feng B, Ma X, Guo C et al (2016) An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access 4:7899–7911CrossRef
27.
go back to reference Wei J, Zhang R, Liu J et al (2017) Dynamic data integrity auditing for secure outsourcing in the cloud. Concurr Comput Pract Exp 29(12):e4013CrossRef Wei J, Zhang R, Liu J et al (2017) Dynamic data integrity auditing for secure outsourcing in the cloud. Concurr Comput Pract Exp 29(12):e4013CrossRef
28.
go back to reference Saxena R, Dey S (2016) Cloud audit: a data integrity verification approach for cloud computing. Proc Comput Sci 89:142–151CrossRef Saxena R, Dey S (2016) Cloud audit: a data integrity verification approach for cloud computing. Proc Comput Sci 89:142–151CrossRef
29.
go back to reference Tang X, Qi Y, Huang Y (2016) Reputation audit in multi-cloud storage through integrity verification and data dynamics. In: 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). IEEE, pp 624–631 Tang X, Qi Y, Huang Y (2016) Reputation audit in multi-cloud storage through integrity verification and data dynamics. In: 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). IEEE, pp 624–631
30.
go back to reference Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT’01), Gold Coast, Australia, pp 514–532 Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT’01), Gold Coast, Australia, pp 514–532
31.
go back to reference Bao F, Deng R, Zhu H (2003) Variations of Diffie–Hellman problem. Proc ICICS 2003:301–312 Bao F, Deng R, Zhu H (2003) Variations of Diffie–Hellman problem. Proc ICICS 2003:301–312
32.
go back to reference Kaisa N, Rueppel R (1996) Message recovery for signature schemes based on the discrete logarithm problem. Des Codes Cryptogr 7(1):61–81MATH Kaisa N, Rueppel R (1996) Message recovery for signature schemes based on the discrete logarithm problem. Des Codes Cryptogr 7(1):61–81MATH
Metadata
Title
Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme
Authors
Kuan Fan
Mingxi Liu
Guofang Dong
Wenbo Shi
Publication date
17-10-2018
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 7/2020
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2645-6

Other articles of this Issue 7/2020

The Journal of Supercomputing 7/2020 Go to the issue

Premium Partner