DocumentCode
1783980
Title
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage
Author
Yongjun Ren ; Jian Shen ; Jin Wang ; Liming Fang
Author_Institution
Jiangsu Eng. Center of Network Monitoring, Nanjing Univ. of Inf. Sci. & Technol.; Nanjing, Nanjing, China
fYear
2014
fDate
27-29 Aug. 2014
Firstpage
795
Lastpage
798
Abstract
Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data confidentiality, integrity,and availability. In this paper, we revisit the two private PDP schemes. We show that the property of correctness cannot be achieved when active adversaries are involved in these auditing systems. More specifically, an active adversary can arbitrarily tamper the cloud data and produce a valid auditing. Moreover,the malicious CSS can put the auditing right to entrust to anyone and control the delegation key and lead to the failure of the subsequent validation work. We also propose a solution to resolve the weakness in these schemes.
Keywords
cloud computing; digital signatures; private key cryptography; storage management; auditing systems; cloud data tampering; delegable provable data possession; delegation key control; information security; information technology; malicious CSS; private PDP schemes; proxy provable data possession; proxy signature; public cloud storage; security analysis; valid auditing; Cascading style sheets; Cloud computing; Computational modeling; Data models; Educational institutions; Security; Servers; provable data possession; proxy signature; Cloud;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
Conference_Location
Kitakyushu
Print_ISBN
978-1-4799-5389-9
Type
conf
DOI
10.1109/IIH-MSP.2014.249
Filename
6998447
Link To Document