• DocumentCode
    1783974
  • Title

    Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage

  • Author

    Yongjun Ren ; Jian Shen ; Jin Wang ; Liming Fang

  • Author_Institution
    Jiangsu Eng. Center of Network Monitoring, Nanjing Univ. of Inf. Sci. & Technol., Nanjing, China
  • fYear
    2014
  • fDate
    27-29 Aug. 2014
  • Firstpage
    779
  • Lastpage
    782
  • Abstract
    Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data confidentiality, integrity, and availability. In this paper, we revisit the two private PDP schemes. We show that the property of correctness cannot be achieved when active adversaries are involved in these auditing systems. More specifically, an active adversary can arbitrarily tamper the cloud data and produce a valid auditing. Moreover, the malicious CSS can put the auditing right to entrust to anyone and control the delegation key and lead to the failure of the subsequent validation work. We also propose a solution to resolve the weakness in these schemes.
  • Keywords
    cloud computing; security of data; storage management; auditing system; cloud storage; correctness property; data availability; data confidentiality; data integrity; delegable data possession; information security; private PDP scheme; proxy provable data possession; Cascading style sheets; Cloud computing; Data models; Educational institutions; Public key; Servers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
  • Conference_Location
    Kitakyushu
  • Print_ISBN
    978-1-4799-5389-9
  • Type

    conf

  • DOI
    10.1109/IIH-MSP.2014.198
  • Filename
    6998443