File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.future.2014.10.006
- Scopus: eid_2-s2.0-84938057153
- WOS: WOS:000358807200009
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Remote data possession checking with enhanced security for cloud storage
Title | Remote data possession checking with enhanced security for cloud storage |
---|---|
Authors | |
Keywords | Provable security Data integrity Cloud storage Algebraic signature |
Issue Date | 2015 |
Citation | Future Generation Computer Systems, 2015, v. 52, p. 77-85 How to Cite? |
Abstract | © 2014 Elsevier B.V. Abstract Cloud storage allows users to enjoy the on-demand and high quality data storage services without the load of local data maintenance. However, the cloud server providers are not fully trusted. Whether the data over cloud servers are intact becomes a major concern of data owners. To offer cloud users with the capacity of data integrity verification, recently, Chen proposed a remote data possession checking (RDPC) protocol from algebraic signatures which achieves many desirable features such as high efficiency, short length of challenges and responses, non-block verification. Unfortunately, in this paper, we find that the protocol is vulnerable to replay attack and deletion attack launched by a dishonest server. Specifically, the server can deceive the users to believe that their data are well hold by replaying a previous evidence or re-constructing the deleted data blocks from the corresponding tags in the integrity checking process, while their data have been partially discarded in fact. Then, we present an improved scheme to fix the security flaws of the original protocol. Both the theoretical analysis and the implementation results show that the improvement is secure and practical. |
Persistent Identifier | http://hdl.handle.net/10722/280830 |
ISSN | 2023 Impact Factor: 6.2 2023 SCImago Journal Rankings: 1.946 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, Yong | - |
dc.contributor.author | Zhang, Yafang | - |
dc.contributor.author | Ni, Jianbing | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Chen, Lanxiang | - |
dc.contributor.author | Liu, Hongyu | - |
dc.date.accessioned | 2020-02-17T14:35:03Z | - |
dc.date.available | 2020-02-17T14:35:03Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | Future Generation Computer Systems, 2015, v. 52, p. 77-85 | - |
dc.identifier.issn | 0167-739X | - |
dc.identifier.uri | http://hdl.handle.net/10722/280830 | - |
dc.description.abstract | © 2014 Elsevier B.V. Abstract Cloud storage allows users to enjoy the on-demand and high quality data storage services without the load of local data maintenance. However, the cloud server providers are not fully trusted. Whether the data over cloud servers are intact becomes a major concern of data owners. To offer cloud users with the capacity of data integrity verification, recently, Chen proposed a remote data possession checking (RDPC) protocol from algebraic signatures which achieves many desirable features such as high efficiency, short length of challenges and responses, non-block verification. Unfortunately, in this paper, we find that the protocol is vulnerable to replay attack and deletion attack launched by a dishonest server. Specifically, the server can deceive the users to believe that their data are well hold by replaying a previous evidence or re-constructing the deleted data blocks from the corresponding tags in the integrity checking process, while their data have been partially discarded in fact. Then, we present an improved scheme to fix the security flaws of the original protocol. Both the theoretical analysis and the implementation results show that the improvement is secure and practical. | - |
dc.language | eng | - |
dc.relation.ispartof | Future Generation Computer Systems | - |
dc.subject | Provable security | - |
dc.subject | Data integrity | - |
dc.subject | Cloud storage | - |
dc.subject | Algebraic signature | - |
dc.title | Remote data possession checking with enhanced security for cloud storage | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.future.2014.10.006 | - |
dc.identifier.scopus | eid_2-s2.0-84938057153 | - |
dc.identifier.volume | 52 | - |
dc.identifier.spage | 77 | - |
dc.identifier.epage | 85 | - |
dc.identifier.isi | WOS:000358807200009 | - |
dc.identifier.issnl | 0167-739X | - |