Authors: Jindan Zhang; Baocang Wang
Addresses: State Key Laboratory of Integrated Service Networks, School of Telecommunications Engineering, Xidian University, Xi'an, China; Xianyang Vocational Technique College, Xianyang, China ' State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China; School of Information Engineering, Xuchang University, Xuchang, China
Abstract: Nowadays, cloud storage is a popular service for many data owners, they prefer to outsource their datum to the cloud servers. However the cloud servers maybe sometimes loss datum due to accidents. Thus, the integrity of the outsourced datum need to be ensured by the data owners or even any other third parties publicly. Recently in the mobile cloud computing setting, Chen et al. proposed a public auditing protocol for data integrity based on adjacency-hash-table. However we find the data blocks' tags can be easily forged in their proposal, and thus the cloud servers can loss datum but still has the ability to give correct proof for data position, which breaks the security of their proposal. We show two concrete attacks to their proposal and give an improved public auditing protocol for cloud storage integrity checking and roughly analysis its security.
Keywords: cloud storage; public auditing; outsource; attack; tag.
International Journal of Web and Grid Services, 2019 Vol.15 No.3, pp.282 - 303
Available online: 04 Jul 2019 *Full-text access for editors Access for subscribers Purchase this article Comment on this article