Skip to main content
Log in

Cryptanalysis of an identity-based public auditing protocol for cloud storage

  • Comment
  • Published:
Frontiers of Information Technology & Electronic Engineering Aims and scope Submit manuscript

Abstract

Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cloud data to simplify key management and alleviate the burden of check tasks. They claimed that NaEPASC enables a third-party auditor (TPA) to verify the integrity of outsourced data with high efficiency and security in a cloud computing environment. However, in this paper, we pinpoint that NaEPASC is vulnerable to the signature forgery attack in the setup phase; i.e., a malicious cloud server can forge a valid signature for an arbitrary data block by using two correct signatures. Moreover, we demonstrate that NaEPASC is subject to data privacy threats in the challenge phase; i.e., an external attacker acting as a TPA can reveal the content of outsourced data. The analysis shows that NaEPASC is not secure in the data verification process. Therefore, our work is helpful for cryptographers and engineers to design and implement more secure and efficient identity-based public auditing schemes for cloud storage.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Ateniese, G., Burns, R., Curtmola, R., et al., 2007. Provable data possession at untrusted stores. Proc. 14th ACM Conf. on Computer and Communications Security, p.598–609. https://doi.org/10.1145/1315245.1315318

    Google Scholar 

  • Chen, B., Curtmola, R., 2012. Robust dynamic provable data possession. 32nd Int. Conf. on Distributed Computing Systems Workshops, p.515–525. https://doi.org/10.1109/ICDCSW.2012.57

    Google Scholar 

  • Fu, Z.J., Sun, X.M., Liu, Q., et al., 2015. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun., E98.B(1):190–200. https://doi.org/10.1587/transcom.E98.B.190

    Article  Google Scholar 

  • Fu, Z.J., Ren, K., Shu, J.G., et al., 2016. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parall. Distrib. Syst., 27(9):2546–2559. https://doi.org/10.1109/TPDS.2015.2506573

    Article  Google Scholar 

  • Guo, P., Wang, J., Geng, X.H., et al., 2014. A variable threshold-value authentication architecture for wireless mesh networks. J. Intern. Technol., 15(6):929–935. https://doi.org/10.6138/JIT.2014.15.6.05

    Google Scholar 

  • He, D.B., Zeadally, S., Wu, L.B., 2015. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J., in press. https://doi.org/10.1109/JSYST.2015.2428620

    Google Scholar 

  • Li, J.T., Zhang, L., Liu, J.K., et al., 2016. Privacy-preserving public auditing protocol for low performance end devices in cloud. IEEE Trans. Inform. Forens. Secur., 11(11):2572–2583. https://doi.org/10.1109/TIFS.2016.2587242

    Article  Google Scholar 

  • Liu, J.K., Au, M.H., Huang, X., et al., 2016. Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inform. Forens. Secur., 11(3):484–497. https://doi.org/10.1109/TIFS.2015.2493983

    Article  Google Scholar 

  • Ren, Y.J., Shen, J., Wang, J., et al., 2015. Mutual verifiable provable data auditing in public cloud storage. J. Intern. Technol., 16(2):317–323. https://doi.org/10.6138/JIT.2015.16.2.20140918

    Google Scholar 

  • Shacham, H., Waters, B., 2008. Compact proofs of retrievability. LNCS, 5350:90–107. https://doi.org/10.1007/978-3-540-89255-7_7

    MathSciNet  MATH  Google Scholar 

  • Shacham, H., Waters, B., 2013. Compact proofs of retrievability. J. Cryptol., 26(3):442–483. https://doi.org/10.1007/s00145-012-9129-2

    Article  MathSciNet  Google Scholar 

  • Tan, S., Jia, Y., 2014. NaEPASC: a novel and efficient public auditing scheme for cloud data. J. Zhejiang Univ.-Sci. C (Comput. & Electron.), 15(9):794–804. https://doi.org/10.1631/jzus.C1400045

    Article  Google Scholar 

  • Wang, C., Chow, S.S.M., Wang, Q., et al., 2013. Privacypreserving public auditing for secure cloud storage. IEEE Trans. Comput., 62(2):362–375. https://doi.org/10.1109/TC.2011.245

    Article  MathSciNet  Google Scholar 

  • Xia, Z., Wang, X., Sun, X., et al., 2016. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parall. Distrib. Syst., 27(2):340–352. https://doi.org/10.1109/TPDS.2015.2401003

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to De-biao He.

Additional information

Project supported by the National Natural Science Foundation of China (Nos. 61472287, 61501333, 61572379, and 61772377), the Natural Science Foundation of Hubei Province, China (Nos. 2015CFA068 and 2017CFA007), the Wuhan Science and Technology Plan Project (No. 2016060101010047), and the Deanship of Scientific Research at King Saud University, Saudi Arabia (No. PRG-1436-16)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, Lb., Wang, J., He, Db. et al. Cryptanalysis of an identity-based public auditing protocol for cloud storage. Frontiers Inf Technol Electronic Eng 18, 1972–1977 (2017). https://doi.org/10.1631/FITEE.1601530

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/FITEE.1601530

Key words

CLC number

Navigation