Abstract
Cloud auditing is a significant technique for determining the security of data owners’ data in cloud. However, multiple-replica places greater demands on cloud auditing, where not only the integrity of each data replica but also the number of replicas should be checked. Moreover, it is also significant to support dynamical updating for multiple-replica data. Therefore, how to achieve secure and effective multiple-replica dynamic data auditing is a cutting-edge issue for cloud auditing. Recently, an efficient multi-replica dynamic data auditing scheme (IEEE Transactions on Information Forensics & Security, DOI: 10.1109/TIFS.2014.2384391) was presented to address this issue. Unfortunately, there is a security defect in this protocol, as we demonstrate in this paper. Specifically, a dishonest cloud storage provider can store an aggregation of all data copies instead of each replica itself without being detected by an auditor. Accordingly, we suggest a solution to resolve the problem while preserving all the properties of the original protocol.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)
Tian, H., et al.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10, 701–714 (2017)
Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)
Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 43–56 (2014)
Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)
Hao, Z., Yu, N.: A multiple-replica remote data possession checking protocol with public verifiability. In: Proceedings of the 2nd International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 84–89 (2010)
Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J.: MUR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9), 2609–2622 (2015)
Barsoum, A.F., Hasan, M.A.: Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans. Inf. Forensics Secur. 10(3), 485–497 (2015)
Acknowledgments
This work was supported in part by National Natural Science Foundation of China under Grant Nos. U1405254 and U1536115, Natural Science Foundation of Fujian Province of China under Grant No. 2018J01093, Research Project for Young Teachers in Fujian Province (Program for High-Education Informationization) under Grant No. JAT170055, and Program for Science and Technology Innovation Teams and Leading Talents of Huaqiao University under Grant No. 2014KJTD13.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Lu, J., Chen, Y., Tian, H., Chen, Y., Wang, T., Cai, Y. (2018). Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data. In: Hu, T., Wang, F., Li, H., Wang, Q. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science(), vol 11338. Springer, Cham. https://doi.org/10.1007/978-3-030-05234-8_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-05234-8_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05233-1
Online ISBN: 978-3-030-05234-8
eBook Packages: Computer ScienceComputer Science (R0)