Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Title | Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Luo, H. S., Jiang, R., Pei, B. |
Conference Name | 2017 10th International Symposium on Computational Intelligence and Design (ISCID) |
Keywords | cloud computing, countermeasures, cryptanalysis, cryptography, data blocks, data structure DHT, dynamic data, dynamic hash table, dynamic-hash-table based public auditing, Forgery, Human Behavior, integrity, low computational audit cost, Mathematical model, outsourcing, outsourcing data services, Privacy-preserving, pubcrawl, public auditing, public auditing scheme, public integrity auditing, Public key, Resiliency, Scalability, secure cloud storage, Secure storage, security analysis, Security Audits, security problems, security shortage |
Abstract | Cloud storage can provide outsourcing data services for both organizations and individuals. However, cloud storage still faces many challenges, e.g., public integrity auditing, the support of dynamic data, and low computational audit cost. To solve the problems, a number of techniques have been proposed. Recently, Tian et al. proposed a novel public auditing scheme for secure cloud storage based on a new data structure DHT. The authors claimed that their scheme was proven to be secure. Unfortunately, through our security analysis, we find that the scheme suffers from one attack and one security shortage. The attack is that an adversary can forge the data to destroy the correctness of files without being detected. The shortage of the scheme is that the updating operations for data blocks is vulnerable and easy to be modified. Finally, we give our countermeasures to remedy the security problems. |
URL | https://ieeexplore.ieee.org/document/8275715 |
DOI | 10.1109/ISCID.2017.26 |
Citation Key | luo_cryptanalysis_2017 |
- outsourcing data services
- security shortage
- security problems
- Security Audits
- Security analysis
- Secure storage
- secure cloud storage
- Scalability
- Resiliency
- Public key
- public integrity auditing
- public auditing scheme
- public auditing
- pubcrawl
- Privacy-preserving
- Cloud Computing
- outsourcing
- Mathematical model
- low computational audit cost
- integrity
- Human behavior
- Forgery
- dynamic-hash-table based public auditing
- dynamic hash table
- dynamic data
- data structure DHT
- data blocks
- Cryptography
- cryptanalysis
- countermeasures