Visible to the public A Security Problem in Cloud Auditing Protocols

TitleA Security Problem in Cloud Auditing Protocols
Publication TypeConference Paper
Year of Publication2019
AuthorsLv, Jixian, Wang, Yi, Liu, Jinze
Conference Name2019 International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)
Date Publishednov
Keywordsauditing, basic security model, cloud auditing protocol, cloud auditing protocols, cloud computing, cloud server, cryptography, data owner, Human Behavior, Mikhail Bellare, PRISM, pubcrawl, publity, Resiliency, Scalability, secret information, Security Audits, security problem, subversion attack, subverted auditing frame, subverted auditing protocol instantiation
AbstractIn 2013, subversion attack comes to publity again by Mikhail Bellare, who was inspired by PRISM. In this work, we implement this kind of attack on cloud auditing protocols. We show that through subversion attacks, the cloud server can recover the secret information stored by the data owner. Especially, First, we set a general frame of data auditing protocols. This model forms a basic security model of auditing protocols. Then we give a security model of attacker. Finally, we put forward some popular auditing protocols which can be subverted.
DOI10.1109/MLBDBI48998.2019.00016
Citation Keylv_security_2019