Visible to the public Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

TitleCryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Publication TypeConference Paper
Year of Publication2017
AuthorsLuo, H. S., Jiang, R., Pei, B.
Conference Name2017 10th International Symposium on Computational Intelligence and Design (ISCID)
Keywordscloud computing, countermeasures, cryptanalysis, cryptography, data blocks, data structure DHT, dynamic data, dynamic hash table, dynamic-hash-table based public auditing, Forgery, Human Behavior, integrity, low computational audit cost, Mathematical model, outsourcing, outsourcing data services, Privacy-preserving, pubcrawl, public auditing, public auditing scheme, public integrity auditing, Public key, Resiliency, Scalability, secure cloud storage, Secure storage, security analysis, Security Audits, security problems, security shortage
Abstract

Cloud storage can provide outsourcing data services for both organizations and individuals. However, cloud storage still faces many challenges, e.g., public integrity auditing, the support of dynamic data, and low computational audit cost. To solve the problems, a number of techniques have been proposed. Recently, Tian et al. proposed a novel public auditing scheme for secure cloud storage based on a new data structure DHT. The authors claimed that their scheme was proven to be secure. Unfortunately, through our security analysis, we find that the scheme suffers from one attack and one security shortage. The attack is that an adversary can forge the data to destroy the correctness of files without being detected. The shortage of the scheme is that the updating operations for data blocks is vulnerable and easy to be modified. Finally, we give our countermeasures to remedy the security problems.

URLhttps://ieeexplore.ieee.org/document/8275715
DOI10.1109/ISCID.2017.26
Citation Keyluo_cryptanalysis_2017