透過您的圖書館登入
IP:18.216.123.120
  • 期刊

Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage

摘要


Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data con-fidentiality, integrity, and availability. In this paper, we revisit the two private PDP schemes. We show that the property of correctness cannot be achieved when active adversaries are involved in these auditing systems. More specifically, an active adversary can arbitrarily tamper the cloud data and produce a valid auditing. Moreover, the malicious CSS can put the auditing right to entrust to anyone and control the delegation key and lead to the failure of the subsequent validation work. Finally, we propose a solution using key agreement to resolve the weakness. Our scheme is high efficiency due to removing expensive bilinear computing. Moreover, the verifier is stateless and independent from cloud storage server, which is an important secure property in PDP schemes.

被引用紀錄


Lin, Y. J. (2010). 氧化鋅奈米線的蕭特基接觸 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2010.02713

延伸閱讀