文章詳目資料

Journal of Computers EIMEDLINEScopus

  • 加入收藏
  • 下載文章
篇名 Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage
卷期 28:4
作者 Yong-Jun RenJian ShenJin WangLi-Ming Fang
頁次 023-030
關鍵字 cloud storageprovable data possessionproxy signatureEIMEDLINEScopus
出刊日期 201708
DOI 10.3966/199115592017082804003

中文摘要

英文摘要

Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data con-fidentiality, integrity, and availability. In this paper, we revisit the two private PDP schemes. We show that the property of correctness cannot be achieved when active adversaries are involved in these auditing systems. More specifically, an active adversary can arbitrarily tamper the cloud data and produce a valid auditing. Moreover, the malicious CSS can put the auditing right to entrust to anyone and control the delegation key and lead to the failure of the subsequent validation work. Finally, we propose a solution using key agreement to resolve the weakness. Our scheme is high efficiency due to removing expensive bilinear computing. Moreover, the verifier is stateless and independent from cloud storage server, which is an important secure property in PDP schemes.

本卷期文章目次

相關文獻