Szczegóły publikacji
Opis bibliograficzny
New public auditing protocol based on homomorphic tags for secure cloud storage / Jindan Zhang, Baocang Wang, Marek R. OGIELA, Xu An Wang, Arun Kumar Sangaiah // Concurrency and Computation : Practice and Experience ; ISSN 1532-0626. — 2020 — vol. 32 iss. 18 spec. iss. art. no. e5600, s. 1–12. — Bibliogr. s. 11–12, Summ. — Publikacja dostępna online od: 2019-12-19. — Special Issue on Novel Data Mining Paradigms based on Soft Computing and Machine Learning in the current and upcoming Information Society Revolution (RACS2018), Special Issue on Advanced approaches for information processing in multimedia, decision making and security systems (AdvInfoProc2019)
Autorzy (5)
- Zhang Jindan
- Wang Baocang
- AGHOgiela Marek
- Wang Xu An
- Sangaiah Arun Kumar
Słowa kluczowe
Dane bibliometryczne
ID BaDAP | 129956 |
---|---|
Data dodania do BaDAP | 2020-12-22 |
Tekst źródłowy | URL |
DOI | 10.1002/cpe.5600 |
Rok publikacji | 2020 |
Typ publikacji | referat w czasopiśmie |
Otwarty dostęp | |
Czasopismo/seria | Concurrency and Computation : Practice & Experience |
Abstract
Outsourcing datum to the cloud servers is more and more popular for most data owners and enterprises. However, how to ensure the outsourced datum to be kept secure is very important. Especially, how to check the outsourced datum's integrity is a very challenge problem. Until now, there are many cryptographic protocols proposed to solve this problem, such as (dynamic) provable data position protocol, (dynamic) proof of retrievability protocol, etc. Recently, Tian et al proposed a dynamic-hash-table-based public auditing scheme for secure cloud storage, which aims at simultaneously supporting secure dynamic data updating and secure public auditing for cloud storage. However, we find a security flaw in this protocol; concretely, the signature algorithm for the data blocks in their protocol is not secure; the cloud servers can easily modify the outsourced data blocks without detecting. Finally, we give a new protocol by using homomorphic tags based on their protocol and roughly analysis its security.