Improved security of a dynamic remote data possession checking protocol for cloud storage

Yong Yu, Jianbing Ni, Man Ho Allen Au, Hongyu Liu, Hua Wang, Chunxiang Xu

Research output: Journal article publicationJournal articleAcademic researchpeer-review

55 Citations (Scopus)


Cloud storage offers the users with high quality and on-demand data storage services and frees them from the burden of maintenance. However, the cloud servers are not fully trusted. Whether the data stored on cloud are intact or not becomes a major concern of the users. Recently, Chen et al. proposed a remote data possession checking protocol to address this issue. One distinctive feature of their protocol support data dynamics, meaning that users are allowed to modify, insert and delete their outsourced data without the need to re-run the whole protocol. Unfortunately, in this paper, we find that this protocol fails to achieve its purpose since it is vulnerable to forgery attack and replace attack launched by a malicious server. Specifically, we show how a malicious cloud server can deceive the user to believe that the entire file is well-maintained by using the meta-data related to the file alone, or with only part of the file and its meta-data. Then, we propose an improved protocol to fix the security flaws and formally proved that our proposal is secure under a well-known security model. In addition, our improvement keeps all the desirable features of the original protocol.
Original languageEnglish
Pages (from-to)7789-7796
Number of pages8
JournalExpert Systems with Applications
Issue number17
Publication statusPublished - 1 Dec 2014


  • Cloud storage
  • Data possession checking
  • Dynamic auditing
  • Homomorphic hashing

ASJC Scopus subject areas

  • General Engineering
  • Computer Science Applications
  • Artificial Intelligence


Dive into the research topics of 'Improved security of a dynamic remote data possession checking protocol for cloud storage'. Together they form a unique fingerprint.

Cite this