Abstract
Cloud storage offers the users with high quality and on-demand data storage services and frees them from the burden of maintenance. However, the cloud servers are not fully trusted. Whether the data stored on cloud are intact or not becomes a major concern of the users. Recently, Chen et al. proposed a remote data possession checking protocol to address this issue. One distinctive feature of their protocol support data dynamics, meaning that users are allowed to modify, insert and delete their outsourced data without the need to re-run the whole protocol. Unfortunately, in this paper, we find that this protocol fails to achieve its purpose since it is vulnerable to forgery attack and replace attack launched by a malicious server. Specifically, we show how a malicious cloud server can deceive the user to believe that the entire file is well-maintained by using the meta-data related to the file alone, or with only part of the file and its meta-data. Then, we propose an improved protocol to fix the security flaws and formally proved that our proposal is secure under a well-known security model. In addition, our improvement keeps all the desirable features of the original protocol.
Original language | English |
---|---|
Pages (from-to) | 7789-7796 |
Number of pages | 8 |
Journal | Expert Systems with Applications |
Volume | 41 |
Issue number | 17 |
DOIs | |
Publication status | Published - 1 Dec 2014 |
Keywords
- Cloud storage
- Data possession checking
- Dynamic auditing
- Homomorphic hashing
ASJC Scopus subject areas
- General Engineering
- Computer Science Applications
- Artificial Intelligence