Cryptanalysis of an identity-based public auditing protocol for cloud storage

Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN

PDF(223 KB)
PDF(223 KB)
Front. Inform. Technol. Electron. Eng ›› 2017, Vol. 18 ›› Issue (12) : 1972-1977. DOI: 10.1631/FITEE.1601530
Comment
Comment

Cryptanalysis of an identity-based public auditing protocol for cloud storage

Author information +
History +

Abstract

Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cloud data to simplify key management and alleviate the burden of check tasks. They claimed that NaEPASC enables a thirdparty auditor (TPA) to verify the integrity of outsourced data with high efficiency and security in a cloud computing environment. However, in this paper, we pinpoint that NaEPASC is vulnerable to the signature forgery attack in the setup phase; i.e., a malicious cloud server can forge a valid signature for an arbitrary data block by using two correct signatures. Moreover, we demonstrate that NaEPASC is subject to data privacy threats in the challenge phase; i.e., an external attacker acting as a TPA can reveal the content of outsourced data. The analysis shows that NaEPASC is not secure in the data verification process. Therefore, our work is helpful for cryptographers and engineers to design and implement more secure and efficient identity-based public auditing schemes for cloud storage.

Keywords

Cloud data / Public auditing / Data integrity / Data privacy

Cite this article

Download citation ▾
Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN. Cryptanalysis of an identity-based public auditing protocol for cloud storage. Front. Inform. Technol. Electron. Eng, 2017, 18(12): 1972‒1977 https://doi.org/10.1631/FITEE.1601530

RIGHTS & PERMISSIONS

2017 Zhejiang University and Springer-Verlag GmbH Germany
PDF(223 KB)

Accesses

Citations

Detail

Sections
Recommended

/