Abstract
Cloud data integrity verification is an important means to keep data security. Many integrity verification schemes were proposed for cloud storage. In 2019, Zhang et al. proposed a conditional identity privacy-preserving public auditing (CIPPPA) mechanism. We found that the signature algorithm is insecure because the Cloud Service Provider (CSP) can modify the user's outsourced data, while it can generate a correct proof.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proc. Conference on Computer and Communications Security2007, pp. 598–609 (2007)
Huang, P., Fan, K., Yang, H., Zhang, K., Li, H., Yang, Y.: A collaborative auditing blockchain for trustworthy data integrity in cloud storage system. IEEE Access 8, 94780–94794 (2020). https://doi.org/10.1109/ACCESS.2020.2993606
Wang, F., Xu, L., Choo, K.-K.R., Zhang, Y., Wang, H., Li, J.: Lightweight certificate-based public/private auditing scheme based on bilinear pairing for cloud storage. IEEE Access 8, 2258–2271 (2020). https://doi.org/10.1109/ACCESS.2019.2960853
Rao, L., Zhang, H., Tu, T.: Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated merkle hash tree. In: IEEE Transactions on Services Computing, vol. 13, no. 3, pp. 451–463 (1 May-June 2020). https://doi.org/10.1109/TSC.2017.2708116
Liu, J., Wang, X.A., Liu, Z., Wang, H., Yang, X.: Privacy-preserving public cloud audit scheme supporting dynamic data for unmanned aerial vehicles. IEEE Access 8, 79428–79439 (2020). https://doi.org/10.1109/ACCESS.2020.2991033
Zhang, Y., Yu, J., Hao, R., Wang, C., Ren, K.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. In: IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 3, pp. 608–619 (1 May-June 2020). https://doi.org/10.1109/TDSC.2018.2829880
Yang, X., Wang, M., Wang, X., Chen, G., Wang, C.: Stateless cloud auditing scheme for non-manager dynamic group data with privacy preservation. IEEE Access 8, 212888–212903 (2020). https://doi.org/10.1109/ACCESS.2020.3039981
Zhang, X.J., Zhao, J., Xu, C., Li, H.W., Wang, H.X., Zhang, Y.: CIPPPA: conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors. IEEE Trans. Cloud Comp. 9(4), 1362–1375 (July 2019)
Acknowledgement
This work is supported by Engineering University of PAP's Funding for Scientific Research Innovation Team (No.KYTD201805), Engineering University of PAP's Funding for Key Researcher (No. KYGG202011).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, X.A., Zhou, M., Yuan, W. (2023). Cryptanalysis of a Public Cloud Auditing Scheme. In: Barolli, L. (eds) Advances in Internet, Data & Web Technologies. EIDWT 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 161. Springer, Cham. https://doi.org/10.1007/978-3-031-26281-4_30
Download citation
DOI: https://doi.org/10.1007/978-3-031-26281-4_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-26280-7
Online ISBN: 978-3-031-26281-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)