Abstract
Cloud computing and internet of things have gained remarkable popularity by a wide spectrum of users recently. Despite of the convenience of cloud storage, security challenges have risen upon the fact that users do not physically possess their data any more. Thus, some auditing schemes are introduced to ensure integrity of the outsourced data. And among them Panda is a public auditing scheme for shared data with efficient and secure user revocation proposed by Wang et al. It argued that it could verify the integrity of shared data with storage correctness and public auditing. In this paper, we analyze this scheme and find some security drawbacks. Firstly, Panda cannot preserve shared data privacy in cloud storage. Furthermore, our analysis shows that Panda is vulnerable to integrity forgery attack, which can be performed by malicious cloud servers to forge a valid auditing proof against any auditing challenge even without correct data storage. Then we pinpoint that the primary cause of the insecurity is the linear combinations of sampled data blocks without random masking properly. Finally, we propose an improvement of Panda together with data privacy preserving and sound public auditing while incurring optimal communication and computation overhead.





Similar content being viewed by others
References
Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A et al (2010) A view of cloud computing. Commun ACM 53(4):50–8
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In Proc CCS’07, Alexandria, VA 598–609
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. Proc EUROCRYPT’98, Springer-Verlag 127–44
Boneh D, Lynn B, Shacham H (2004) Short signatures from the Weil pairing. J Cryptol 17(4):297–319
Che L, Shahidehpour M, Alabdulwahab A, Al-Turki Y (2015) Hierarchical coordination of a community microgrid with AC and DC microgrids. IEEE Trans Smart Grid
Che L, Zhang X, Shahidehpour M, Alabdulwahab A, Abusorrah A (2015) Optimal interconnection planning of community microgrids with renewable energy sources. IEEE Trans Smart Grid
Chen Z, Huang W, Lv Z (2016) Towards a face recognition method based on uncorrelated discriminant sparse preserving projection. Multimed Tools Appl
Dang S, Kakimzhanov R, Zhang M et al (2014) Smart grid-oriented graphical user interface design and data processing algorithm proposal based on LabVIEW. Environ Electr Eng (EEEIC) 14th Int Conf IEEE 323–327
Gu W, Lv Z, Hao M (2016) Change detection method for remote sensing images based on an improved Markov random field. Multimed Tools Appl
Jiang D, Xu Z, Chen Z et al (2011) Joint time–frequency sparse estimation of large-scale network traffic. Comput Netw 55(15):3533–3547
Jiang D, Xu Z, Li W, Yao C, Lv Z, Li T (2015) An energy-efficient multicast algorithm with maximum network throughput in multi-hop wireless networks. J Commun Netw
Jiang D, Xu Z, Xu H et al (2011) An approximation method of origin–destination flow traffic from link load counts. Comput Electr Eng 37(6):1106–1121
Jiang D, Xu Z, Zhang P, Zhu T (2014) A transform domain-based anomaly detection approach to network-wide traffic. J Netw Comput Appl 40:292–306
Jiang D, Ying X, Han Y et al (2015) Collaborative multi-hop routing in cognitive wireless networks. Wirel Pers Commun 1–23
Juels A and Kaliski BS (2007) Pors: proofs of retrievability for large files. In Proc CCS’07, Alexandria, VA 584–97
Li X, Lv Z, Hu J, et al (2015) Traffic management and forecasting system based on 3D GIS. 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). IEEE
Lin Y, Yang J, Lv Z et al (2015) A self-assessment stereo capture model applicable to the internet of things. Sensors 15(8):20925–20944
S Liu, W Fu, L He et al (2015) Distribution of primary additional errors in fractal encoding method [J]. Multimed Tools Appl
S Liu, Z Zhang, L Qi et al (2015) A fractal image encoding method based on statistical loss used in agricultural image compression [J]. Multimed Tools Appl
Lv Z, Halawani A, Fen S et al (2015) Touch-less interactive augmented reality game on vision based wearable device. Pers Ubiquit Comput
Lv Z, Halawani A, Feng S et al (2014) Multimodal hand and foot gesture interaction for handheld devices. ACM Trans Multimed Comput Commun Appl (TOMM) 11(1s):10
Lv Z, Tek A, Da Silva F et al (2013) Game on, science-how video game technology may help biologists tackle visualization challenges. PLoS One 8(3):57990
Lv Z, Yin T, Han Y, Chen Y et al (2011) WebVR—web virtual reality engine based on P2P network. J Netw 6(7):990–998
Ou W, Lv Z, Xie Z (2015) Spatially regularized latent topic model for simultaneous object discovery and segmentation. The 2015 I.E. International Conference on Systems, Man, and Cybernetics (SMC2015). IEEE
Shacham H, Waters B (2008) Compact proofs of retrievability. Proc ASIACRYPT’08 Springer-Verlag 90–107
Su T, Wang W, Lv Z et al (2016) Rapid Delaunay triangulation for randomly distributed point cloud data using adaptive Hilbert curve. Comput Graph 54:65–74
Tate SR, Vishwanathan R, Everhart L (2013) Multi-user dynamic proofs of data possession using trusted hardware. Proc ACM CODASPY 13:353–64
Wang B, Chow SS, Li M, Li H (2013) Storing shared data on the cloud via security-mediator. Proc IEEE ICDCS 13:124–33
Wang B, Li B, Li H (2012) Oruta: privacy-preserving public auditing for shared data in the cloud. Proc IEEE Cloud 12:295–302
Wang B, Li H, Li M (2013) Privacy-preserving public auditing for shared cloud data supporting group dynamics. Proc IEEE ICC’13, Budapest, Hungary 1946–50
Wang B, Li B, Li H (2013) Public auditing for shared data with efficient user revocation in the cloud. Proc IEEE INFOCOM 13:2904–12
Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92–106
Wang Y, Su Y, Agrawal G (2015) A novel approach for approximate aggregations over arrays. Proceedings of the 27th International Conference on Scientific and Statistical Database Management. ACM 4
Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–59
Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. Proc IEEE INFOCOM 10:525–33
Wang K et al (2015) Load‐balanced and locality‐aware scheduling for data‐intensive workloads at extreme scales. Concurrency and Computation: Practice and Experience
Wang K et al (2015) Overcoming Hadoop scaling limitations through distributed task execution. Proc IEEE Int Conf Clust Comput
Worku SG, Xu C, Zhao J, He X (2013) Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng. doi:10.1016/j.compeleceng.2013.10.004
Xu C, He X, Abraha-Weldemariam D (2012) Cryptanalysis of wang’s auditing protocol for data storage security in cloud computing. Proc. ICICA’12, Springer-Verlag 422–28
Yang J, Chen B, Zhou J et al (2015) A low-power and portable biomedical device for respiratory monitoring with a stable power source. Sensors 15(8):19618–19632
Yang J, He S, Lin Y, Lv Z (2016) Multimedia cloud transmission and storage system based on internet of things. Multimed Tools Appl
Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–26
Zhang S, Jing H (2014) Fast log-Gabor-based nonlocal means image denoising methods. IEEE Int Conf Image Proc (ICIP) 2014:2724–2728
Zhang X, Xu Z, Henriquez C et al (2013) Spike-based indirect training of a spiking neural network-controlled virtual insect. IEEE 52nd Annu Conf Decis Control (CDC) 2013:6798–6805
Zhang S, Zhang X, Ou X (2014) After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud. Proc 9th ACM Symp Inf Comput Commun Sec. ACM 317–328
Acknowledgments
This work was supported by the school innovation foundation and the doctorial foundation under grant 2014JY170. We thank the anonymous reviewers for useful comments and suggestions.
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Yang, T., Yu, B., Wang, H. et al. Cryptanalysis and improvement of Panda - public auditing for shared data in cloud and internet of things. Multimed Tools Appl 76, 19411–19428 (2017). https://doi.org/10.1007/s11042-015-3139-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3139-7