Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage

Tung Tso Tsai, Yuh Min Tseng, Ying Hao Hung, Sen Shan Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

For validating the data integrity in the cloud storage, several provable data possession (PDP) schemes have been proposed to concern with this issue. However, these schemes are either inefficient or insecure under some circumstances. In 2015, Ren et al. Proposed an efficient mutual verifiable PDP (MV-PDP) scheme with stateless property. In this article, we will show that their scheme cannot provide data integrity checking by presenting a universal forgery attack on the verification procedure. In addition, an improvement is proposed to resist this attack. Under the computational Diffie-Hellman (CDH) and discrete logarithm (DL) assumptions, we formally prove that the improved PDP scheme is secure against forgery attacks while achieving better performance than Ren et al.'s scheme.

Original languageEnglish
Title of host publicationProceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016
EditorsPei-Wei Tsai, Junzo Watada, Naoyuki Kubota
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages56-59
Number of pages4
ISBN (Electronic)9781509010936
DOIs
Publication statusPublished - 2017 Aug 10
Event3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016 - Matsue, Shimane, Japan
Duration: 2016 May 202016 May 22

Publication series

NameProceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016

Other

Other3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016
CountryJapan
CityMatsue, Shimane
Period16-05-2016-05-22

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Signal Processing
  • Information Systems and Management
  • Instrumentation
  • Information Systems

Fingerprint Dive into the research topics of 'Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage'. Together they form a unique fingerprint.

  • Cite this

    Tsai, T. T., Tseng, Y. M., Hung, Y. H., & Huang, S. S. (2017). Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage. In P-W. Tsai, J. Watada, & N. Kubota (Eds.), Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016 (pp. 56-59). [8008639] (Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CMCSN.2016.18