Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage

Tung Tso Tsai, Yuh-Min Tseng, Ying Hao Hung, Sen-Shan Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

For validating the data integrity in the cloud storage, several provable data possession (PDP) schemes have been proposed to concern with this issue. However, these schemes are either inefficient or insecure under some circumstances. In 2015, Ren et al. Proposed an efficient mutual verifiable PDP (MV-PDP) scheme with stateless property. In this article, we will show that their scheme cannot provide data integrity checking by presenting a universal forgery attack on the verification procedure. In addition, an improvement is proposed to resist this attack. Under the computational Diffie-Hellman (CDH) and discrete logarithm (DL) assumptions, we formally prove that the improved PDP scheme is secure against forgery attacks while achieving better performance than Ren et al.'s scheme.

Original languageEnglish
Title of host publicationProceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016
EditorsPei-Wei Tsai, Junzo Watada, Naoyuki Kubota
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages56-59
Number of pages4
ISBN (Electronic)9781509010936
DOIs
Publication statusPublished - 2017 Aug 10
Event3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016 - Matsue, Shimane, Japan
Duration: 2016 May 202016 May 22

Publication series

NameProceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016

Other

Other3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016
CountryJapan
CityMatsue, Shimane
Period16-05-2016-05-22

Fingerprint

attack
integrity
logarithms
Attack
Data integrity

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Signal Processing
  • Information Systems and Management
  • Instrumentation
  • Information Systems

Cite this

Tsai, T. T., Tseng, Y-M., Hung, Y. H., & Huang, S-S. (2017). Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage. In P-W. Tsai, J. Watada, & N. Kubota (Eds.), Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016 (pp. 56-59). [8008639] (Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CMCSN.2016.18
Tsai, Tung Tso ; Tseng, Yuh-Min ; Hung, Ying Hao ; Huang, Sen-Shan. / Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage. Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016. editor / Pei-Wei Tsai ; Junzo Watada ; Naoyuki Kubota. Institute of Electrical and Electronics Engineers Inc., 2017. pp. 56-59 (Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016).
@inproceedings{b570f44425a044c3a86d4af56c11c938,
title = "Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage",
abstract = "For validating the data integrity in the cloud storage, several provable data possession (PDP) schemes have been proposed to concern with this issue. However, these schemes are either inefficient or insecure under some circumstances. In 2015, Ren et al. Proposed an efficient mutual verifiable PDP (MV-PDP) scheme with stateless property. In this article, we will show that their scheme cannot provide data integrity checking by presenting a universal forgery attack on the verification procedure. In addition, an improvement is proposed to resist this attack. Under the computational Diffie-Hellman (CDH) and discrete logarithm (DL) assumptions, we formally prove that the improved PDP scheme is secure against forgery attacks while achieving better performance than Ren et al.'s scheme.",
author = "Tsai, {Tung Tso} and Yuh-Min Tseng and Hung, {Ying Hao} and Sen-Shan Huang",
year = "2017",
month = "8",
day = "10",
doi = "10.1109/CMCSN.2016.18",
language = "English",
series = "Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "56--59",
editor = "Pei-Wei Tsai and Junzo Watada and Naoyuki Kubota",
booktitle = "Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016",
address = "United States",

}

Tsai, TT, Tseng, Y-M, Hung, YH & Huang, S-S 2017, Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage. in P-W Tsai, J Watada & N Kubota (eds), Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016., 8008639, Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016, Institute of Electrical and Electronics Engineers Inc., pp. 56-59, 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016, Matsue, Shimane, Japan, 16-05-20. https://doi.org/10.1109/CMCSN.2016.18

Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage. / Tsai, Tung Tso; Tseng, Yuh-Min; Hung, Ying Hao; Huang, Sen-Shan.

Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016. ed. / Pei-Wei Tsai; Junzo Watada; Naoyuki Kubota. Institute of Electrical and Electronics Engineers Inc., 2017. p. 56-59 8008639 (Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage

AU - Tsai, Tung Tso

AU - Tseng, Yuh-Min

AU - Hung, Ying Hao

AU - Huang, Sen-Shan

PY - 2017/8/10

Y1 - 2017/8/10

N2 - For validating the data integrity in the cloud storage, several provable data possession (PDP) schemes have been proposed to concern with this issue. However, these schemes are either inefficient or insecure under some circumstances. In 2015, Ren et al. Proposed an efficient mutual verifiable PDP (MV-PDP) scheme with stateless property. In this article, we will show that their scheme cannot provide data integrity checking by presenting a universal forgery attack on the verification procedure. In addition, an improvement is proposed to resist this attack. Under the computational Diffie-Hellman (CDH) and discrete logarithm (DL) assumptions, we formally prove that the improved PDP scheme is secure against forgery attacks while achieving better performance than Ren et al.'s scheme.

AB - For validating the data integrity in the cloud storage, several provable data possession (PDP) schemes have been proposed to concern with this issue. However, these schemes are either inefficient or insecure under some circumstances. In 2015, Ren et al. Proposed an efficient mutual verifiable PDP (MV-PDP) scheme with stateless property. In this article, we will show that their scheme cannot provide data integrity checking by presenting a universal forgery attack on the verification procedure. In addition, an improvement is proposed to resist this attack. Under the computational Diffie-Hellman (CDH) and discrete logarithm (DL) assumptions, we formally prove that the improved PDP scheme is secure against forgery attacks while achieving better performance than Ren et al.'s scheme.

UR - http://www.scopus.com/inward/record.url?scp=85029391336&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85029391336&partnerID=8YFLogxK

U2 - 10.1109/CMCSN.2016.18

DO - 10.1109/CMCSN.2016.18

M3 - Conference contribution

AN - SCOPUS:85029391336

T3 - Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016

SP - 56

EP - 59

BT - Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016

A2 - Tsai, Pei-Wei

A2 - Watada, Junzo

A2 - Kubota, Naoyuki

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Tsai TT, Tseng Y-M, Hung YH, Huang S-S. Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage. In Tsai P-W, Watada J, Kubota N, editors, Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016. Institute of Electrical and Electronics Engineers Inc. 2017. p. 56-59. 8008639. (Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016). https://doi.org/10.1109/CMCSN.2016.18