{"title":"公共云存储中可证明数据占有方案的密码分析与改进","authors":"Tung-Tso Tsai, Yuh-Min Tseng, Ying-Hao Hung, Sen-Shan Huang","doi":"10.1109/CMCSN.2016.18","DOIUrl":null,"url":null,"abstract":"For validating the data integrity in the cloud storage, several provable data possession (PDP) schemes have been proposed to concern with this issue. However, these schemes are either inefficient or insecure under some circumstances. In 2015, Ren et al. Proposed an efficient mutual verifiable PDP (MV-PDP) scheme with stateless property. In this article, we will show that their scheme cannot provide data integrity checking by presenting a universal forgery attack on the verification procedure. In addition, an improvement is proposed to resist this attack. Under the computational Diffie-Hellman (CDH) and discrete logarithm (DL) assumptions, we formally prove that the improved PDP scheme is secure against forgery attacks while achieving better performance than Ren et al.'s scheme.","PeriodicalId":153377,"journal":{"name":"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage\",\"authors\":\"Tung-Tso Tsai, Yuh-Min Tseng, Ying-Hao Hung, Sen-Shan Huang\",\"doi\":\"10.1109/CMCSN.2016.18\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For validating the data integrity in the cloud storage, several provable data possession (PDP) schemes have been proposed to concern with this issue. However, these schemes are either inefficient or insecure under some circumstances. In 2015, Ren et al. Proposed an efficient mutual verifiable PDP (MV-PDP) scheme with stateless property. In this article, we will show that their scheme cannot provide data integrity checking by presenting a universal forgery attack on the verification procedure. In addition, an improvement is proposed to resist this attack. Under the computational Diffie-Hellman (CDH) and discrete logarithm (DL) assumptions, we formally prove that the improved PDP scheme is secure against forgery attacks while achieving better performance than Ren et al.'s scheme.\",\"PeriodicalId\":153377,\"journal\":{\"name\":\"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMCSN.2016.18\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMCSN.2016.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage
For validating the data integrity in the cloud storage, several provable data possession (PDP) schemes have been proposed to concern with this issue. However, these schemes are either inefficient or insecure under some circumstances. In 2015, Ren et al. Proposed an efficient mutual verifiable PDP (MV-PDP) scheme with stateless property. In this article, we will show that their scheme cannot provide data integrity checking by presenting a universal forgery attack on the verification procedure. In addition, an improvement is proposed to resist this attack. Under the computational Diffie-Hellman (CDH) and discrete logarithm (DL) assumptions, we formally prove that the improved PDP scheme is secure against forgery attacks while achieving better performance than Ren et al.'s scheme.