Attacks on the anti-collusion data sharing scheme for dynamic groups in the cloud

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As the hype of the evolution of cloud computing has become a real possibility in the modern day outsourcing scenarios, users can benefit from cloud computing by uploading documents into the cloud servers for sharing it among a group of legitimate users. But, though cloud is a viable present day option for elastic storage facilities, its security is still a grave concern. Hence, in order to improve the secure communication among group members, Zhu and Jiang have proposed a protocol and claimed that key distribution to the group users can be done without any secure communication channels. They have claimed that their scheme is resistant to collusion attack and all the other attacks, thereby ensuring forward and backward secrecies as well. Firstly, in this research work, after extensive analysis, we have identified several issues in the protocol proposed by Zhu and Jiang which make it vulnerable to various attacks. Secondly, we have proved that an attacker can use the man-in-the-middle attack and break the protocol thereby getting the secret keys shared between the group manager and the group user. Thirdly, we have given enough proof that the scheme is vulnerable to message modification attack too. Finally, we claim that the earlier proposed protocol is not secure and a new protocol with improved security is the need of the hour.

Cite

CITATION STYLE

APA

Milton Ganesh, S., Pandi, V., Jegatha Deborah, L., & Bhuiyan, M. Z. A. (2017). Attacks on the anti-collusion data sharing scheme for dynamic groups in the cloud. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10658 LNCS, pp. 457–467). Springer Verlag. https://doi.org/10.1007/978-3-319-72395-2_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free