On the security of a cloud data storage auditing protocol IPAD

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays cloud data storage is a very important storage service for us, but to ensure the datum stored in the remote cloud server remains unmodified, we need a mechanism to check the datum’s integrity, cloud data storage auditing protocol is such a mechanism, which has received great attention from researchers. Recently Zhang et al. proposed an efficient ID-based public auditing protocol called IPAD for the outsourced data by combing Waters signature and public auditing for the outsourced data. They claimed IPAD is the first ID-based auditing protocol for data integrity in the standard security model. But in this paper we show their proposal is not secure. Especially, the adversaries can easily generate tags for any file, which obviously break the unforgeability property of the cloud storage auditing protocol.

Cite

CITATION STYLE

APA

Wang, X. A., Luo, X., Zhang, J., & Yang, X. (2018). On the security of a cloud data storage auditing protocol IPAD. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 6, pp. 611–617). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-59463-7_61

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free