Improved Secure Provable Data Possession Scheme for Cloud Storage
Author
Abstract

Provable Security - With the rapid development of cloud storage technology, effectively verifying the cloud data’s integrity becomes a major issue in cloud storage. Recently, Nayak and Tripathy proposed their cloud auditing protocol. Although the protocol is efficient, the protocol is not secure as Yu et al’s attack shows. Even if the server does not store the users’ data, it is possible to forge the provable data possession proof and pass the integrity audit. We point out the issue in their article and describe in detail the process by which the cloud server forging the proof. We finally give an improved and more secure scheme and analysis its security also.

Year of Publication
2022
Date Published
aug
Publisher
IEEE
Conference Location
Espoo, Finland
ISBN Number
978-1-66545-417-9
URL
https://ieeexplore.ieee.org/document/9903218/
DOI
10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00028
Google Scholar | BibTeX | DOI