首页> 外文期刊>Information Security Technical Report >Cryptanalysis of an integrity checking scheme for cloud data sharing
【24h】

Cryptanalysis of an integrity checking scheme for cloud data sharing

机译:对云数据共享完整性检查方案的密码分析

获取原文
获取原文并翻译 | 示例
           

摘要

Cloud storage provides an efficient way for users to work together as a group by sharing data with each other. However, since shared data can be accessed and modified by multiple users and group membership may be changed frequently, this new paradigm poses many challenges for keeping integrity of shared data. Recently, Yuan et al. proposed an efficient integrity checking scheme (IEEE INFOCOM 2014, doi: 10.1109/INFOCOM.2014.6848154) for cloud data sharing with multi-user modification, which had many appealing features. They claimed that the scheme is secure and efficient, and they also provided the formal security proof and the performance evaluation. Regretfully, existing two security flaws in Yuan et al.'s scheme are pointed out in this letter. Specifically, by fooling the third-party auditor (TPA) into trusting that the data is well maintained by the cloud server, an adversary can process the following two deceiving methods. Firstly, the adversary can modify the shared data and tamper with the interaction messages between the cloud server and the TPA, thus invalidating shared data integrity checking. Secondly, an adversary, who records a fraction of the cloud-stored data, can overwrite the vast majority of the shared data by using the recorded data and passing shared data integrity verification. Furthermore, we suggest a solution to the two security flaws while retaining all the desirable features of the original scheme.
机译:云存储通过彼此共享数据,为用户提供了一种有效的方式,使其可以作为一个小组一起工作。但是,由于共享数据可以由多个用户访问和修改,并且组成员身份可能会频繁更改,因此,这种新范例对保持共享数据的完整性提出了许多挑战。最近,袁等人。提出了一种有效的完整性检查方案(IEEE INFOCOM 2014,doi:10.1109 / INFOCOM.2014.6848154),用于通过多用户修改的云数据共享,该方案具有许多吸引人的功能。他们声称该方案是安全且高效的,并且还提供了正式的安全证明和性能评估。遗憾的是,这封信指出了Yuan等人方案中存在的两个安全漏洞。具体来说,通过欺骗第三方审核员(TPA)信任云服务器可以很好地维护数据,攻击者可以处理以下两种欺骗方法。首先,攻击者可以修改共享数据并篡改云服务器和TPA之间的交互消息,从而使共享数据完整性检查无效。其次,记录一部分云存储数据的对手可以通过使用记录的数据并通过共享数据完整性验证来覆盖绝大多数共享数据。此外,我们建议对这两个安全漏洞的解决方案,同时保留原始方案的所有理想功能。

著录项

  • 来源
    《Information Security Technical Report》 |2015年第8期|68-73|共6页
  • 作者单位

    School of Computer Science and Engineering, University of Electronic Science and Technology of China, 2006 Xi Yuan Avenue, West High-tech Zone, Chengdu 611731, China;

    School of Computer Science and Engineering, University of Electronic Science and Technology of China, 2006 Xi Yuan Avenue, West High-tech Zone, Chengdu 611731, China;

    School of Computer Science and Engineering, University of Electronic Science and Technology of China, 2006 Xi Yuan Avenue, West High-tech Zone, Chengdu 611731, China;

    School of Computer Science and Engineering, University of Electronic Science and Technology of China, 2006 Xi Yuan Avenue, West High-tech Zone, Chengdu 611731, China;

    School of Computer Science and Engineering, University of Electronic Science and Technology of China, 2006 Xi Yuan Avenue, West High-tech Zone, Chengdu 611731, China;

  • 收录信息 美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Integrity checking; Cloud data sharing; Cryptanalysis;

    机译:完整性检查;云数据共享;密码分析;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号