Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
Journal of Cryptology
Pors: proofs of retrievability for large files
Proceedings of the 14th ACM conference on Computer and communications security
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
Scalable and efficient provable data possession
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Compact Proofs of Retrievability
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Dynamic provable data possession
Proceedings of the 16th ACM conference on Computer and communications security
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Privacy-preserving public auditing for data storage security in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Toward publicly auditable secure cloud data storage services
IEEE Network: The Magazine of Global Internetworking
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
IEEE Transactions on Parallel and Distributed Systems
Dynamic audit services for integrity verification of outsourced storages in clouds
Proceedings of the 2011 ACM Symposium on Applied Computing
Security Challenges for the Public Cloud
IEEE Internet Computing
Future Generation Computer Systems
Toward Secure and Dependable Storage Services in Cloud Computing
IEEE Transactions on Services Computing
Knox: privacy-preserving auditing for shared data with large groups in the cloud
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
CLOUD '12 Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
IEEE Transactions on Parallel and Distributed Systems
Hi-index | 0.00 |
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism. We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data without being detected by the auditor in the verification phase. We also propose a solution to remedy the weakness without sacrificing any desirable features of these mechanisms.