Publication Type

Journal Article

Version

publishedVersion

Publication Date

1-2014

Abstract

Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism.We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data without being detected by the auditor in the verification phase. We also propose a solution to remedy the weakness without sacrificing any desirable features of these mechanisms.

Keywords

Auditing, Cloud storage, Cryptanalysis, Privacy-preserving

Discipline

Data Storage Systems | Information Security

Research Areas

Information Systems and Management

Publication

Future Generation Computer Systems

Volume

30

Issue

1

First Page

127

Last Page

132

ISSN

0167-739X

Identifier

10.1016/j.future.2013.05.005

Publisher

Elsevier

Additional URL

https://doi.org/10.1016/j.future.2013.05.005

Share

COinS