Abstract

Due the advent of new wireless communication, Internet of Things (IoT) and cloud computing, outsourcing the data processing and management to the cloud servers has become a typical transformative computing paradigm. In this context, a cloud auditing protocol is an effective way to check the data integrity for cloud data management. We present a cryptanalysis of two recently proposed certificateless public verifiable auditing protocols, the Zhang et al.’s protocol and the Kang et al.’s protocol. We argue that the tags in the Zhang et al.’s protocol and the semi-tags in the Kang et al.’s protocol can be forged, leading to insecure protocols. We propose improved versions of both protocols and analyze their security and efficiency. Our new protocols can be used as a very effective way for checking the integrity of outsourced cloud storage in the context of transformative computation.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call