Abstract
Data integrity verification mechanisms play an important role in cloud environments. Recently, a lightweight identity-based cloud storage audit scheme has been proposed; this paper points out security vulnerabilities of their OffTagGen algorithm. That is, the attackers such as malicious cloud servers can forge the tags, which can destroy data integrity. By improving the construction of OffTagGen algorithm, an improved security cloud auditing protocol is proposed in this work to better protect user’s privacy. The analysis shows that the new protocol is effective and resistant to attacks.
Highlights
In the last two years, the COVID-19 pandemic has become a major disaster in the world
In order to further improve security, Yu et al [14] combined the key homomorphic encryption technology in the cryptographic cloud audit system and proposed an improved scheme with perfect data privacy protection capabilities. e ID-based privacy-preserving integrity verification of shared data over untrusted cloud scheme is proposed, which can support users to update the data in cloud and protect users’ privacy in untrusted cloud servers
In order to get a more secure protocol, based on the scheme presented in [16], we propose an improved one and discuss its application in pandemic data management. e main contributions of this paper are summarized as follows: (1) We firstly point out the insecurity of Rabaninejad et al.’s lightweight identity-based provable data ownership cloud storage audit scheme
Summary
In the last two years, the COVID-19 pandemic has become a major disaster in the world. E ID-based privacy-preserving integrity verification of shared data over untrusted cloud scheme is proposed, which can support users to update the data in cloud and protect users’ privacy in untrusted cloud servers. Rabaninejad et al [16] proposed a lightweight identity-based provable data ownership cloud storage audit scheme, which supports privacy and traceability of user identities. We discovered that there are security flaws in the digital signature (OffTagGen) of their scheme Attackers, such as malicious cloud servers, can destroy the privacy of user’s identity privacy and damage data privacy and integrity. In order to get a more secure protocol, based on the scheme presented in [16], we propose an improved one and discuss its application in pandemic data management.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have