Provably-secure public auditing with deduplication

Dongmin Kim, ik rae Jeong

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu’s scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Original languageEnglish
Pages (from-to)2219-2236
Number of pages18
JournalKSII Transactions on Internet and Information Systems
Volume11
Issue number4
DOIs
Publication statusPublished - 2017

Keywords

  • Data integrity
  • Deduplication
  • Proof-unforgebility
  • Public auditing
  • Tag-unforgeability

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Provably-secure public auditing with deduplication'. Together they form a unique fingerprint.

  • Cite this